Capitol with security locks

Kansas Cyber Summit 2023

This event is now closed. Thank you to everyone who attended. Once we confirm a date for our 2024 Cybersecurity Summit, we will publish it here.


This summit will bring public sector and critical infrastructure resources together to begin building a strong Kansas cyber community. The event will be focused on laying the foundation for building a whole of state approach to address an ever growing challenge. Sessions will be interactive and allow for a great deal of collaboration amongst attendees and presenters. Sessions will be focused on several key topics that impact a majority of organizations. We will also discuss the historic funding opportunities such as ARPA, IIJA, and the DHS state and local cybersecurity grant program and how we can maximize these opportunities to advance cybersecurity across Kansas.

Who:This event is open to employees, both technology and business, and elected officials of cities, counties, school districts, higher education institutions, state agencies, federal partners, and DHS designated critical infrastructure partners.
Date:September 20, 2023
Time:9:00 AM to 5:00 PM
Where:Doubletree by Hilton at the Airport  Wichita, KS
Cost:$12.50 per person - includes lunch


Contact Us



Link to Registration:

This event is now closed. Details for our 2024 Cybersecurity Summit will be made available once a date is confirmed.



Wednesday, September 20

8:00 am Central

Registration and Morning Refreshments

Emerald Ballroom Pre-Function

9:00 am Central

Opening Remarks

Emerald Ballroom Salons I/II

Jeff Maxon, Interim Chief Information Technology Officer, Chief Information Security Officer, State of Kansas

9:15 am Central

Keynote – Inside the Hacker's Playbook: Learning From Attackers To Optimize Defenses

Emerald Ballroom Salons I/II

Get a clear understanding of the multiple layers of an attack as I walk through an exciting battle of a hacker versus a defender. Get inside the mind of malicious hackers at every step of the process to stop them in their tracks. Learn from their strategies to optimize your security posture and gain actionable insights for a resilient digital future.

Mishaal Khan, Hacker, Author and Speaker

10:15 am Central

Networking Break

Emerald Ballroom Pre-Function

10:45 am Central

Concurrent Sessions

How Honest is Your Risk Assessment?

Media Theater

Where do you start when conducting a comprehensive analysis of key threats, ranging from data breaches to insider attacks? This session will cover the Cybersecurity Performance Goals (“CPG”) provided by CISA as the gold standard of free tools available to agencies, school districts, and critical infrastructure. By implementing these standards, owners and operators will not only reduce risks to critical infrastructure operations, but also to Kansans. 

Samuel Alva, Cybersecurity Advisor, Region 7 (IA, KS, MO, NE), U.S. Department of Homeland Security

Threat Detection vs Intrusion: How to Stay Compliant with the New Reporting Laws

Emerald Ballroom Salon IV

With the new law surrounding threat and intrusion reporting, navigating new protocols is critical for each team’s standard operating practices. Do you have the appropriate protocols in place? Where should you enhance services with a partner? Does your team know when to engage law enforcement? Join this session to learn how the State can help you be compliant when an inevitable attack happens.

Moderator: Phil Bertolini, Senior Vice President, Government Technology

Jim Germann, IT Director, City of Junction City

Erin McGinnis, Director of Statewide Cyber Collaboration & Preparedness, State of Kansas

11:45 am Central


Emerald Ballroom Salons I/II

12:30 pm Central

The IT State of the State

Emerald Ballroom Salons I/II

Phil Bertolini, Senior Vice President, Government Technology

Jeff Maxon, Interim Chief Information Technology Officer, Chief Information Security Officer, State of Kansas

1:00 pm Central

Bits and Bytes – AI and Shifts in the Cybersecurity Landscape

Emerald Ballroom Salons I/II

The use of AI in cybersecurity has the potential to significantly improve the security of organizations. However, there are also some challenges that need to be addressed, such as the need for large amounts of data and the potential for AI to be used by attackers. In this session we will present the Google Cloud perspective on the advantages of using AI as a force multiplier for enterprise cybersecurity. Attendee Outcomes: 1.Enhanced understanding of how AI can be used to improve cybersecurity. The briefing will also provide attendees with an understanding of how AI can be used to improve cybersecurity. This includes the use of AI for threat detection, prevention, and response. Attendees will learn how AI can be used to automate tasks, identify patterns, and make predictions that can help to protect organizations from cyberattacks. 2. Improved ability to make informed decisions about cybersecurity investments. The briefing will help attendees to make informed decisions about cybersecurity investments. This includes understanding the benefits and risks of AI-based cybersecurity solutions, as well as the best practices for implementing and managing these solutions. 3. Awareness of the investments and products contributing to successful implementation of AI influenced cybersecurity tools and products which could lead to significantly better outcomes for the public sector security practitioners.

Karim Atek, Midwest Team Lead Customer Engineer, SLED, Google

1:40 pm Central


Emerald Ballroom Pre-Function

2:00 pm Central

Concurrent Sessions

You’re Not Alone: Reinforcements are on the Way!

Emerald Ballroom Salon IV

Being attacked can be a lonely experience. It does not have to be that way, as there are resources at your disposal to help you defend and recover. Help from CISA, MS-ISAC, and KS-GMIS and other trusted partners are a phone call away. Do you know how to leverage these tools at the right time? Have you built the right relationships to be ready when you need them? This session will provide practical guidance to help you be successful.

Phil Bertolini, Senior Vice President, Government Technology

Alyssa Boss, Network Administrator, Dickinson County

Andrew Darrow, IT Manager, City of Manhattan

Chancy Smith, Emergency Management Director, Dickinson County

Brenda Ternes, IT Director, City of Newton, KS and GMIS International President Elect

Cybersecurity the AI/ML Way

Media Theater

The advantages of AI and ML can be leveraged to automate the detection of cyberthreats and malicious activity. What’s working, and what risks are involved? Does your team understand the limitations of this technology as it relates to intellectual property? Is your entity leveraging the State contracts that can help secure a more cost-effective solution? Join this session to learn more about public sector use of these evolving defense strategies.

Moderator: Eric Tolbert, Business Continuity & Disaster Recovery Analyst,

Information Security Office, State of Kansas

Rob Aragao, Chief Security Strategist, OpenText Cybersecurity

Jason Hildebrandt, IT Security Analyst, State of Kansas

Jeff Williams, Security Analyst, information Security Office, State of Kansas

Executive Briefing

Consulate III

(Industry sponsors only) Hosted by:

Erin McGinnis, Director of Statewide Cyber Collaboration & Preparedness, State of Kansas

3:00 pm Central

Networking Break

Emerald Ballroom Pre-Function

3:30 pm Central

Featured Speaker – Navigating Your Cyber Future: Next-Gen Threats, Strategies & Tech

Emerald Ballroom Salons I/II

The Center for Digital Government works tirelessly to analyze the current and future state of cybersecurity. How will governments stay ahead of cyber-attackers? Are the emerging threats just too much? What are the new approaches to addressing cyber challenges? This session will tackle these issues by having the CDG present an update on key issues and trends facing government cybersecurity leaders today.

Mark Weatherford, Senior Fellow, Center for Digital Government

4:15 pm Central

Networking Reception

Emerald Ballroom Pre-Function

Network with your colleagues and discuss technology solutions with the event exhibitors.

5:00 pm Central

End of Conference

Conference times, agenda, and speakers are subject to change.


Lunch is included with the registration fee.

    Join Our Mailing List

    You can join our mailing list at GovDelivery.