April 2 – 4, 2024
KEYS is an annual cybersecurity conference and Tandem user group created to provide Knowledge Essential to Your Security.
Registration for KEYS 2024 is available!
Allen, TX 75013 469-675-0800
Room block name: KEYS
If you need any special accommodations (e.g., two queen beds instead of a king bed), please call the hotel after you have booked your room.
Join us for the Third-Party Risk Management Workshop or Tandem Classroom Pre-Conference. Learn about the Pre-Conference tracks. Seating is limited.
Join us for evening at Topgolf! This premier entertainment destination includes our own private, climate-controlled hitting bays, lawn games, and complimentary dinner and beverages. Tee up and show us your skills using the high-tech golf balls that score themselves and spend time relaxing with your fellow attendees.
2024 KEYS Agenda
Third-Party Risk Management Workshop
Managing vendor relationships can be a complicated task. We’re here to make it easy. This three-part workshop will walk you through what you need to know about third-party risk management in 2024. In these sessions, we will review current guidelines and best practices, walk through how to manage third-party incidents, and share tips and tricks for refining your vendor management program. Come prepared to engage with members of the Tandem team and other KEYS preconference attendees on all-things third-party risk management.
Join us at the Tandem Classroom Preconference and take your Tandem knowledge to the next level. Learn how to effectively use Tandem’s Vendor Management, Business Continuity Plan, and Risk Assessment products. Led by our expert Tandem Specialists, this track will guide you through best practices and hands-on implementation. Say goodbye to uncertainty and kickstart your Tandem journey toward success!
Interested in speaking?
Fill out our speaker form.
|Display or booth with table(s)
|10x10 w/ 6ft Table
|10x10 w/ 6ft Table
|20x20 w/ 6ft Table
|Logo and listing on website with hyperlink
|Logo and listing on agenda website with hyperlink
|Logo and listing in conference brochure
|Logo shown on pre-session slideshow
|Conference internet access
|Included in sponsor game
|Included in mingle bingo game
|Post-Conference attendee list (opt-in contacts only)
|Enhanced exposure on conference signage and pre-session slideshow
|Logo shown on conference signage
|Company logo on back of conference brochure
|1-2 pieces of product literature in conference bag
|5-minute product pitch at breakfast
|Pre-Conference attendee list (Opt-in contacts)
|Additional attendee registrations
|See attendee pricing
|5-minute company pitch during vendor speed round (8 spots available)
|Welcome reception sponsorship
|Beverage sponsorship (Signage stays up all day)
|Logo added in 3 KEYS email promos (6 available – Sent to 3,000+ contacts)
|Wireless Internet Sponsorship
|Snack break sponsorship (3 available – Signage up during breaks)
|Pre-Conference session sponsorship (2 available)
The spring forum provides a gathering place for security-minded companies to learn about the newest ideas in information security.
Tandem sessions are designed to foster valuable business connections between users and to provide an opportunity to discuss future software development with the Tandem staff.
The conference takes place in April in the DFW area. Join us for three days of connection, education, and fun!
What to Expect at KEYS
Designed for You
If you work in information security or technology, KEYS is designed just for you.
Attend sessions from the Tandem track to learn about Tandem products and how to use Tandem to solve pressing issues in compliance and security.
Cybersecurity, Risk & Compliance
Attend sessions from the Cybersecurity track and/or the Risk & Compliance track to discover the latest tips, trends, and issues around cybersecurity, risk, and compliance.
User Group Discussions
Attend the User Group keynote session to learn what's new in Tandem and have valuable discussions with peers and consultants about challenges and solutions.
"If you have recently subscribed to any Tandem product, are a long-time user, or simply care about the security of your customers' information, I strongly suggest that you take the time to attend this very worth-while event. The networking, testimonials, and workshops, along with the enthusiasm and knowledge of the Tandem staff, make this a definite event for you AND your colleagues to add to your calendar!"
Information Security Coordinator
"I highly recommend attending the Tandem KEYS conference. The workshops allow clients and the developers to work closely discussing functionality and changes clients would like to see implemented. Additionally, I was able to gain experience from other peers attending the conference which helps our overall institution's processes. Attending the conference is a tremendous value for our organization."
Information Security Specialist
Stop ransomware! ThreatLocker® Endpoint Protection Platform provides Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Operational Alert solutions. ThreatLocker® is designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what runs on their networks.
DataBee transforms your security and IT data points into integrated and accessible intelligence. Inspired by Comcast's CISO and CTO organization, the DataBee platform connects disparate data sources and feeds to merge them with your organizational data and business logic, creating a shared and enhanced dataset that delivers continuous compliance assurance, proactive threat detection with near-limitless hunts, and improved AIOps while optimizing data costs. Create data-driven collaborators from every part of the organization by tapping into ubiquitous and precise insights ready for high performance analytics and reporting. Go from data mess to connected outcomes for security, compliance, and AIOps.
CoNetrix specializes in providing IT security services, security testing, and consulting for financial institutions. CoNetrix information security and compliance services are designed to validate controls, sustain compliance, and improve banks’ overall security posture. CoNetrix offers IT/GLBA audits and network assessments, penetration testing, VISO services, managed IT and security services, and private cloud hosting with options for disaster recovery.
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities. Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value. CrowdStrike: We stop breaches.
For more than two decades, PrintMail has helped hundreds of financial institutions reduce costs with well-designed, accurate, and reliable paper statement printing and mailing. Since 2007, PrintMail customers have realized additional cost savings with PrintMail’s eStatement Services. Save on the costs of printing and mailing while offering an attractive eStatement design to drive conversions. We seamlessly interface to your core platform, imaging software, and digital banking provider. Whether your customers/members choose physical or electronic statement delivery, our commitment to quality, accuracy, and security is the same.
Pure IT is a Credit Union Service Organization that provides Strategic Technology Consulting. We partner with credit unions to offer Professional Services, Infrastructure Project Implementations, and Technology Managed Services. With partnership at its core, Pure IT can tailor technology solutions to the competitive advantage of each credit union. We use technology to fulfill credit union strategy and business needs, creating an efficient IT ecosystem that helps our partners achieve their goals.
Become a Sponsor
The KEYS Conference presents the opportunity to network with technology decision makers.
Please contact us for more information regarding sponsoring the KEYS Conference.