The 14th Annual Michigan Cyber Summit brings together local and national thought leaders to help attendees stay ahead of the curve in preparing to defend, respond and recover from cyber threat actors. The State of Michigan has long been considered a national leader in cybersecurity, and this Summit facilitates conversations about leveraging generative AI in defense strategies, how federal resources can be part of your preparedness and response plans, the latest advancements in protecting both public and private interests. In partnership with the DTMB, Government Technology brings together a wide breadth of thought leaders for lively discussions that will help keep Michigan on the forefront of cyber defense.
The 2025 Michigan Cyber Summit gives us the opportunity to connect with cybersecurity experts from across the globe on a variety of cybersecurity topics, including new and emerging technologies, pressing threats, and processes to better protect public and private sectors. The digital ecosystem is constantly changing, and we need to work together to better secure our data and strengthen Michigan’s cybersecurity posture. This event, now in its 14th year, promises to be the best summit yet.
- Laura Clark, Chief Information Officer, State of Michigan
We are excited to bring the Michigan Cyber Summit back to Novi for its 14th year. The event gives technology leaders from both the public and private sectors the opportunity to work together, discuss how to overcome common threats, and strategize about of the best way to collectively protect the people who live, work, play, and do business in our great state.- Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management & Budget
Thursday, October 23 |
|
8:00 am Eastern |
Registration and Morning Refreshments in the Exhibit AreaAmethyst/Emerald |
9:00 am Eastern |
Welcome and Event Opening CeremoniesDiamond BallroomIncludes the National Anthem and the presentation of the colors by the Michigan State Police Color Guard. Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management and Budget |
9:10 am Eastern |
Keynote – Keep Your Head Out of the Cyber Sand: Using Superior Communications to Get the Job Done!Diamond BallroomRisk can take on many forms and governments must understand how to accept it, mitigate it, or insure against it while not sticking their head in the sand to ignore it. How will you assess your cyber risks and balance them against your needs? How will you make the rational decisions needed to be successful? How will you navigate the road to recovery? This session will answer these questions with a focus on ideas that will help you engage your leaders with real-world examples. Bryce Austin, CEO, TCE Strategy |
10:10 am Eastern |
What’s NextDiamond BallroomCaleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management and Budget |
10:15 am Eastern |
Networking Break in the Exhibit AreaAmethyst/Emerald |
10:45 am Eastern |
Proceed to breakouts |
11:00 am Eastern |
Concurrent SessionsAgentic AI Meets Cyber Defense: The Next Frontier in SecurityLegacy 2Agentic AI—AI systems capable of autonomous decision-making—is redefining the cybersecurity landscape. This session explores how cutting-edge agentic AI is being used to detect, respond to, and even predict cyber threats in real time. Attendees will gain insight into the opportunities and risks of integrating agentic AI into defense strategies, including threat hunting, adaptive response, and autonomous mitigation. Join us to discover how this transformative technology is shaping the future of cyber defense—and how to stay ahead of the curve. Dave McGinnis, Global Partner, Cyber Threat Management, IBM Preparedness & Crisis Readiness in an AI-Driven Threat LandscapeLegacy 1As AI accelerates the speed and sophistication of cyber threats, traditional defense models are no longer enough. This session explores how organizations can build true crisis readiness—anticipating advanced perceived threats before they strike. Learn how to adapt your cybersecurity strategy for an AI-enabled world, enhance threat perception, and strengthen decision-making under pressure. Designed for leaders and defenders alike, this session will equip you to stay ahead of emerging risks and respond with confidence. Nic Cantu, Sr. Solutions Engineer, Trend Micro Thomas J. Holt, Ph. D., Professor, Director of Masters Degree Programs, Director of the Center for Cybercrime Investigation and Training, School of Criminal Justice, Michigan State University Cybersecurity Has an IT ProblemLegacy 4Strong cybersecurity begins with strong information technology. This session will explore the foundational relationship between cybersecurity and IT architecture, emphasizing that effective security cannot exist in isolation from well-managed, modern, and resilient IT systems. From asset inventory and network visibility to patch management and access controls, cybersecurity outcomes are only as strong as the IT environments in which they operate. Public sector organizations often struggle with legacy infrastructure, fragmented systems, and under-resourced IT teams—all of which create systemic vulnerabilities. Moderator: Andrew Mason, IT General Manager, Department of Technology, Management and Budget, State of Michigan Brad Dispensa, Principal Security and Compliance Specialist, Amazon Web Services Brian Jennings, PMP, BRMP, GRC, Compliance, Audit, and Cybersecurity Evangelist, Michigan Department of Technology, Management and Budget Karthik Narayanan, Information Technology Specialist, Michigan Department of Technology, Management and Budget Doug Start, Director of Information Technology, City of Grand Rapids The People Problem + Social EngineeringLegacy 3Social engineering in 2025 is turbocharged by AI-powered deception techniques that exploit human psychology with unprecedented precision. This session uncovers how attackers use advanced AI tools to craft personalized, convincing attacks—and how understanding human behavior can turn the tide in your defense. Through real-world examples and innovative strategies, attendees will learn how to detect, disrupt, and defend against next-generation social engineering threat Kevin Hayes, CISSP, CISM, Chief Information Security Officer, Merit Network Ryan McVicar, Incident Response Lead, Michigan Security Operations Center (MiSOC), State of Michigan Kalil Olsen, Security Analyst, Michigan Security Operations Center (MiSOC), State of Michigan Optimizing Cybersecurity Operations in Tight Budget CyclesLegacy 7In a time of rising demands and fixed budgets, public sector leaders are being challenged to do more—with less. How can organizations prioritize cybersecurity effectively, drive efficiency, and still deliver meaningful results? This session explores how to identify and make the most of available resources by streamlining operations, optimizing existing tools, and fostering cross-functional collaboration and sharing services. Expect real-world insights around high-impact priorities and selecting the right people, tools, technologies, and services to move forward. Moderator: Stephanie Jeppesen, State Administrative Manager, Cybersecurity and Infrastructure Protection, Michigan Department of Technology, Management and Budget Erik Avakian, Technical Counselor, Info-Tech Research Group Andrew Dold, Chief Information Security Officer, City of Detroit Brian Kaselak, Director of Systems Engineering, Public Sector, Fortinet Zero Trust in Action: Building Your RoadmapLegacy 5Zero Trust has become a cornerstone of modern cybersecurity, but turning the framework into action can be daunting. In this interactive workshop, participants will explore the Microsoft Zero Trust Workshop tool to create a customized roadmap, measure progress, and integrate identity and device protections into their environments. Attendees will gain practical insight into how modern endpoint management and security suites can strengthen defenses, enable cross-team collaboration, and accelerate adoption of Zero Trust principles. Clay Taylor, Principal PM Architect for Microsoft Intune Strengthening Readiness with Tabletop ExercisesLegacy 6Responding to ransomware and other cyber incidents takes more than the right tools. It requires preparation, coordination, and leadership under pressure. This session introduces tabletop exercises as a proven way to test and strengthen organizational readiness. While not a full exercise, the workshop includes interactive elements where participants will explore the components of effective tabletop design, practice elements of facilitation, and learn how to spot process gaps. Attendees will leave with practical insights and strategies to confidently bring tabletop exercises back to their own organizations. Michael Homant, Chief Technology Officer & Deputy Chief Information Officer, Department of Innovation and Technology (DoIT), City of Detroit Gina Yacone, Advisory CISO, Trace3 |
12:00 pm Eastern |
Transition to Lunch |
12:15 pm Eastern |
Lunch BuffetDiamond Ballroom |
1:00 pm Eastern |
General Session - Offensive Cyber for a Stronger DefenseDiamond BallroomIn cybersecurity, defense alone is no longer sufficient. To truly safeguard systems and data, organizations must adopt an offensive mindset—thinking like the adversary and proactively seeking out vulnerabilities. This approach, through practices such as penetration testing, red teaming, and threat hunting, exposes blind spots and validates the effectiveness of security controls. By simulating real-world attacks and understanding the tools and tactics of attackers, security teams can identify weaknesses, strengthen incident response, and transform their posture from reactive to resilient. Leveraging offensive strategies not only uncovers risks but also empowers organizations to build a stronger, more proactive defense. Justin Palacios, Specialist Leader, GPS Cyber Risk, CISSP, Deloitte |
2:00 pm Eastern |
Networking Break in the Exhibit AreaAmethyst/Emerald |
2:30 pm Eastern |
Proceed to breakouts |
2:45 pm Eastern |
Concurrent SessionsAI vs. AI: Defending Against Malicious Autonomous AgentsLegacy 1As malicious autonomous AI agents emerge as new cyber threats, defending against AI-driven attacks requires advanced countermeasures powered by AI itself. This session examines the evolving battle between AI attackers and defenders, highlighting techniques for detecting, mitigating, and neutralizing hostile autonomous agents. Attendees will learn about cutting-edge AI defense strategies and the challenges of securing systems in an AI-versus-AI landscape. Greg Gogolin, Ph.D, CISSP, Professor/Director - Cybersecurity and Data Science, Ferris State University Justin Palacios, Specialist Leader, GPS Cyber Risk, CISSP, Deloitte Collaborative Cyber Crisis ManagementLegacy 2When a cyber incident strikes, a fragmented response can cause delays and confusion. This session highlights the need for a unified crisis management strategy that brings together IT, security, legal, and communications teams. Through expert insights and real-world examples, attendees will learn how to break down silos, strengthen collaboration, and build a resilient response plan that ensures fast, coordinated action in any cyber crisis. Shawn Ewing, MEP, PEM, Exercise Program Coordinator, Office of Infrastructure Protection, Michigan Department of Technology, Management and Budget Jeremy Hunt, CISSP, Cybersecurity Architect, Michigan Department of Technology, Management and Budget Brian Pillar, General Manager, Michigan Department of Technology, Management and Budget A Tsunami of Cyber-Enabled Scams: The US Must Raise Its DefensesLegacy 3Scam activity targeting individuals and organizations has surged, fueled by increasingly sophisticated tactics and international actors. This session will explore the evolving threat landscape, examine the impact on U.S. victims and losses, and highlight the primary attack methods being used. Attendees will also learn why some countries, such as Australia, are seeing progress in reducing scam losses, and what lessons can be applied in the United States. The discussion will conclude with the key steps needed to strengthen national defenses and protect citizens from this rising wave of cyber-enabled fraud. Ken Westbrook, Founder and CEO, Stop Scams Alliance Defending Critical Infrastructure: Best Practices for OT SecurityLegacy 5This presentation will focus on the evolving cybersecurity threats targeting operational technology (OT) environments within critical infrastructure sectors. Drawing on real-world attack scenarios and lessons learned from high-profile incidents impacting energy, water, transportation, and other essential services, the session will highlight emerging adversary tactics and common vulnerabilities in OT systems. Attendees will gain actionable best practices to strengthen defenses, enhance visibility and monitoring, and build resilience against disruptive cyberattacks. Amit Hammer, CEO, Salvador-Tech Challenges in Automotive CybersecurityLegacy 4As vehicles become more connected, the threat landscape continues to expand. This session explores emerging vulnerabilities across the automotive ecosystem from supply chain risks to attacks targeting keyless entry and advanced driver assistance systems (ADAS). Attendees will learn about evolving threats, real-world examples, and best practices for safeguarding vehicle software and data. Matt Carpenter, Cyber Reverse Engineer, iCR, Inc Jen Tisdale, Senior Director, North American Operations, Upstream Google Threat Intelligence (GTI) Capture the Flag: Cyber Skills ChallengeLegacy 7Put your cybersecurity knowledge to the test in this interactive, Google CTF (Capture the Flag) event. The CTF is designed to test and enhance skills relevant to understanding, tracking and mitigating cyber threats like ransomware. Participants will tackle challenges across categories such as Malware Analysis, Threat Actors, Tactics, Techniques, and Procedures (TTPs), and Vulnerability Exploitations. Must bring a charged device (laptop or tablet). Limited space available. Mansoor Raza, Customer Engineer, Security, Google Public Sector |
3:45 pm Eastern |
Transition to Closing Session |
4:00 pm Eastern |
Closing Session – Platinum PanelDiamond BallroomModerator: Art Thompson, Chief Information Officer, Department of Innovation and Technology, City of Detroit Michelle Checchi, Cloud Solution Architect, Microsoft Jim Hunter, Advisory CISO, Trace3 Joseph Spero, Principal Incident Response Consultant, Google Public Sector |
5:00 pm Eastern |
Networking Reception in the Exhibit AreaAmethyst/EmeraldNetwork with your colleagues and discuss technology solutions with the event exhibitors. |
5:30 pm Eastern |
End of ConferenceConference times, agenda, and speakers are subject to change. |
46100 Grand River Ave.
Novi, MI 48374
(248) 348-5600
Judy Asher
President
Michigan Council of Women in Technology
Daniel Ayala
Managing Partner
Secratic LLC
Jim Beechey
Executive Director - Security
CMS Energy
Jamie Bennett
Deputy Chief Security Officer
Department of Technology, Management & Budget
State of Michigan
Ralph Bolen
Director of Information Secuirty
MotorCity Casino Hotel
Caleb Buhs
Chief Deputy Director
Department of Technology, Management & Budget
State of Michigan
Jayson Cavendish
Director of Performance Management
Department of Technology, Management & Budget
State of Michigan
Laura Clark
Chief Information Officer
Department of Technology, Management & Budget
State of Michigan
Jim Coggin
IT Director/Business Relationship Manager
Department of Technology, Management & Budget
State of Michigan
Betsy Freeman
CEO, Radius Advisory Group
President, Synergist Mobility Acceleration
Synergist Mobility Acceleration
Heather Frick
Agency Services Director
Department of Technology, Management & Budget
State of Michigan
Tiziana Galeazzi
General Manager (AG, GOV, LEO, MDOT)
Department of Technology, Management & Budget
State of Michigan
Steven Herrin
Director, Information Protection and Security
DTE Energy
Jeff Hoffman
Detective Lieutenant
Michigan State Police; Michigan Cyber Command Center
State of Michigan
Charles Hoffmeyer
IT/IR Specialist
MI Cyber Command Center
Jamie Howell
Enterprise Portfolio Management Director
Department of Technology, Management & Budget
State of Michigan
Stephanie Jeppesen
State Administrative Manager, Business Services Unit, Cybersecurity and Infrastructure Protection
Department of Technology, Management & Budget
State of Michigan
Michelle McClish
Cybersecurity Local Partnerships
Department of Technology, Management & Budget
State of Michigan
Joseph McNerney
Major - Commander
USAF ANG 272 COS
Michigan Air National Guard 272 Command
Rex Menold
Chief Technology Officer
Department of Technology, Management & Budget
State of Michigan
Brian Pillar
IT Protect Delivery Officer
Department of Technology, Management & Budget
State of Michigan
Karen Rasche
Regional Program Coordinator
Michigan Council of Women in Technology
Andrew Sczgielski
Supervisory Special Agent
Cyber Criminal Squad, CY-16
FBI Detroit Cyber Task Force
Kayla Simon
Departmental & Communications Analyst
Department of Technology, Management & Budget
State of Michigan
Eric Swanson
Director CSS
Department of Technology, Management & Budget
State of Michigan
Sarah Tennant
Senior Sector Development Director & Cyber Advisory
Michigan Economic Develompent Corporation
MI Economic Development Corporation
Elyse Walter
Communications and Outreach Manager
Michigan Department of Labor and Economic Opportunity
Laura Wotruba
Communications Director
Department of Technology, Management & Budget
State of Michigan
Tammie Buehler
Client Director
Trace3
Kerry DeBano
Client Relationship Executive
Deloitte
James Keenan
Security Lead
SLED
Google
Miguel Mickey
Account Executive
Microsoft
Kyle O'Neill
Senior Account Executive
Amazon Web Services
Brian O'Sullivan
Technology Sales Leader
IBM
Michael Pierce
Major Account Manager
Fortinet
James Reilly
Major Account Manager
Trend Micro
Registration is open to professionals from the public, private and nonprofit sectors.
This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.
Registration Fees:
Local Government & nonprofit: $80
State of Michigan Employees: Free
College Students: $50*
*Students must register with school-issued email for verification
Private Sector & Business Professionals: $95
Need help registering, or have general event questions? Contact:
Jennifer Caldwell
Government Technology
A division of e.Republic
Phone: (916) 932-1345
E-mail: jcaldwell@erepublic.com
Already a sponsor, but need a hand? Reach out to:
Mireya Gaton
Government Technology
A Division of e.Republic
Phone: (916) 296-2617
E-mail: mgaton@erepublic.com
Want to sponsor and stand out? Reach out to explore opportunities!
Heather Earney
Government Technology
A Division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com