SECURE IOWA CONFERENCE

Iowa’s Largest Cybersecurity Conference

September 9, 2026
Altoona, IA

The Meadows Event Center
Altoona, Iowa

September 9, 2026

Secure Iowa Conference

September 9, 2026 - Altoona, IA

Iowa's Premier Cybersecurity Conference

The Secure Iowa Conference is where cybersecurity and IT professionals across the Midwest come together to strengthen their defenses and sharpen their strategy. Established in 2012, this event delivers sessions on risk assessments, penetration testing, incident response, compliance, AI-driven threats and defenses, cloud security, identity and more.

Designed for both technical teams and business leaders, Secure Iowa gives attendees the insight, training and community they need to stay ahead of today’s cyber risks.

6

Earn CPE Hours

Secure Iowa gives you an easy—and free—opportunity to earn 6 CPE hours in one day.

Heartland Business Systems

Iowa's Cybersecurity Leader

Solving information security challenges based on risk, not fear. 

HBS is proud to be Iowa’s cybersecurity leader. Our team boasts one of the strongest cybersecurity operations in the Midwest, supports organizations across the country, and stays close to the challenges you face every day. Secure Iowa is our way to give back, share knowledge and bring security professionals together for real conversations that move the community forward. 

At HBS, you’ll find a thorough—and thoroughly refreshing—approach to cybersecurity. An approach that’s not built on fear of what might happen, but on understanding, preparation and proper response. Our teams bring decades of cybersecurity expertise to help you safeguard what matters most, in the most intelligent and proactive way.

Keynote Speakers

Eric O’Neill

Cybersecurity Expert

Helen Patton

Strategic Cybersecurity Advisor
September 3, 2025

Agenda

Loading…

Cybersecurity Focused. Designed for Security Leaders.

Secure Iowa delivers on our promise that security isn't part of the agenda. It is the agenda.


You’ll see how to reduce critical vulnerabilities, improve threat detection, strengthen identity security and how to respond to incidents with less disruption. Sessions cover topics like ransomware defense, cloud security for Microsoft 365 and Azure, AI-driven threats like deepfakes and automated social engineering, governance and compliance requirements, endpoint protection, user awareness tactics, how to evaluate security tools with confidence, and the common vulnerabilities we find when pen testing.

Topics You Care About

Sessions built around detection, vulnerabilities, identity security, ransomware defense, cloud security, AI threats, compliance and real incident response.

Real Cybersecurity Experts

Sessions led by practitioners—CISOs, IT Managers, SOC Analysts—who manage real incidents, strengthen environments and lead security programs just like yours.

Expand Your Network

Connect with fellow technology and cybersecurity professionals. Share what's working, compare challenges and build relationships across Iowa's cybersecurity community.

See the Solutions Up Close

Learn more about the security tools you use, meet the teams behind them and get hands-on with the technology manufacturers that support stronger cyber defense.

What to Expect from the Sessions at Secure Iowa

At Secure Iowa, the sessions stay close to the work: threat detection, identity security, incident response and the decisions that shape a stronger program. You’ll see what works and why it matters. 

Below you’ll find examples of previous Secure Iowa sessions.

  • Resilient Futures: How Incident Response, Disaster Recovery, Business Continuity and Business Impact Analysis Shape Tomorrow’s Success

  • DMPS Cyber Incident: From Attacks to Recovery and Lessons Learned

  • Incident Response Maturity—From Planning to Remediation

  • Zero Trust Principles and Approaches

  • Practicing Safe Sec: Secrets and Identity Management

  • Connectivity and Zero Trust: Remote Access and Application Security

  • Generative AI: The Most Important Shift for Cybersecurity Leaders in a Generation

  • Managing the Risks of AI

  • Emerging Threats and CISA’s Response

  • CMMC Victory: Practical Strategies to Overcome Grueling Compliance Hurdles

  • Life in the Legislative Lane: Steering Through Cybersecurity Laws

  • How to Develop a Strategic Security Plan

  • Security Operations: Cyber Barbed Wire and Tracking Threats

  • Pen Testing Panel: Advanced Techniques and Emerging Challenges

  • Evolution of a Detection Network

Secure Iowa 2025 Presented By

2025 Premier Sponsors

2025 Sponsors

2026 Pricing

Sponsorship Information

Premier Sponsor

  • Featured breakout session

  • Booth (4 exhibiting staff)

  • Logo placement on website, social media, and conference advertising

  • Logo placement on Secure Iowa Conference t-shirt

  • Add space in conference app

  • Social media kit to promote even through your organizations channels

  • Post-registration list of all opt-in participants

Sponsor

  • Booth (2 exhibiting staff)

  • Logo placement on website, social media, and conference app

  • Social media kit to promote event through your organizations channels

  • Post-registration list of all opt-in participants

For sponsorship information, please each out to [email protected].

2026

Secure Iowa Conference

  • Venue

    The Meadows Events Center

  • Address

    1 Prairie Meadows Dr, Altoona, IA 50009

  • Get Directions

Haven't registered yet? Get your ticket now

Registration is open exclusively to IT and cybersecurity practitioners and students. Non-sponsoring sales and recruiting are not permitted.

Your HBS Iowa Team

Cybersecurity Resources

Paper: Incident Response Flow Chart

Creating an incident response plan and training your team to follow it is key to minimizing the impact of a cyber-attack. Use this chart to guide your response based on threat levels.

Penetration Testing vs Vulnerability Scanning

Penetration testing vs vulnerability scanning- both different, but essential for a strong cyber strategy. Regular scans and tests can safeguard your systems.

Paper: First Steps in Compliance

Whether you’re meeting requirements from the government or a key customer, it’s not a technology topic. It’s a business topic. Download this paper for six key ideas to follow when writing or reviewing your policies, procedures and documentation