CONFERENCE DAY ONE
Tuesday, September 30, 2025

8:00 am Chair’s Opening Remarks

Building a Resilient Cybersecurity Program

8:10 am Leveraging Cyber Threat Intelligence to Influence Insurance Premiums & Strengthen Client Readiness

  • Ryan Mercer Vice President, Cyber/E&O, McGriff, Seibels & Williams
  • Nathanael Dick Director of Cybersecurity and Governance, SteelFab Inc.

Synopsis

  • Exploring current trends in cyber threats and how they impact premium calculations
  • Understanding how insurance providers are staying ahead of evolving threat landscapes
  • Identifying practical steps contractors can take to reduce premiums and demonstrate cyber maturity

8:50 am Building a Secure Environment: A Practical Roadmap to Balanced, Risk- Aligned Cybersecurity Program

  • Juliano Giannerini Director of IT Services, Infrastructure & Security, Baker Construction Enterprises Inc.
  • Jennifer Hohman Chief Information & Technology Officer, Baker Construction Enterprises Inc.

Synopsis

  • Quickly identifying and fixing critical vulnerabilities to reduce immediate risk and strengthen baseline security
  • Building a long-term security strategy that aligns with the organization’s risk profile, avoiding both overbuilding and underbuilding
  • Using real-world incidents and near-misses to communicate risk, justify investments, and gain executive support

9:30 am Audience Discussion: Building a Top-to-Bottom Security Culture to Embed Cybersecurity into the Organization’s DNA

Synopsis

  • Involving leaders across the business in reinforcing the importance of cybersecurity initiatives to drive adoption across all departments
  • Promoting organizational change by ensuring that data stewardship, governance, and risk management programs are integrated into departmental SOPs
  • Simplifying the implementation of cybersecurity measures by providing clear, actionable guidelines and tools that empower all employees

10:40 am Morning Refreshments & Speed Networking

Accelerating Companywide Buy-In & Adoption

11:20am Panel: Evolving Your Security Program to Maximize the ROI of Your Technology Stack & Stay Ahead of Emerging Risks

  • Keith Shrader IT Director, MMC Corp.
  • David Sheidlower Vice President, Chief Information Security & Privacy Officer, Turner Construction
  • Jean Luber Vice President -Information Technology, MYR Group Inc.
  • Jennifer Hohman Chief Information & Technology Officer, Baker Construction Enterprises Inc.

Synopsis

  • Embedding feedback loops, threat monitoring, and regular gap assessments to drive continuous improvement
  • Exploring the benefits and potential trade-offs of all-encompassing security platforms, and strategies to mitigate risks associated with reliance on a single provider
  • Navigating information overload when deciding which security tools and strategies to employ next: How do you make sure that you are addressing the most urgent gaps in your existing program?

12:00 pm Driving Leadership Support & Accountability for Stronger, Top-Down Compliance

  • Jack Dettis Chief Information System Officer & Senior Director - Information Technology Operations & Network Manager, Swinerton Inc

Synopsis

  • Linking cyber risks to profit protection, brand reputation, client requirements, and strategic growth to help educate leadership on program importance
  • Presenting this business case to encourage leadership to champion compliance and governance across the organization
  • Aligning cybersecurity initiatives with overarching business objectives and KPIs, and establishing regular reporting cadences to maintain leadership visibility over progress

12:40 pm Networking Lunch

Minimizing Risk Profile

1:40 pm Educating End-Users to Better Detect & Prevent Cybersecurity Threats

  • Joseph Duke Director of Information Technology, Gresham, Smith & Partners

Synopsis

  • Discussing the impact of technology breaches, phishing, and fraud, and how data loss or compromise can affect the business in a way that resonates with the individual
  • Promoting cyber-awareness training as an employee benefit, ensuring staff can apply knowledge to avoid personal and work-related scams
  • Evaluating the effectiveness of training to ensure accessibility and utility of tools for all employees
  • Defining consequences for users who fail to follow cybersecurity best practices

2:20 pm Building & Managing Cybersecurity Teams to Address Skill Gaps & Staffing Challenges

  • David Sheidlower Vice President, Chief Information Security & Privacy Officer, Turner Construction

Synopsis

  • Understanding who the cybersecurity team should report to and how that impacts budget, priority, and scale
  • Creating pathways from entry-level to senior roles to help attract technology talent to the construction industry
  • Leveraging offshoring, remote work flexibility, and workforce development approaches to meet staffing need

3:00 pm Afternoon Refreshments

Mastering Your Data Defenses

4:00 pm Case Study: Leveraging Automation for End-to-End Security Coverage

Synopsis

  • Ensuring security policies are not only defined but consistently deployed and enforced across all systems, minimizing gaps that create vulnerability points
  • Leveraging automation to audit and validate policy application across the environment, holding systems and teams accountable while shifting human effort from bulk tasks to resolving targeted exceptions
  • Selecting and implementing automation tools that streamline enforcement and auditing processes, ensuring they solve core security challenges without introducing new complexity

4:40 pm Audience Discussion: Creating a Data Loss Prevention (DLP) Program to Improve Information Security & Risk Management

Synopsis

Establishing the meaning of DLP for the business and individuals, and identifying where the greatest risks reside

Ensuring mobile devices are securely managed and that data on those devices remain protected, including tracking assets and preventing unauthorized access

Approaching protection for specific construction documents (e.g. Blueprints, RFIs), and using additional security measures for more sensitive data

5:20 pm Chair’s Closing Remarks

5:30 pm End of Day One