CONFERENCE DAY TWO
Wednesday, October 1, 2025

8:00 am Chair’s Opening Remarks

Cybersecurity In Action

8:10 am Moving from Incident Preparation to Effective Response

  • Donnie Hill Sr. Cybersecurity Manager, Kiewit Corporation

Synopsis

  • Covering the phases of incident handling (e.g. detection, containment, eradication) and the role of tools like forensic analysis and log collection in mitigating security incidents
  • Understanding who to contact in the event of a breach: When should executive teams be involved in incidents versus when can technical teams manage them independently?
  • Creating a process for regular simulations to refine decision-making, stakeholder roles, and communication paths during an incident

8:50 am Case Study: Optimizing Security Operations Center (SOC) Management for Enhanced Response Effectiveness

  • Paul Rentzelos Vice-President of Information Systems & Technology Technical Services, Leopardo Companies, Inc.

Synopsis

  • Determining the appropriate level of access SOC analysts should have, read-only or active control in internal systems
  • Fostering a culture of ongoing training and certification for SOC teams to ensure they are prepared to handle emerging threats and new security technologies
  • Weighing the pros and cons of internal SOC management versus outsourcing to third-party SOCs or managed security service providers, with considerations around resourcing, control, cost and scalability

10:00 am Morning Refreshments

Leveraging AI-Powered Defense

10:40 am Audience Discussion: Managing the Use of AI to Ensure Business Efficiency & Safety

Synopsis

  • Finding ways to reinforce proprietary data to ensure it isn’t exposed or transferred through AI platforms
  • Managing risks from employees using unsanctioned AI tools without IT/security approval
  • Demonstrating to clients that AI usage is controlled, secure, and doesn’t endanger their data to safeguard client information and build trust

11:20 am Panel: Exploring the Practical Use of AI for Cybersecurity to Better Protect Your Company’s Data

Synopsis

  • Reflecting on current perceptions of AI tools and questioning whether these tools truly increase security or simply make operations more efficient
  • Overviewing the current vendor landscape to understand how AI is being most effectively implemented by other industries and discussing how appropriate these applications may be in construction
  • Discovering how organizations are using AI for alert management to make security decisions faster

12:00 pm Networking Lunch

Mastering Third-Party Risk Management

1:00 pm 1:00 pm Implementing Vetting Processes & Security Controls for Subcontractors & Vendors to Minimize Third-Party Risk

  • John Kronick Director & Chief Information Security Officer- IT Compliance, Tutor Perini Corporation

Synopsis

  • Defining risk tiers for subcontractors and vendors based on access to sensitive data, project systems, or physical jobsite presence
  • Establishing a continuous oversight framework, including regular audits, assessments, and monitoring of partner security practices to ensure compliance and proactively address emerging threats
  • Incorporating specific clauses and responsibilities into trade contracts to better define security expectations and accountability, mitigating legal and financial risks associated with breaches

1:40 pm Case Study: Effectively Managing Multi-Tenant Environments While Maintaining Visibility & Control

  • Adam Crispo Senior Director Security Operations, Turner Construction

Synopsis

  • Consolidating triage efforts across multiple tenants to improve detection and accelerate response to active threats
  • Designing architecture and SOC identity structures for streamlined internal management and oversight
  • Establishing privileged accounts within a centralized tenant to enable Microsoft or third-party incident response teams to quickly regain control during a breach

Shaping the Future of Construction Cybersecurity

2:20 pm Panel: Future-Proofing Cybersecurity in Construction to Prepare for What’s Next

  • Nathanael Dick Director of Cybersecurity and Governance, SteelFab Inc.
  • Dennis Heinle Director, Information Technology, Guarantee Electrical Company
  • Joseph Duke Director of Information Technology, Gresham, Smith & Partners
  • Hunter Drawdy Vice President, Technology Design & Operations, Power Design Inc

Synopsis

  • Tracking the maturation of construction technologies and assessing how evolving functionality impacts threat exposure
  • Defining clear steps of designing future-proof incident response plans with readiness for AI-driven threats, multi-party breaches, and evolving ransomware tactics
  • Evaluating sustainable cybersecurity investments to prioritize scalable security strategies and risk-based tooling across diverse projects

3:00 pm Chair’s Closing Remarks

3:10 pm End of Conference