The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex and North Texas Region. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software, and communications security, and the PUBLIC. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, the development of leadership and professional skills, and the advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.
January 30, 2026, Noon Central
| Join from the meeting link |
| https://stephensusser-352.my.webex.com/stephensusser-352.my/j.php?MTID=m290bf2e7d53681fe2dbdb048eb2224b7 |
| Your Perimeter is Gone: Governance in the Age of Saas and AI The rapid shift to SaaS-first business models has collided with the rise of AI-driven technology, eliminating the traditional security perimeter and pushing risk deep into the software that runs the business. Vendors, integrations, and embedded AI capabilities now introduce operational, financial, and compliance exposure that many organizations did not intentionally accept and are struggling to govern. In this session, Chad Holmes from Grip Security will examine how digital transformation has evolved into AI-driven third-party risk, why existing security and governance models fall short, and what leaders can do next. Attendees will leave with a practical roadmap for AI and SaaS governance adoption, a clear view of emerging governance frameworks, and real-world guidance for bringing order to an increasingly messy and fast-moving risk landscape. Speaker bio: Chad Holmes is a cybersecurity strategist with over 20 years of experience helping organizations protect critical systems, enable secure development, and build resilient teams. He brings deep expertise across SaaS + AI Governance, healthcare security, application security, IoT/IoMT and cyber physical systems, as well as hands-on training and threat intelligence education. Chad’s approach blends technical insight with practical considerations, making him a trusted advisor to CISOs and security leaders navigating complex risk and innovation challenges. He’s passionate about developing talent, having hosted over 100 cyber range events worldwide and frequently speaking at industry conferences. Whether he’s mentoring the next generation of security professionals or helping teams strengthen their security posture, Chad focuses on turning security into a vehicle for innovation rather than merely a control. |
Register below

This form is currently closed for submissions.

