Michigan Cyber Summit 2025 Banner

Overview

The 14th Annual Michigan Cyber Summit brings together local and national thought leaders to help attendees stay ahead of the curve in preparing to defend, respond and recover from cyber threat actors. The State of Michigan has long been considered a national leader in cybersecurity, and this Summit facilitates conversations about leveraging generative AI in defense strategies, how federal resources can be part of your preparedness and response plans, the latest advancements in protecting both public and private interests. In partnership with the DTMB, Government Technology brings together a wide breadth of thought leaders for lively discussions that will help keep Michigan on the forefront of cyber defense.

A message from our Keynote Speaker

The 2025 Michigan Cyber Summit gives us the opportunity to connect with cybersecurity experts from across the globe on a variety of cybersecurity topics, including new and emerging technologies, pressing threats, and processes to better protect public and private sectors. The digital ecosystem is constantly changing, and we need to work together to better secure our data and strengthen Michigan’s cybersecurity posture. This event, now in its 14th year, promises to be the best summit yet.

- Laura Clark, Chief Information Officer, State of Michigan


We are excited to bring the Michigan Cyber Summit back to Novi for its 14th year. The event gives technology leaders from both the public and private sectors the opportunity to work together, discuss how to overcome common threats, and strategize about of the best way to collectively protect the people who live, work, play, and do business in our great state.

- Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management & Budget

Speakers

Bryce Austin

Bryce Austin

CEO, TCE Strategy

Bryce Austin started his technology career on a Commodore 64 computer and a cassette tape drive. Today he is a leading voice on technology and cybersecurity. Bryce holds a CISM certification, advises the boards of companies in a diverse array of industries, and has over 20 years of cybersecurity leadership experience. He is the named CISO (Chief Information Security Officer) for many companies, including one listed on the S&P 500.
Bryce speaks to audiences worldwide on how to stay safe from cybercriminals. The #1 goal of his presentation is for you to learn how to bring your cybersecurity risk to a level that is Secure Enough for you. His best-selling book is titled Secure Enough? 20 Questions on Cybersecurity for Business Owners and Executives.
In his free time, Bryce is a high-speed track driver and coach. He has driven cars from a 65 horsepower Mini Cooper to a 650 horsepower Porsche 911 Turbo. He has had over 100 students, none of whom have died while under his instruction.

More
Erik Avakian

Erik Avakian LinkedIn

Technical Counselor, Info-Tech Research Group  

Erik Avakian is former state chief information security officer for the Commonwealth of Pennsylvania. Erik has over 22 years enterprise experience in security and program management, strategy, service delivery, relationship management, cross-collaboration, program execution, and leading and mentoring teams.

More
Caleb Buhs

Caleb Buhs LinkedIn

Chief Deputy Director, Department of Technology, Management and Budget, State of Michigan 

Caleb Buhs serves as the chief deputy director for the Michigan Department of Technology, Management & Budget (DTMB), a position he was appointed to in 2023. In his role, Buhs directs the business and administrative operations for the agency of 2,800 employees, who provide information technology, business, and administrative services to Michigan residents, businesses, state agencies, state employees, and retirees.
Driven by a passion for public service, Buhs has spent nearly two decades working to improve government services for the benefit of all Michiganders. As a member of DTMB’s leadership team, he helps foster a culture of engaged employees to ensure the delivery of outstanding customer service, areas in which DTMB has consistently exceeded national benchmarks.
Buhs began his public service career with the State of Michigan in 2004 and has served as the public information officer and economic development advisor for the Department of Insurance and Financial Service, deputy press secretary for the governor, and communications specialist for the Department of Treasury.  Prior to being named chief deputy director, he served more than eight years as the communications director for DTMB.
Buhs holds a bachelor’s degree in integrative public relations from Central Michigan University. He maintains an active presence in his community, serving as a school board member for Charlotte Public Schools, including two terms as president, and having coached numerous youth sports teams.

More
Nic Cantu

Nic Cantu LinkedIn

Sr. Solutions Engineer, Trend Micro

Michelle Checchi

Michelle Checchi

Cloud Solution Architect, Microsoft

With over 25 years of dedicated experience in the field of cybersecurity, Michelle specializes in Data Security and the implementation of Microsoft Purview solutions. Michelle’s career has spanned state and local government agencies, government contractors, and the finance industry, enabling her to develop a deep understanding of the unique challenges and evolving threats faced by public and private sector organizations. Michelle is passionate about helping organizations safeguard their critical information assets, ensure regulatory compliance, and build resilient security frameworks. Her expertise includes developing robust data protection strategies, leading security awareness initiatives, and optimizing information governance using cutting-edge technologies.

More
Laura Clark

Laura Clark

Chief Information Officer, Department of Technology, Management & Budget ("DTMB"), State of Michigan

Laura Clark serves as the chief information officer (CIO) for the State of Michigan, directing the state’s technology and security efforts. As deputy director for the Michigan Department of Technology, Management & Budget (DTMB), she also oversees operations for the department, which provides information technology, business, and administrative services to state employees and stakeholders, as well as Michigan residents, visitors, and businesses.
During her 20-year career in public service, Clark has embraced a hands-on, adaptable approach to leadership. Since being appointed as CIO by Gov. Gretchen Whitmer, she has helped the State of Michigan achieve success through many initiatives, such as the launch of the award-winning Michigan Secure mobile app and successfully securing $20 million in critical cybersecurity funding from the Michigan Legislature for statewide security enhancements.
In her day-to-day work, Clark values the contributions of every person on DTMB’s 5,000 member team and has the unique ability to connect her sense of purpose and service with the overall work and mission of directing the State of Michigan’s technology and security efforts. She leads by example, seeking out opportunities that will allow those around her to succeed. Throughout these efforts, Clark’s compassion, patience, experience, and skills as are helping DTMB and the entire state forge a successful path into the digital future.

More
Brad Dispensa

Brad Dispensa

Principal Security and Compliance Specialist, Amazon Web Services

Brad is a principal security and compliance specialist for Amazon Web Services supporting customers globally in the worldwide public sector group. Brad works as subject matter expert in the AWS security group and specializes in security and compliance-based workloads.

More
Shawn Ewing, MEP, PEM

Shawn Ewing, MEP, PEM

Exercise Program Coordinator, Office of Infrastructure Protection, Michigan Department of Technology, Management & Budget

Shawn Ewing serves as the Exercise Program Coordinator for the Michigan Department of Technology, Management, and Budget (DTMB), bringing more than two decades of experience in  emergency management and cybersecurity. A U.S. Army veteran with two combat deployments, Shawn applies a mission-focused mindset to crisis preparedness and response. He has led numerous state-level exercises, including Michigan’s 2019 functional exercise of the Cyber Disruption Response Plan. Following the plan’s 2024 update, Shawn is spearheading a new series of exercises to test and strengthen cross-agency coordination, ensuring that IT, security, legal, and communications teams can respond with speed and unity during cyber crises. His work emphasizes breaking down silos and fostering collaboration across government and private-sector partners to build resilience against evolving threats.

More
Greg Gogolin, Ph.D, CISSP

Greg Gogolin, Ph.D, CISSP

Professor/Director - Cybersecurity and Data Science, Ferris State University

Dr. Gogolin is the Director of Cybersecurity & Data Science and a Distinguished Professor at Ferris State University. He holds a Ph.D. from Michigan State University, post graduate certificates in Artificial Intelligence from Purdue and the University of Texas at Austin, and multiple certifications including CISSP. He is a two-time Fulbright Scholar and the author of the Information Security & Intelligence undergraduate and graduate degrees as well as the undergraduate Artificial Intelligence degree at Ferris State. Dr. Gogolin has authored many journal articles and books in digital forensics and cybersecurity, as well as presented at dozens of conferences. His research has been cited in the United States Supreme Court. He has taught on four continents and worked with law enforcement agencies in multiple countries on computer crime casework while also providing digital forensic investigator training. Dr. Gogolin worked in the Information Technology field for about 15 years for multibillion dollar international corporations prior to becoming a professor at Ferris State University.

More
Amit Hammer

Amit Hammer LinkedIn

CEO, Salvador-Tech

Amit Hammer is the CEO of Salvador-Tech and a recognized leader in Operational Technology and Industrial Control Systems cyber resilience. With over 20 years of leadership in defense, semiconductors, AI, and energy, he brings deep expertise in securing critical infrastructure. He began his career as an officer in an elite intelligence R&D unit, later holding global leadership roles at Texas Instruments in IoT and wireless connectivity. He went on to lead Neura, an AI and big data company, through its acquisition by Otonomo, and later drove major operational programs at SolarEdge. Today at Salvador-Tech, Amit leads the mission to eliminate downtime in OT environments, helping organizations achieve true cyber resilience and operational continuity.

More
Thomas J. Holt, Ph. D.

Thomas J. Holt, Ph. D. LinkedIn

Professor, Director of Masters Degree Programs, Director of the Center for Cybercrime Investigation and Training, School of Criminal Justice, Michigan State University 

Thomas J. Holt is a professor in the School of Criminal Justice and Director of the Center for Cybercrime Investigation and Training at Michigan State University.  His research focuses on all manner of cybercrime and deviance, and the policy responses to these problems.  He has authored mutliple textbooks on the topic of cybercrime, cyberterrorism, and policing, and has published in journals such as the British Journal of Criminology, Criminology & Public Policy, and Journal of Criminal Justice.  Dr. Holt's work has been funded by various federal and national agencies in the US, Australia, and the Netherlands.  He is also a regular speaker at academic and practitioner conferences around the world.  Lastly, he is the co-host of the podcast "Crossing the Firewall," focusing on cybercrime and cybersecurity issues.  

More
Jeremy Hunt, CISSP

Jeremy Hunt, CISSP LinkedIn

Cybersecurity Architect, Michigan Department of Technology, Management and Budget

Jeremy currently serves as the State of Michigan’s Security Operation Center (MiSOC) Emergency Coordination Center liaison, working together with SOM Emergency Management staff to ensure fluid and coordinated escalation of cyber incidents into the State’s emergency management procedures. Previously, Jeremy held cybersecurity roles in the private sector in Higher Education and Financial Services, focusing on the development of Incident Response teams, plans, and training.

More
Jim Hunter

Jim Hunter

Advisory CISO, Trace3

Brian Jennings, PMP, BRMP, GRC

Brian Jennings, PMP, BRMP, GRC LinkedIn

Compliance, Audit, and Cybersecurity Evangelist, Michigan Department of Technology, Management and Budget

Brian has spent many years as an information technology leader and consultant with extensive and diverse experience in cybersecurity, project management, Information Technology (IT) management, infrastructure, application development, desktop support, training delivery, proposal development, customer service and testing. He has also led process and quality improvement initiatives and focuses on customer satisfaction. He is passionate about everything he does and has a reputation as a results-driven, “out of the box thinker” and problem solver.
Brian holds his Project Management Professional (PMP) certification from the Project Management Institute (PMI) and a Business Relationship Management Professional (BRMP®) certification from the Business Relationship Management Institute.
In his spare time Brian is a beekeeper and maintains the local bee club’s website. He also enjoys low light photography such as eclipses, aurora borealis, and nightscapes.

More
Stephanie Jeppesen

Stephanie Jeppesen

State Administrative Manager, Cybersecurity and Infrastructure Protection, Michigan Department of Technology, Management and Budge

Stephanie Jeppesen serves as the Business Services Manager for Cybersecurity and Infrastructure Protection (CIP) at the Department of Technology, Management & Budget (DTMB). With over 20 years of experience in healthcare administration and state government, Stephanie brings a wealth of knowledge and leadership to her role.
Throughout her career, she has excelled in support services, project management, financial and budget analysis, and contract portfolio management. As the leader of the Business Services work area within CIP, Stephanie oversees a wide range of operational functions, including financial management and analysis, staff onboarding and offboarding coordination, asset management, data analytics, external engagements, communications, project support, and purchasing coordination.
Stephanie and her team are committed to delivering high-quality internal services with a focus on consistency, efficiency, and eliminating operational pain points. Her team’s dedication to continuous improvement makes them key contributors to CIP’s success.

More
Brian Kaselak

Brian Kaselak

Director of Systems Engineering, Public Sector, Fortinet  

Brian Kaselak is the Engineering Director for Fortinet and a frequent speaker at cyber security focused events. For the past twenty-one years, Brian has worked in the IT security industry in both sales and implementation of solutions ranging from Endpoint to Cloud. His current position brought him back to technical sales, evangelizing the importance of a security fabric in order to protect your environment in an ever-changing world.

More
Andrew Mason

Andrew Mason LinkedIn

IT General Manager, Department of Technology, Management and Budget, State of Michigan

Andrew Mason is a seasoned Information Technology Executive with more than a decade of experience leading large-scale IT initiatives across multiple State of Michigan agencies. As an IT General Manager at DTMB, he oversees delivery of IT systems and services for Agencies including the Michigan Department of State (MDOS), Licensing and Regulatory Affairs (LARA), the Department of Insurance and Financial Services (DIFS) and the Michigan Lottery.  Andrew is a recognized leader in managing large teams and resources with a proven track record of leading the delivery of secure, scalable solutions that align with both mission-critical needs and regulatory standards. He brings deep insight into the intersection of cybersecurity and IT operations, making him a fitting moderator for the session "Cybersecurity Has an IT Problem."

More
Ryan McVicar

Ryan McVicar

Incident Response Lead, Michigan Security Operations Center (MiSOC), State of Michigan

Justin Palacios

Justin Palacios

Specialist Leader, GPS Cyber Risk, CISSP, Deloitte

Justin is a  Specialist Leader at Deloitte, with 20+ years of service and experience within the DoD, and Intelligence Community participating in advanced Red Team activities.
Dynamic Adversary Intelligence Lead, responsible for developing advanced behavioral analytics of Net-flow data records and open source intelligence to identify malware, advanced persistent threats, malicious, and anomalous activity.
Leading teams using and developing AI and GenAI based analytics to detect anomalous network activity, autonomously collect threat intelligence, and map adversarial infrastructure to deliver real time intelligence to security operations teams to assist with defending and hardening their attack surface. 

More
Joseph Spero

Joseph Spero

Principal Incident Response Consultant, Google Public Sector

Joseph Spero is a Principal Incident Response Consultant on the Google Public Sector Incident Response team, primarily responsible for leading technical investigations for intrusions into Government and Education sector client environments. Grounded in dual Bachelor of Science degrees in Criminal Justice Sciences and Cyber Security, his career features deep, hands-on experience across Digital Forensics, Incident Response, Threat Intelligence, and offensive security disciplines. Joseph employs a profound understanding of criminal and nation-state adversaries in the cyber defense of US national security and private organizations.
Joseph has held analyst roles within organizations ranging from start-ups to Fortune 100 across the Financial, Healthcare, Life Sciences, Fintech, and Technology industries. Prior to joining Google in 2023, he was an incident responder with IBM X-Force, contributing research to the Security Intelligence blog on topics including AlphV ransomware and Active Directory Certificate Services (ADCS) attacks. He holds the GPEN, GCFA, GNFA, and GCFR certifications.

More
Doug Start

Doug Start LinkedIn

Director of Information Technology, City of Grand Rapids

Doug Start is a seasoned IT executive dedicated to leveraging technology for transformative impact. He began his career as an educator in hardware repair, computer programming, and web design, laying the foundation for his advancement through the ranks of IT to become the Director of Instructional Technology for Grand Haven Area Public Schools.  
Currently, Doug is the Director of Technology for the City of Grand Rapids, where he focuses on developing a sustainable and resilient IT program. His recent efforts include development of the City’s AI strategy, fortifying the City's IT security infrastructure and promoting the IT department as a strategic partner, rebranding it as the Department of "Yes If...". 
Doug holds a Bachelor of Science in Education and a Master of Arts in Educational Technology from Western Michigan University. He is also a Certified Government Chief Information Officer (CGCIO) through the University of North Carolina School of Government.  
Outside of work, Doug enjoys spending quality time with his family, golfing, and cooking. 

More

Jen Tisdale

Senior Director, North American Operations, Upstream

Jennifer Tisdale is the Senior Director, Strategic Engagements, North America for Upstream a data analytics company focused on data management for the automotive industry focused on cybersecurity, product quality, and reducing recall costs. Jennifer is an experienced mobility professional who has built a reputation for helping organizations address critical challenges from strengthening vehicle and fleet cybersecurity to improving product quality, reducing recall costs, and delivering safer, more trusted customer experiences.
Jennifer previously served as CEO of GRIMM Cyber, where she guided the company’s strategic vision to focus on Cyber-Physical Systems security across all modalities of mobility and critical infrastructure more than doubling the company’s portfolio in her first two years. Before that, Jennifer led R&D Product Security at Mazda North America, establishing and scaling programs to safeguard connected vehicle technologies while working closely with global engineering teams to embed security into product design and development.
Prior to her time at Mazda, Jennifer developed the first economic strategy for the State of Michigan focused on cybersecurity, with an emphasis on advancing the state’s automotive, defense, and aerospace industries. This groundbreaking work connected public and private stakeholders and laid the foundation for regional growth in cybersecurity innovation and workforce development.
Beyond her corporate leadership, Jennifer serves on the Board of Directors for the National Defense Industrial Association (NDIA) Michigan. In this role, she leads strategic partnerships and cybersecurity initiatives, fostering stronger collaboration between the automotive industry, defense sector, and government stakeholders.
Known for her collaborative style and ability to bridge technical complexity with business priorities, Jennifer blends industry insight with hands-on leadership experience. Her career reflects a consistent focus on delivering strategies that make mobility smarter, safer, and more resilient.

More
Art Thompson

Art Thompson

Chief Information Officer, Department of Innovation and Technology, City of Detroit

In 2021, Mayor Mike Duggan tapped Art Thompson to be the next Chief Information Officer for the City of Detroit, making him the City’s youngest CIO in history at age 34. Thompson has had many great accomplishments since stepping into his current role - including leading the technical security, cybersecurity and technology for the largest NFL draft in history in 2024, as well as successfully maintaining a balanced budget of $61M+ annually for the Department of Innovation and Technology (DoIT).
Prior to becoming CIO, Thompson served as the Director of Public Safety and Cyber Security for DoIT, where he led the implementation of the City’s first police body camera program. He has over sixteen years of technical experience in IT management and operations. He is a graduate of Eastern Michigan University with a degree in Supply Chain Management and holds a Certificate in Cybersecurity from Harvard University.

More

Clay Taylor

Principal PM Architect for Microsoft Intune

Clay Taylor is a Principal PM Architect in the Microsoft Intune Product Group.  His main focus areas are Zero Trust security and cross-platform device management. 

More
Ken Westbrook

Ken Westbrook

Founder and CEO, Stop Scams Alliance 

[LinkedIn:https://www.linkedin.com/in/kennethwestbrook/

Ken Westbrook is Founder and CEO of Stop Scams Alliance, a nonprofit whose mission is to significantly reduce scams in the United States through a comprehensive, systemic approach involving public-private partnership and cross-sector cooperation from technology, telecom, financial institutions, consumer advocacy groups, and government. The focus is to stop scams at the source, before they reach the consumer in the first place.
Ken served as an executive in the Intelligence Community (IC), specializing in analysis and information management. He received numerous IC awards and subsequently held senior positions with two Fortune 500 software firms, co-invented a patented security technology, and created and taught a course in Information Management at Georgetown University.

More
Gina Yacone

Gina Yacone

Advisory CISO at Trace3

Gina holds the position of Advisory Chief Information Security Officer (CISO) at Trace3, focusing on the Mountain State Region and resides in Denver, Colorado. Her role includes advising senior security leaders on emerging trends in cybersecurity, identifying and addressing security gaps, developing robust defense mechanisms, and implementing targeted, advanced security measures to protect critical digital information. Additionally, Gina leads compliance efforts within her region and provides virtual CISO (vCISO) services to two organizations. Gina received several prestigious honors, including Cybersecurity Woman of the Year 2024, LinkedIn Top Security Voice, recognition as one of the Top 9 vCISO Influencers of 2024, and a spot among the Top 20 Women of the World.
As a firm believer in continuous professional development and active community engagement, Gina earned a master’s degree in Cybersecurity from the University of New Hampshire’s School of Engineering, and is highly regarded figure in cybersecurity, she has spoken at over 150 conferences and/or events and is an active member of several industry organizations, including the Colorado Technology Association (CTA), InfraGard, ISSA, ISACA, and Women in Cybersecurity (WiCyS). Gina currently serves as Vice President of ISSA Denver, which is the 3rd largest ISSA chapter in the world.

More
View Speakers

Agenda

Thursday, October 23

8:00 am Eastern

Registration and Morning Refreshments in the Exhibit Area

Amethyst/Emerald

9:00 am Eastern

Welcome and Event Opening Ceremonies

Diamond Ballroom

Includes the National Anthem and the presentation of the colors by the Michigan State Police Color Guard.

Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management and Budget

9:10 am Eastern

Keynote – Keep Your Head Out of the Cyber Sand: Using Superior Communications to Get the Job Done!

Diamond Ballroom

Risk can take on many forms and governments must understand how to accept it, mitigate it, or insure against it while not sticking their head in the sand to ignore it. How will you assess your cyber risks and balance them against your needs? How will you make the rational decisions needed to be successful? How will you navigate the road to recovery? This session will answer these questions with a focus on ideas that will help you engage your leaders with real-world examples.

Bryce Austin, CEO, TCE Strategy

10:10 am Eastern

What’s Next

Diamond Ballroom

Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management and Budget

10:15 am Eastern

Networking Break in the Exhibit Area

Amethyst/Emerald

10:45 am Eastern

Proceed to breakouts

11:00 am Eastern

Concurrent Sessions

Agentic AI Meets Cyber Defense: The Next Frontier in Security

Legacy 2

Agentic AI—AI systems capable of autonomous decision-making—is redefining the cybersecurity landscape. This session explores how cutting-edge agentic AI is being used to detect, respond to, and even predict cyber threats in real time.

Attendees will gain insight into the opportunities and risks of integrating agentic AI into defense strategies, including threat hunting, adaptive response, and autonomous mitigation. Join us to discover how this transformative technology is shaping the future of cyber defense—and how to stay ahead of the curve.

Dave McGinnis, Global Partner, Cyber Threat Management, IBM

Preparedness & Crisis Readiness in an AI-Driven Threat Landscape

Legacy 1

As AI accelerates the speed and sophistication of cyber threats, traditional defense models are no longer enough. This session explores how organizations can build true crisis readiness—anticipating advanced perceived threats before they strike. Learn how to adapt your cybersecurity strategy for an AI-enabled world, enhance threat perception, and strengthen decision-making under pressure. Designed for leaders and defenders alike, this session will equip you to stay ahead of emerging risks and respond with confidence.

Nic Cantu, Sr. Solutions Engineer, Trend Micro

Thomas J. Holt, Ph. D., Professor, Director of Masters Degree Programs, Director of the Center for Cybercrime Investigation and Training, School of Criminal Justice, Michigan State University

Cybersecurity Has an IT Problem

Legacy 4

Strong cybersecurity begins with strong information technology. This session will explore the foundational relationship between cybersecurity and IT architecture, emphasizing that effective security cannot exist in isolation from well-managed, modern, and resilient IT systems. From asset inventory and network visibility to patch management and access controls, cybersecurity outcomes are only as strong as the IT environments in which they operate. Public sector organizations often struggle with legacy infrastructure, fragmented systems, and under-resourced IT teams—all of which create systemic vulnerabilities.

Moderator: Andrew Mason, IT General Manager, Department of Technology, Management and Budget, State of Michigan

Brad Dispensa, Principal Security and Compliance Specialist, Amazon Web Services

Brian Jennings, PMP, BRMP, GRC, Compliance, Audit, and Cybersecurity Evangelist, Michigan Department of Technology, Management and Budget

Karthik Narayanan, Information Technology Specialist, Michigan Department of Technology, Management and Budget

Doug Start, Director of Information Technology, City of Grand Rapids

The People Problem + Social Engineering

Legacy 3

Social engineering in 2025 is turbocharged by AI-powered deception techniques that exploit human psychology with unprecedented precision. This session uncovers how attackers use advanced AI tools to craft personalized, convincing attacks—and how understanding human behavior can turn the tide in your defense. Through real-world examples and innovative strategies, attendees will learn how to detect, disrupt, and defend against next-generation social engineering threat

Kevin Hayes, CISSP, CISM, Chief Information Security Officer, Merit Network

Ryan McVicar, Incident Response Lead, Michigan Security Operations Center (MiSOC), State of Michigan

Kalil Olsen, Security Analyst, Michigan Security Operations Center (MiSOC), State of Michigan

Optimizing Cybersecurity Operations in Tight Budget Cycles

Legacy 7

In a time of rising demands and fixed budgets, public sector leaders are being challenged to do more—with less. How can organizations prioritize cybersecurity effectively, drive efficiency, and still deliver meaningful results? This session explores how to identify and make the most of available resources by streamlining operations, optimizing existing tools, and fostering cross-functional collaboration and sharing services. Expect real-world insights around high-impact priorities and selecting the right people, tools, technologies, and services to move forward.

Moderator: Stephanie Jeppesen, State Administrative Manager, Cybersecurity and Infrastructure Protection, Michigan Department of Technology, Management and Budget

Erik Avakian, Technical Counselor, Info-Tech Research Group

Andrew Dold, Chief Information Security Officer, City of Detroit

Brian Kaselak, Director of Systems Engineering, Public Sector, Fortinet

Zero Trust in Action: Building Your Roadmap

Legacy 5

Zero Trust has become a cornerstone of modern cybersecurity, but turning the framework into action can be daunting. In this interactive workshop, participants will explore the Microsoft Zero Trust Workshop tool to create a customized roadmap, measure progress, and integrate identity and device protections into their environments. Attendees will gain practical insight into how modern endpoint management and security suites can strengthen defenses, enable cross-team collaboration, and accelerate adoption of Zero Trust principles.

Clay Taylor, Principal PM Architect for Microsoft Intune

Strengthening Readiness with Tabletop Exercises

Legacy 6

Responding to ransomware and other cyber incidents takes more than the right tools. It requires preparation, coordination, and leadership under pressure. This session introduces tabletop exercises as a proven way to test and strengthen organizational readiness. While not a full exercise, the workshop includes interactive elements where participants will explore the components of effective tabletop design, practice elements of facilitation, and learn how to spot process gaps. Attendees will leave with practical insights and strategies to confidently bring tabletop exercises back to their own organizations.

Michael Homant, Chief Technology Officer & Deputy Chief Information Officer, Department of Innovation and Technology (DoIT), City of Detroit

Gina Yacone, Advisory CISO, Trace3

12:00 pm Eastern

Transition to Lunch

12:15 pm Eastern

Lunch Buffet

Diamond Ballroom

1:00 pm Eastern

General Session - Offensive Cyber for a Stronger Defense

Diamond Ballroom

In cybersecurity, defense alone is no longer sufficient. To truly safeguard systems and data, organizations must adopt an offensive mindset—thinking like the adversary and proactively seeking out vulnerabilities. This approach, through practices such as penetration testing, red teaming, and threat hunting, exposes blind spots and validates the effectiveness of security controls. By simulating real-world attacks and understanding the tools and tactics of attackers, security teams can identify weaknesses, strengthen incident response, and transform their posture from reactive to resilient. Leveraging offensive strategies not only uncovers risks but also empowers organizations to build a stronger, more proactive defense.

Justin Palacios, Specialist Leader, GPS Cyber Risk, CISSP, Deloitte

2:00 pm Eastern

Networking Break in the Exhibit Area

Amethyst/Emerald

2:30 pm Eastern

Proceed to breakouts

2:45 pm Eastern

Concurrent Sessions

AI vs. AI: Defending Against Malicious Autonomous Agents

Legacy 1

As malicious autonomous AI agents emerge as new cyber threats, defending against AI-driven attacks requires advanced countermeasures powered by AI itself. This session examines the evolving battle between AI attackers and defenders, highlighting techniques for detecting, mitigating, and neutralizing hostile autonomous agents. Attendees will learn about cutting-edge AI defense strategies and the challenges of securing systems in an AI-versus-AI landscape.

Greg Gogolin, Ph.D, CISSP, Professor/Director - Cybersecurity and Data Science, Ferris State University

Justin Palacios, Specialist Leader, GPS Cyber Risk, CISSP, Deloitte

Collaborative Cyber Crisis Management

Legacy 2

When a cyber incident strikes, a fragmented response can cause delays and confusion. This session highlights the need for a unified crisis management strategy that brings together IT, security, legal, and communications teams. Through expert insights and real-world examples, attendees will learn how to break down silos, strengthen collaboration, and build a resilient response plan that ensures fast, coordinated action in any cyber crisis.

Shawn Ewing, MEP, PEM, Exercise Program Coordinator, Office of Infrastructure Protection, Michigan Department of Technology, Management and Budget

Jeremy Hunt, CISSP, Cybersecurity Architect, Michigan Department of Technology, Management and Budget

Brian Pillar, General Manager, Michigan Department of Technology, Management and Budget

A Tsunami of Cyber-Enabled Scams: The US Must Raise Its Defenses

Legacy 3

Scam activity targeting individuals and organizations has surged, fueled by increasingly sophisticated tactics and international actors. This session will explore the evolving threat landscape, examine the impact on U.S. victims and losses, and highlight the primary attack methods being used. Attendees will also learn why some countries, such as Australia, are seeing progress in reducing scam losses, and what lessons can be applied in the United States. The discussion will conclude with the key steps needed to strengthen national defenses and protect citizens from this rising wave of cyber-enabled fraud.

Ken Westbrook, Founder and CEO, Stop Scams Alliance

Defending Critical Infrastructure: Best Practices for OT Security

Legacy 5

This presentation will focus on the evolving cybersecurity threats targeting operational technology (OT) environments within critical infrastructure sectors. Drawing on real-world attack scenarios and lessons learned from high-profile incidents impacting energy, water, transportation, and other essential services, the session will highlight emerging adversary tactics and common vulnerabilities in OT systems. Attendees will gain actionable best practices to strengthen defenses, enhance visibility and monitoring, and build resilience against disruptive cyberattacks.

Amit Hammer, CEO, Salvador-Tech

Challenges in Automotive Cybersecurity

Legacy 4

As vehicles become more connected, the threat landscape continues to expand. This session explores emerging vulnerabilities across the automotive ecosystem from supply chain risks to attacks targeting keyless entry and advanced driver assistance systems (ADAS). Attendees will learn about evolving threats, real-world examples, and best practices for safeguarding vehicle software and data.

Matt Carpenter, Cyber Reverse Engineer, iCR, Inc

Jen Tisdale, Senior Director, North American Operations, Upstream

Google Threat Intelligence (GTI) Capture the Flag: Cyber Skills Challenge

Legacy 7

Put your cybersecurity knowledge to the test in this interactive, Google CTF (Capture the Flag) event. The CTF is designed to test and enhance skills relevant to understanding, tracking and mitigating cyber threats like ransomware. Participants will tackle challenges across categories such as Malware Analysis, Threat Actors, Tactics, Techniques, and Procedures (TTPs), and Vulnerability Exploitations.

Must bring a charged device (laptop or tablet). Limited space available.

Mansoor Raza, Customer Engineer, Security, Google Public Sector

3:45 pm Eastern

Transition to Closing Session

4:00 pm Eastern

Closing Session – Platinum Panel

Diamond Ballroom

Moderator: Art Thompson, Chief Information Officer, Department of Innovation and Technology, City of Detroit

Michelle Checchi, Cloud Solution Architect, Microsoft

Jim Hunter, Advisory CISO, Trace3

Joseph Spero, Principal Incident Response Consultant, Google Public Sector

5:00 pm Eastern

Networking Reception in the Exhibit Area

Amethyst/Emerald

Network with your colleagues and discuss technology solutions with the event exhibitors.

5:30 pm Eastern

End of Conference

Conference times, agenda, and speakers are subject to change.

Suburban Collection Showplace

46100 Grand River Ave.
Novi, MI 48374
(248) 348-5600

Get Directions To
Suburban Collection Showplace

Advisory Board

Government Representatives

Judy Asher
President
Michigan Council of Women in Technology

Daniel Ayala
Managing Partner
Secratic LLC

Jim Beechey
Executive Director - Security
CMS Energy

Jamie Bennett
Deputy Chief Security Officer
Department of Technology, Management & Budget
State of Michigan

Ralph Bolen
Director of Information Secuirty
MotorCity Casino Hotel

Caleb Buhs
Chief Deputy Director
Department of Technology, Management & Budget
State of Michigan

Jayson Cavendish
Director of Performance Management
Department of Technology, Management & Budget
State of Michigan

Laura Clark
Chief Information Officer
Department of Technology, Management & Budget
State of Michigan

Jim Coggin
IT Director/Business Relationship Manager
Department of Technology, Management & Budget
State of Michigan

Betsy Freeman
CEO, Radius Advisory Group
President, Synergist Mobility Acceleration
Synergist Mobility Acceleration

Heather Frick
Agency Services Director
Department of Technology, Management & Budget
State of Michigan

Tiziana Galeazzi
General Manager (AG, GOV, LEO, MDOT)
Department of Technology, Management & Budget
State of Michigan

Steven Herrin
Director, Information Protection and Security
DTE Energy

Jeff Hoffman
Detective Lieutenant
Michigan State Police; Michigan Cyber Command Center
State of Michigan

Charles Hoffmeyer
IT/IR Specialist
MI Cyber Command Center

Jamie Howell
Enterprise Portfolio Management Director
Department of Technology, Management & Budget
State of Michigan

Stephanie Jeppesen
State Administrative Manager, Business Services Unit, Cybersecurity and Infrastructure Protection
Department of Technology, Management & Budget
State of Michigan

Michelle McClish
Cybersecurity Local Partnerships
Department of Technology, Management & Budget
State of Michigan

Joseph McNerney
Major - Commander
USAF ANG 272 COS
Michigan Air National Guard 272 Command

Rex Menold
Chief Technology Officer
Department of Technology, Management & Budget
State of Michigan

Brian Pillar
IT Protect Delivery Officer
Department of Technology, Management & Budget
State of Michigan

Karen Rasche
Regional Program Coordinator
Michigan Council of Women in Technology

Andrew Sczgielski
Supervisory Special Agent
Cyber Criminal Squad, CY-16
FBI Detroit Cyber Task Force

Kayla Simon
Departmental & Communications Analyst
Department of Technology, Management & Budget
State of Michigan

Eric Swanson
Director CSS
Department of Technology, Management & Budget
State of Michigan

Sarah Tennant
Senior Sector Development Director & Cyber Advisory
Michigan Economic Develompent Corporation
MI Economic Development Corporation

Elyse Walter
Communications and Outreach Manager
Michigan Department of Labor and Economic Opportunity

Laura Wotruba
Communications Director
Department of Technology, Management & Budget
State of Michigan

Industry Representatives

Tammie Buehler
Client Director
Trace3

Kerry DeBano
Client Relationship Executive
Deloitte

James Keenan
Security Lead
SLED
Google

Miguel Mickey
Account Executive
Microsoft

Kyle O'Neill
Senior Account Executive
Amazon Web Services

Brian O'Sullivan
Technology Sales Leader
IBM

Michael Pierce
Major Account Manager
Fortinet

James Reilly
Major Account Manager
Trend Micro

Registration Information / Contact Us

Event Date: October 23, 2025

Contact Information

Registration is open to professionals from the public, private and nonprofit sectors.

This event is open to all individuals who meet the eligibility criteria, without regard to race, color, religion, gender, gender identity, age, disability, or any other protected class. We are committed to fostering an inclusive and welcoming environment for all participants.


Registration Fees:
Local Government & nonprofit: $80

State of Michigan Employees: Free

College Students: $50*
*Students must register with school-issued email for verification

Private Sector & Business Professionals: $95

Need help registering, or have general event questions? Contact:

Jennifer Caldwell
Government Technology
A division of e.Republic
Phone: (916) 932-1345
E-mail: jcaldwell@erepublic.com

Already a sponsor, but need a hand? Reach out to:

Mireya Gaton
Government Technology
A Division of e.Republic
Phone: (916) 296-2617
E-mail: mgaton@erepublic.com

Want to sponsor and stand out? Reach out to explore opportunities!

Heather Earney
Government Technology
A Division of e.Republic
Phone: (916) 365-2308
E-mail: heather.earney@erepublic.com

Venue

Suburban Collection Showplace

46100 Grand River Ave.
Novi, MI 48374
(248) 348-5600

Show More

Room Block

Room Rate: $250/night, single/double.
Rate Cut-off Date: Monday, September 22, 2025.
To Make a Reservation:
Phone: (800) 233-1234 and reference the Michigan Cyber Summit.
Online: Group Reservation Link, use the Group Code: G-MCSA. Make sure to include G when entering the code. If you experience issues booking online, call the hotel directly for assistance.

Rooms are on a first-come, first-served basis. Please note, once the room block is full, you will need to make other arrangements for your accommodation with the hotel directly or a nearby hotel. 

Map and Directions

https://www.suburbancollectionshowplace.com/directions-parking

Event Parking

Self-parking: Free self-parking available.

Instructions: To park, enter at the traffic light off Grand River Ave and stay to the left at the fork in the road and follow past the Diamond circle driveway and the parking lot is on the left. Enter the building through the “Diamond Entrance”.