Premier Cybersecurity Conference

GPSEC brings together C-level executives, security engineers, consultants, and industry-leading vendors into a 1-day, intimate, and interactive format.

All in-person events are designed to inform and educate attendees with practical information on solving complex cybersecurity challenges.

GPSEC Agenda Topics Include:

  • Application Security
  • Cloud Security
  • Insider Threat
  • Zero Trust

  • Identity & Access Management
  • Endpoint and Network Security
  • Governance, Risk & Compliance
  • and MUCH MORE!

Find GPSEC Cybersecurity Events Near You!

Omaha, NE

February 27th, 2025
Venue: Embassy Suites – La Vista

Raleigh, NC

March 7, 2025
Venue: TBD

Boston Skyline

Boston, MA

March 20, 2025
Gillette Stadium

Tysons, VA

April 3, 2025

New York, NY

April 22, 2025

Chicago, IL

April 24, 2025

St.Louis, MO

May 2025

Atlanta Skyline

Atlanta, GA

June 2025

Orlando, FL

September 2025

Public Sector

October 2025

Dallas, TX

October 2025

Philadelphia City

Philadelphia, PA

November 2025

Examples of Keynote Speakers

Joseph Menn, The Washington Post | LinkedIn

Joseph Menn has been a professional journalist for three decades, specializing in technology stories since 1999. My most recent book, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, was published in June 2019 and named one of the best 10 nonfiction works of the year by Hudson Booksellers. Inducted into the Cybersecurity Canon Hall of Fame, the Wall Street Journal named it one of the all-time “Five Cybersecurity Books That Everyone Should—and Can—Read.” The New York Times Book Review said: “The tale of this small but influential group is a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age.”

Barrett Lyon, Co-Founder at Netography | LinkedIn

Barrett Lyon is the co-founder and Chief Architect of Netography. He is the former founder and CTO of Defense.Net, a cloud-based DDoS mitigation network that was acquired by F5 Networks. Prior to Defense.Net, Lyon was Co-founder and CTO of BitGravity, a content delivery network (CDN) that was acquired by Tata Communications. Early in his career, Lyon was the founder and CTO of Prolexic Technologies where he created the first successfully managed service to defend enterprises from DDoS attacks, a company later acquired by Akamai. He most recently served as Head of Research and Development with Neustar Security Solutions.

Chris Krebs | LinkedIn

Chris Krebs is a CBS News Contributor, as well as the founding partner of Krebs Stamos Group, and previously served as the first director of the federal Cybersecurity and Infrastructure Security Agency (CISA). As Director, Krebs oversaw CISA’s efforts to manage risk to the nation’s businesses and government agencies, bringing together partners to collectively defend against cyber and physical threats. At CISA, Krebs also pioneered the Rumor Control program, which was designed to counter disinformation campaigns.

Ron Gula, Gula Tech Adventures | LinkedIn

Ron Gula is President and co-founder of Gula Tech Adventures. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. Ron has served on the Board of Directors for a number of GTA’s portfolio companies and has been a steadfast mentor and advisor to many founders. Ron has also supported a variety of cyber nonprofits and think tanks, with both his substantive expertise and through philanthropic funding.

Gary Brickhouse, CISO, GuidePoint Security | LinkedIn

Gary Brickhouse is the CISO at GuidePoint Security and is responsible for all aspects of the company’s information, security program, inclusive of building and maintaining GuidePoint’s internal security architecture and control practices. Gary also leads the GRC services consulting practice where he is responsible for the development and delivery of GRC service offerings to support our clients.

Bryan Orme, Principal and Partner, GuidePoint Security | LinkedIn

Bryan Orme leads the information assurance consulting organization at GuidePoint Security, which includes application security, cloud security, governance, risk, and compliance services, threat and attack simulation, and incident response and forensics. Additionally, Bryan leads the internal IT and information security teams as well as the project management office and services operations.

Mark Lance, Vice President, Cyber Defense, GuidePoint Security | LinkedIn

Mark Lance, Vice President of Cyber Defense Services, is responsible for the digital forensics, incident response, and advisory services at GuidePoint Security. Since beginning his career in 2001, Mark has a proven record of delivering security and consulting services to clients, including numerous members of the Fortune 100. His professional experience includes leadership of global incident response/discovery practices, a global customer success organization, performing consulting engagements, and delivery of managed security services.

Tony Cook, Senior Director, DFIR & Threat Intelligence, GuidePoint Security | LinkedIn

Tony Cook is the Head of Threat Intelligence for GuidePoint Security where he leads the GuidePoint Research and Intelligence Team and the DFIR team. His career background includes directing the Defense Health ATony Cook is the Head of Threat Intelligence for GuidePoint Security where he leads the GuidePoint Research and Intelligence Team and the DFIR team. His career background includes directing the Defense Health Agency SOC, leading the Malware Analysis and Forensics for the Naval Cyber Defense Operations Command, creating Threat Intelligence teams at the Crypsis Group, as well as several other Federal & DoD projects. Tony’s role at GuidePoint allows him to help guide clients to understanding how to incorporate Threat Intelligence into their operations while also helping them mature their cyber defense as a whole and in the unfortunate circumstance where they get breached, help restore them to normal operations. Tony also enjoys working with the local security community where he volunteers time to teach at local colleges.

Victor Wieczorek, Vice President, Application Security and Threat & Attack Simulation,
GuidePoint Security | LinkedIn

Victor Wieczorek is an information security professional with a broad range of experience in both defensive and offensive security roles. His prior work included delivering various security projects to a wide spectrum of clients with a primary focus on penetration testing, social engineering, and security architecture design. As a penetration tester holding both the Offensive Security Certified Expert (OSCE) and Offensive Security Certified Professional (OSCP) certifications, he has helped organizations identify a multitude of weaknesses with a focus on root cause remediation.


Jonathan Villa, Practice Director, Cloud Security, GuidePoint Security
| LinkedIn

Jonathan Villa has worked as a technology consultant since 2000, and has worked in the information security field since 2003. He also co-architected and managed an automated continuous integration environment that included static and dynamic code analysis for over 150 applications deployed to several distinct environments and platforms. Jonathan has worked with virtualization and cloud technologies since 2005 and, since 2010, has focused primarily on AWS security.

What We’ll Cover

Application Security

This session delves into the latest strategies and technologies for protecting applications from emerging cyber threats. Featured speakers will discuss topics like secure coding practices, vulnerability assessment, and the integration of security in the software development lifecycle. Whether you’re a developer, security professional, or IT manager, you’ll gain valuable insights on fortifying your applications against sophisticated attacks.

Cloud Security

Discover the future of Cloud Security and explore the unique challenges of securing cloud environments, focusing on advanced threat protection, data security, and compliance in the cloud. Featured speakers will share their insights on cloud-native security tools, best practices for cloud migration, and strategies for securing multi-cloud architectures. 

Insider Threat

The Insider Threat session will explore the nuances of threats from within. Featured speakers will discuss methods to identify and mitigate risks posed by employees, contractors, and business partners. Learn about behavioral analytics, effective policies, and incident response strategies to protect your organization from insider threats. 

Zero Trust

Explore the principles of Zero Trust and listen to our featured speakers break down the Zero Trust model. Discover how to implement Zero Trust architectures, understand its role in modern cybersecurity strategies, and learn about the technologies driving this paradigm shift. This session is ideal for IT leaders and security professionals and offers a roadmap for adopting a Zero Trust framework in your organization.

Identity & Access Management

Delve into the world of Identity & Access Management (IAM) at the GPSEC conference. This session covers the critical role of IAM in securing enterprise environments, highlighting advanced solutions for managing digital identities and controlling access to resources. Learn about the latest trends in IAM, including biometrics, AI-driven authentication, and the impact of IAM on regulatory compliance. Perfect for IT managers and security strategists, this session is a deep dive into ensuring the right people have the right access.

Endpoint and Network Security

Join the Endpoint and Network Security session to learn how you can better protect your organization’s network’s edge. Featured speakers will cover the latest in endpoint protection strategies, network security technologies, and threat detection methodologies. Learn how to secure a diverse array of devices and defend against sophisticated network threats. This session is crucial for network administrators and security professionals focused on maintaining robust defense at the network perimeter.

Governance, Risk & Compliance

The Governance, Risk & Compliance session takes a comprehensive look into the strategies necessary to align your organization’s cybersecurity with its business objectives. You’ll get the opportunity to explore frameworks for risk management, methods for ensuring compliance with global regulations, and best practices for effective IT governance.

MUCH MORE!

Take advantage of more great networking opportunities by attending the other panel discussions and sessions at GPSEC. Connect with other C-level executives, security engineers, consultants, and industry-leading vendors in an intimate and interactive format.

What Attendees Say about GPSEC

The security conference hosted by GuidePoint was a wonderful opportunity to learn about security and threat trends in our industry, to meet security and vendor peers, and to learn about new products that are emerging on the landscape. In addition, the lineup of speakers was well thought out and provided a perfect balance of learning more about current threats and security trends and discussing new threats on the horizon that we need to know about so we can start preparing. I thoroughly enjoyed the time I spent at the conference and felt that I came out the other side better able to protect my organization and my colleagues, and a better security practitioner.
Joe HollidayManager of IT Security BRP
The GPSEC conference is a great opportunity for security leaders, engineers, and security partners to connect together in a relaxed setting and discuss common challenges and threats while learning about products and services offered by those partners to address those challenges. The CISO panel discussion provided an insight into the approach in which various organization are addressing common real-world problems regardless of the industry they operate in. Keynote speaker, Ron Gula’s speech was exceptionally beneficial and provided a view into untapped areas of security.
Matthew Spencer PCNSEDirector of CybersecurityNational Rural Utilities
GuidePoint’s GPSEC Security Forum was a great venue to reconnect with peers in the industry after the pause caused by the pandemic. The CISO panel discussion hosted by Gary Brickhouse and the breakout sessions were excellent, providing key insights into current challenges and trends, and you couldn’t beat the impromptu conversations with friends, colleagues, and vendors. The event was all around top notch.
Daniel GottoviVice President Information Security and Compliance