Southwest Speaker Info

Speaker Bio and Session Information

 Steve Surfaro, Chairman of the ASIS Security Applied Sciences Council & Chairman of the Public Safety Working Group for the Security Industry Association


With 30 years of security industry experience, Steve Surfaro is Chairman of the ASIS Security Applied Sciences Council and Chairman of the Public Safety Working Group for the Security Industry Association. He is Standards Team Leader for the DHS S+T Video Quality in Public Safety Group. Steve is published in a wide range of security publications and delivers industry-accredited sessions each year to audiences in the Americas, Middle East and Asia.

 Steve is a subject matter expert in smart cities and buildings, cyber security attack trends, forensic video, data science, command center design and first responder technologies. He also delivers an industry intelligence feed on Twitter (@stevesurf) and bi-monthly podcasts.

 He recently served as Public Safety Solutions Designer on the Super Bowl LIVE! Event, a multi-day sports themed event in Downtown Houston that attracted over 1M fans. The City of Houston Police Department considered it so successful that the solutions used will be re-deployed for crime reduction, early warning and traffic management.

 Steve recently appeared on CNBC’s Closing Bell on the subjects of early warning systems and enhanced security screening, following the Mandalay Bay incident.

He is author of the Digital Video Handbook, a DHS S+T publication and the upcoming SIA Tactical and Smart City Solutions Handbook, providing guidance for law enforcement, fire and other first responders. Steve is the recipient of the Roy N. Bordes Council Member Award of Excellence from ASIS International. He received his Bachelor of Engineering from The Cooper Union in New York City. He lives in Phoenix, is an avid photographer and periodically volunteers at local charter schools encouraging youth technology learning programs.


Keynote: Get Smart: Envisioning Smart/Safe Cities’ Future: 2020 and Beyond

How will you embrace the requirements of Smart Cities, Campuses and Buildings and their implications for security? Peer into the future, through a rich multimedia format to consider the effect of emerging technologies and trends, such as IoT, virtual and augmented reality, artificial intelligence, data analytics and intelligent buildings.

What are the threats to IoT and the Homeland Security Enterprise? We’ll experience virtual tours of both the City of Las Vegas and Houston Smart City projects, demonstrating innovation leadership.

How will we protect the “Massive Internet of Things (IoT)” now present in the Southwest’s smart cities and intelligent buildings? How will Social Media, crowdsourcing and deep learning affect smart and safe security decisions and what will be tomorrow's cyber­attack vectors? Learn about the “wisdom of the crowd and the growing importance of data analytics and intelligence.

Learn about

  •          the Good, the Bad and the Ugly: an overview on emerging technology and the law
  •          which solutions will claim 5G’s dominance.
  •          how infrastructure’s evolution will offload the burden of IT staff into the simplified, yet vulnerable, cloud
  •          the latest framework, rollout status and impact of 5G on security.
  •          the latest in continuing education for all the above topics (research, articles and publications) and understand how to get involved in these new success paths


Jason Veiock, Senior Manager, Global Employee Safety & Security at GoDaddy


Jason Veiock leads a converged security team responsible for protecting GoDaddy’s workforce and workplaces from the full-spectrum of threats including international travel risk, data loss prevention, social engineering, workplace violence and insider threat. Encompassing nearly 8,000 employees and 28 locations across four continents, Jason’s team is responsible for physical security infrastructure, endpoint detection and response, and duty of care. He leads a team of 12 employees, including developmental engineers and system administrators, as well cyber-security and global security intelligence analysts. He also provides standards and oversight for all guard force operations.

Security Convergence: The Future Role of Physical Security

As the security profession continues to evolve, the formerly separate worlds of physical and IT security are becoming more closely aligned. Jason will explain his path from federal law enforcement to corporate security to a converged security role at GoDaddy.  He will share lessons learned, his perspective on where the industry is headed, and the short- and long-term challenges we will likely face.

Learn about

  •          the education and experience required to be successful in this new era
  •          how the Internet of Things (IoT) is a game-changer
  •          what traditional physical security practitioners will need to do to adapt


Dom Kaufman & Chris Arvayo, Regional Implementation Managers,Adventos


Domenick Kaufman recently retired as a Sergeant after 22 years of service with the Mesa (Ariz.) Police Department. The vast majority of his career was spent in criminal investigations.  As a detective, Domenick worked property crimes, violent crimes and homicide. As a sergeant, Domenick supervised the East Valley Gang & Criminal Information Fusion Center after serving over 5 years leading several teams at the Mesa Family Advocacy Center. While working sex crimes, he developed and led Mesa PD’s first Human Exploitation and Trafficking Squad. Domenick’s passion for leveraging technology to maximize public safety led to his current position as a Regional Implementation Manager for AdventosTM, where he provides solutions for security and public safety professionals across the United States. He earned a M.A. in public administration from Northern Arizona University and is a certified Arizona POST instructor.

Chris Arvayo has over 20 years of law enforcement experience, having retired from the Mesa (Ariz.) Police Department in 2017 at the rank of sergeant. His areas of expertise are criminal intelligence, street crimes, field training and patrol operations.  During the last four years of his law enforcement career, Chris ran the day-to-day operations of the East Valley Gang and Criminal Information Fusion Center, a multi-jurisdictional regional intelligence center comprised of federal, state, local, and tribal law enforcement agencies. Chris earned a Master of Science in security management from the City University of New York, John Jay College of Criminal Justice, and a Bachelor of Science in Criminology and Criminal Justice from Arizona State University. Chris is currently a Regional Implementation Manager for AdventosTM, and he is also a member of the John Jay College of Criminal Justice Security Management Leadership Society.

Modern Collaboration is Critical for Security Professionals

To impact the world of organized retail theft and private security, loss prevention and security professionals must embrace modern information sharing technology. The old way of operating in silos will not slow the growing threats to company assets and employee/customer safety.  Adventos™ connects law enforcement, private security and community partners with crime information that can reduce, prevent or deter crime.  In addition to providing tips for improved communication and avoiding pitfalls, we will demonstrate how the SmartForce and BulletinWizard solutions deliver critical information to the people who need it most – when they need it most.

Learn about

  •          improving communication between security and local law enforcement
  •          reasons why information silos don’t work
  •          using current technology for efficient information sharing
  •          BulletinWizard & SmartForce solutions


Michele Stuart, JAG Investigations


Ms. Stuart is a licensed Private Investigator in the State of Arizona with twenty years of experience specializing in the areas of Financial, Open Source Investigations (OSINT), Corporate Investigations, and Intelligence/Counter Intelligence. She started her investigative career as an Economic Fraud Investigator.

Ms. Stuart is an Adjunct Professor with University of Virginia and an Instructor at Quantico for multi country training programs. She provides seminars on her specialized investigative techniques in Open Source Investigations (OSINT). Over the past years she has provided presentations, and private training, to both Federal and State levels of Law Enforcement Agencies and Military Intelligence throughout the United States including attendees of Department of Homeland Security, US Marshals, FBI, DOJ, Border Patrol, Indian Tribal Nations and local law enforcement agencies throughout the country.

Additionally, she has presented classes for RSIG, ARA, Allied Finance Adjusters, Insurance Special Investigative Units and numerous financial and state associations. Moreover, she has written and published several articles pertaining to her investigative methods in various investigative publications and journals and is a featured author with her own column concerning Internet Profiling and Open Source Investigations titled “Internet FYI” in PI Magazine, a widely distributed trade publication of the private investigations industry. Her presentation is entitled “Internet Profiling and Intelligence Gathering”.

Ms. Stuart has received the following prestigious awards:

  • Top 25 Most Influential Collection Professionals Of 2011
  • 2012 Speaker Of The Year -National Association Of Investigative Specialists

Session Info:

The Changing Landscape of Open Source Intelligence

 During the past year, stories about fake news, Facebook under siege and vulnerabilities of the Internet of Things (IoT) have dominated the news cycle. This session will discuss how those changes are affecting the sources and methods for collecting and vetting information from the internet.


Gloria Heatherington, PhD, Heatherington Consulting Group


 Heatherington Consulting Group, Inc., a Las Vegas-based Firm, provides Workplace Safety, Crisis Management, Disaster Response, Trauma Resolution, support and training for Incident Response Teams to business and industry clients nationwide. Prior to receiving her doctorate in Industrial Psychology, Dr. Gloria Heatherington served several years in law enforcement. Dr. Heatherington is recognized as an expert in the field of Workplace Violence Assessment, Prevention and Critical Incident Recovery.

Workplace Violence: Human Factors’ Convergence with Technology

This interactive session discusses the internal and external considerations of human factors supported by the technology available to organizations for workplace safety.

Learn about

  •          human factors: HR personnel selection, policy and technology
  •          workplace safety assessment and risk factors
  •          critical Incident response
  •          trauma resolution and business resumption


Scott Dearduff & Mark Lankford, USAA


Scott Dearduff retired from the US Air Force after 29 years of active duty as a Security Specialist and Command Chief Master Sergeant, including four tours of duty in combat.  He performed security operations for nuclear weapons, presidential aircraft, air base defense, and ground combat operations. In 2011, he began his career in the private sector, where he leads an armed security force in protection of 4,000 employees on a closed campus. In addition, Scott started his own consulting business that provides leadership training and motivational speaking, and he has published a leadership book series and his memoirs from a combat tour. His military decorations include the Legion of Merit, three Bronze Star medals, the Air Force Combat Action Medal, and campaign medals from Iraq and Afghanistan with multiple service stars.

Mark Lankford retired from the US Air Force in 2005 after 24 years of active service as a Command F-16 Fighter Pilot with more than 3,000 flying hours, including combat sorties during Desert Storm, Operation Southern Watch, and Noble Eagle. He performed operational duties, including squadron commander and weapons officer. He holds two masters degrees and has attended multiple professional military education courses in leadership. Following retirement from the military, he attended a civilian police academy and began his current career as a sergeant with an Arizona law enforcement agency, where he works internal affairs. His military decorations include the Distinguished Flying Cross, the Defense Meritorious Service Medal, the Air Medal with two oak leaf clusters, and the Aerial Achievement Medal with two oak leaf clusters.

Leadership in the Modern Security Realm

This presentation will focus on modern leadership topics applicable to the security industry to help attendees understand ways to motivate and lead people with generational differences. Attendees will be challenged to engage in understanding these modern approaches to leading people in a dynamic environment.

Learn about

  •          leadership communications
  •          leadership pride of ownership
  •          connection to the organizational mission


Dr. Jon C. Haass

Professor and Chair
Cyber Intelligence and Security
Embry-Riddle Aeronautical University


Dr. Haass is professor and department chair of the Cyber Intelligence and Security degree program at the nation’s first College of Security and Intelligence at Embry-Riddle Aeronautical University in Prescott, Arizona.  He is author and presenter of more than 30 articles in a variety of subject areas including Cyber Threat Intelligence Sharing.  Dr. Haass serves as advisory board member for the Arizona Cyber Threat Response Alliance (ACTRA), a regional information sharing and analysis organization that includes companies in 14 of the critical infrastructure sectors. His areas of research interest include the security issues associated with connected cyber-physical systems that encompass aircraft, cars, industrial controls and much more. This Internet of Things (IoT) is likely to open an even larger portion of societies systems to cyber based attacks.

 Previously Dr. Haass held executive and management positions at Sun Microsystems, OpenTV and SendMail where he was responsible for projects ranging from moving map displays and GPS to digital television and prevention of email borne malware. He serves as a Cyber Security expert for corporate boards and anticipates the need for representation on boards for every publicly traded company. He is a speaker to local and national audiences bringing complex ideas into clear focus. He received his PhD from MIT where he also served after graduation as a CLE Moore Instructor.  A native of Wyoming he continues to work with companies and agencies on both coasts as well as the rocky mountain region.  His passion is to educate the next generation of cyber security professionals inspiring integrity, curiosity and shared leadership.

Session info: 

Cyber – Physical Systems: The Securing of Everything

 Everywhere we look, devices, systems, even the mundane contain connected computing, sensing, observing circuitry.  The first principle of security, the ability to limit physical access, is violated for consumer devices, sensors on the side of a building or in an open office environments.  Additional challenges are presented as all of the information from these sensors and data entry systems are stored “in the cloud” potentially accessible globally. Our connected world presents a challenge to the security profession that is both exciting and terrifying.  Smart cities, filled with smart vehicles, smart devices and perhaps not so savvy users promise job security for the security professional. Join the conversation!


Tom Foley & Dr. Tyrone Groh, Embry-Riddle


Tom Foley, CPP, PSP, is an assistant professor at Embry-Riddle Aeronautical University’s College of Security and Intelligence in Prescott, Ariz. He has studied the legal and security implications of civilian use of Unmanned Aerial System technology. In 2014, Foley and Dr. Tyrone Groh presented their threat assessment of the possibility of a terrorist drone attack on the University of Phoenix Stadium to the Super Bowl XLIX Security Planning Committee. In addition to studying the security implications of civil drone technology, Foley focuses on applied research into physical security solutions to prevent or mitigate the threat of active shooters in businesses, public venues, government buildings and schools, with a particular focus on preschools and elementary schools. He is the principal investigator for a $770,000 National Institute of Justice Grant to study the use of physical security technologies to improve security at K-12 schools. Professor Foley is a member of ASIS International, the ASIS Active Shooter Initiative, the Association of Threat Assessment Professionals, and the National Domestic Preparedness Association. He has been interviewed by ABC, NBC, CBS, NPR, and various other media outlets regarding school security, active shooting events, and protecting large outdoor venues from drone attacks.


Dr. Tyrone Groh specializes in strategy and unconventional warfare. He received a bachelor’s degree in aeronautical engineering from the U.S. Air Force Academy, a master’s degree in security studies from the Naval Postgraduate School, a master’s degree in strategy from the US Air Force’s School of Advanced Air and Space Studies, and a doctoral degree in government from Georgetown University. Dr. Groh is a retired U.S. Air Force officer with over 21 years of service. He flew F-16s for over 10 years and participated in different overseas contingency operations throughout the world. He also served as an exchange pilot in Norway for two and a half years. More recently, Dr. Groh commanded a squadron of remotely piloted aircraft (aka drones) in support of Operation Enduring Freedom. He has done strategy work in the Middle East and South Asia and his research interests focus on the link between strategy, policy and unconventional warfare. He has published on the challenges of ungoverned spaces in tribal regions and is currently working on a book about proxy war as a form of foreign policy.

The Evolution of Drone Technology: Future Considerations for Security Managers and Law Enforcement

The development of commercial drone and anti-drone technologies is creating both challenges and opportunities for law enforcement agencies and corporate security departments. This presentation will discuss how drone and anti-drone technologies might be used by terrorists, criminals, law enforcement agencies, and corporations in the future.

Learn about

  •          how drone and anti-drone technologies are evolving
  •          the potential uses and misuses of drone technologies
  •          facts to consider when conducting a threat and risk assessment regarding drones


Mike Lombardi, founder and president of Vertigrate


Michael Lombardi, : MBA, CISSP, CISM, GREM, GCFE, GCIH, GPEN, CCME, is the founder and president of Vertigrate, a boutique consulting firm providing law firms and their clients with assistance in both reactive and proactive information security engagements. Mr. Lombardi’s skills in digital forensics, incident response, and malware reverse engineering have been brought to bear on numerous unique data breach cases. He also proactively engages with business and security teams of all sizes to develop and enhance risk management, guide information security policy, and design incident response plans.


Mr. Lombardi presently volunteers his time as the Arizona chapter’s President of the High Technology Crime Investigation Association (HTCIA), as the Phoenix chapter’s Membership Director of the Information Systems Security Association (ISSA), and as a member of the State Bar of Arizona’s Technology Committee. He has spoken at local and national meetings regarding various IT topics; presented alongside the FBI; is a Certified Information Systems Security Professional (CISSP); a Certified Information Security Manager (CISM); a certified malware reverse engineer (GREM), digital forensic examiner (GCFE), incident handler (GCIH), penetration tester (GPEN), and mobile forensics examiner (CCME); a certified TrialDirector® trainer; and both as a featured courtroom consultant and as a featured law firm cybersecurity consultant in Law Technology News.

Incorporating Digital Forensics into Your Investigations

People and devices are creating and storing data everywhere. While data still resides in the traditional computer and server locations, its storage has spread to the cloud through avenues like smartphones, Internet of Things devices and social media networks. Corporate data is often stored alongside personal data on many of these devices. In this presentation, we will explore how an investigator bring digital forensics to bear in their investigations, as well as policy considerations for a proactive digital security program.

Learn about

  •          the what, where and how of collecting data from whom in a defensible manner
  •          adata source checklist
  •          digital device policy considerations
  •          vetting your digital forensics investigator