Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, June 1, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration Desk7:30 amTechnology Association of Georgia (TAG) Open to All AttendeesRegistration Level:Open Sessions
7:30 am - 9:00 am8:00 amExecutive Advisory Council Breakfast - (VIP / INVITE ONLY)Registration Level:VIP / Exclusive
8:00 am - 9:30 amLocation / Room: Ballroom D8:00 amSecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO PlatformRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:00 amSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (SecureWorld Plus Registrants ONLY)CISO and Adjunct Faculty, University of MassachusettsRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:00 amSecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)CISSP, President, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:30 amAre You Trading Your Privacy for Magic Beans?Registration Level:Conference Pass
8:30 am - 9:15 am8:30 amEvolving Your Security Strategy for the Complex Connected IoT EnvironmentRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amForensics on Mobile DevicesRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amPrivacy & Security Issues in Cloud ContractsRegistration Level:Conference Pass
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Digital Doomsday- a Message from the U.S. Cyber Defense Advisor to NATORegistration Level:Open Sessions
9:30 am - 10:15 am10:15 amConference Break/Exhibitor Product DemonstrationsRegistration Level:Open Sessions
10:15 am - 11:15 am11:00 amExecutive Roundtable- Identity is the New Firewall- VIP/Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm11:15 amEdgar Allan Poe: Paradox, Enigma, GeniusCISSP, President, O'Leary Management EducationRegistration Level:Conference Pass
11:15 am - 12:15 pm11:15 amHow to Stop Ransomware from Pwning Healthcare!Registration Level:Conference Pass
11:15 am - 12:00 pm11:15 amRadware: Cyber War Chronicles- Stories From the Virtual TrenchesSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
11:15 am - 12:00 pm11:15 amTrend Micro: The State of the Online UndergroundRegistration Level:Open Sessions
11:15 am - 12:00 pm12:00 pmExecutive Roundtable- Embracing the Risk - VIP/Invite OnlyRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Radware- The Current Economics of Cyber AttacksRegistration Level:Open Sessions
12:15 pm - 1:00 pm1:15 pmASDFED Chapter Meeting - Moving Digital Evidence the Right Way - Open to All Attendees CcccccccRegistration Level:Open Sessions
1:15 pm - 2:30 pm1:15 pmPanel: Current ThreatscapeRegistration Level:Open Sessions
1:15 pm - 2:15 pm1:15 pmPanel: Locking Down the EndpointsRegistration Level:Open Sessions
1:15 pm - 2:15 pm1:15 pmSecureAuth: Identity in Security - Know Who’s in Your NetworkRegistration Level:Open Sessions
1:15 pm - 2:15 pm2:15 pmSecureAuth: Identity in Security - Know Who’s in Your NetworkRegistration Level:Open Sessions
2:15 pm - 3:00 pm2:15 pmConference Dessert Break/Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pm3:00 pmCybersecurity: A New ParadigmRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmMistakes Are the Portal to DiscoveryRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmPrivacy, Risk, and the Internet of ThingsRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmSecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO PlatformRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmSecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)CISSP, President, O'Leary Management EducationRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (SecureWorld Plus Registrants ONLY)Registration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmUnderstanding & Stopping Insider ThreatsRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmUnderstanding & Stopping Insider ThreatsRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:45 pmSecureWorld Casino After-PartyRegistration Level:Open Sessions
3:45 pm - 5:45 pm - Thursday, June 2, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
7:00 am - 3:00 pm8:00 amSecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrations ONLY)Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO PlatformRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:00 amSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity FrameworkCISO and Adjunct Faculty, University of MassachusettsRegistration Level:8:00 am - 9:30 am8:00 amSecureWorld Plus: Handling & Managing Security IncidentsCISSP, President, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:15 amInfraGard Chapter Meeting- Open to All Attendees- Geopurgatory: An Internet Mystery and a Haunted HouseRegistration Level:Open Sessions
8:15 am - 9:15 am8:30 amData Breach Digest- Scenarios from the FieldPrincipal Client Partner, Verizon Enterprise SolutionsRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amIT Governance: Why You Don't Always Have to Keep Up With the JonesesRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amNavigating the Vulnerability Management MazeRegistration Level:8:30 am - 9:15 am8:30 amSecurity & Risk Strategy Development Through an Original Feedback LoopRegistration Level:Conference Pass
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Phishing Dark Waters: Don't End Up on the HookRegistration Level:Open Sessions
9:30 am - 10:15 am10:15 amConference Break/Exhibitor Product DemonstrationsRegistration Level:Open Sessions
10:15 am - 11:15 am10:15 amISSA Chapter Meetings- Open to All Attendees- Compliant Yes, Secure No, What Does My Cyber Insurance Cover? The Controversy Continues...Registration Level:Open Sessions
10:15 am - 11:15 am11:00 amExecutive Roundtable- Measuring the Effectiveness of Your Security Program- VIP/Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm11:15 amCisco: Strategies for Defending Against a New Breed of AttacksSr. Information Security ConsultantRegistration Level:Open Sessions
11:15 am - 12:00 pm11:15 amEmerging Technology and Security StrategyRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amI See What You Say: Effectively Communicating with Non-Technical StaffRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amPanel: Agile Security ManagementRegistration Level:Open Sessions
11:15 am - 12:00 pm11:15 amThe Horse Has Left the Barn and We Have the Saddle- Our Journey Into the CloudRegistration Level:Conference Pass
11:15 am - 12:00 pm11:00 amGeorgia ACFE (Association of Certified Fraud Examiners) Meeting - Open to All Attendees "Understanding the Cyber-Security Landscape"Registration Level:Open Sessions
11:00 am - 1:30 pm12:00 pmExecutive Roundtable- Manage the Damage- Lunch Served VIP/Invite ONLYRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Trend Micro- The Year of Cyber ExtortionRegistration Level:Open Sessions
12:15 pm - 1:00 pm1:00 pmACP Chapter Meeting- ACP Members OnlyRegistration Level:VIP / Exclusive
1:00 pm - 2:00 pm1:15 pmPanel: After the AttackRegistration Level:Open Sessions
1:15 pm - 2:15 pm1:15 amPanel: Emerging ThreatsRegistration Level:Open Sessions
1:15 am - 2:15 pm2:15 pmConference Dessert Break/Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pm3:00 pmDeveloping Trends in Cyber Information WarfareRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmInformation Security - Beyond the PerimeterCISO, Pulte Financial Services, & Co-Host, Colorado = Security podcastRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmVulnerability Assessment and Penetration Testing- Why?Registration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmYou're a new CISO. Now What?Registration Level:Conference Pass
3:00 pm - 3:45 pm
- <Atlanta, GA 2016Booth: TBD
- Dan LohrmannChief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.
Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.
Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.
He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.
- Larry WilsonCISO and Adjunct Faculty, University of Massachusetts
Larry Wilson is currently a senior consultant and former Chief Information Security Officer for the University of Massachusetts President's Office. In the CISO role, Larry was responsible for developing, implementing and overseeing compliance with the UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the UMass cybersecurity program, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. Larry has also worked with multiple companies in multiple industries to help design, build and maintain their Cybersecurity Programs and evaluate their current security posture.
- John O'LearyCISSP, President, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award
- John O'LearyCISSP, President, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Dan LohrmannChief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.
Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.
Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.
He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.
- John O'LearyCISSP, President, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award
- Dan LohrmannChief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.
Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.
Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.
He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.
- Larry WilsonCISO and Adjunct Faculty, University of Massachusetts
Larry Wilson is currently a senior consultant and former Chief Information Security Officer for the University of Massachusetts President's Office. In the CISO role, Larry was responsible for developing, implementing and overseeing compliance with the UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the UMass cybersecurity program, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. Larry has also worked with multiple companies in multiple industries to help design, build and maintain their Cybersecurity Programs and evaluate their current security posture.
- John O'LearyCISSP, President, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award
- Bhavesh ChauhanPrincipal Client Partner, Verizon Enterprise Solutions
Bhavesh Chauhan is a Principal Client Partner - Security Evangelist within Verizon CTO organization. Previously a Principal in Financial Services and lead the Security Engineering and Professional services for the North East Region of Americas, which includes Enterprise, Government Accreditor, Security Principal, Consultant, Engineer and Architect on security engagements; and has delivered various information security engagements to assist customers mitigate risks and improve security maturity across the enterprise. Bhaves routinely represents Verizon at information security forums and has delivered various public speaking engagements. He is board member of the ISACA local chapter.
Along with his experience, Bhavesh holds a Master's of Science Degree in Physics and a number of professional security certifications such as CISSP, CISA, and CISM. Furthermore, he has been a CESG certified Information Assurance advisor to UK public sector and Defense from 2001 to 2010.
- John E. OdeSr. Information Security Consultant
John Ode has been involved in forensic computer analysis for over ten years. Well-versed in data recovery and analysis, Ode's broad experience includes computer forensics analysis, advanced data recovery and analysis, networking and telecommunications, computer security, client/server applications and implementations, and Internet Information Servers. As an Information Security Consultant for a large utility company, Ode provides internal consulting and technical advice on a wide variety of information including security issues, concerns, and problems. He is responsible for incident response for computer events, provides computer forensic support to the company's legal team, and offers direction, advocacy and awareness in line with the information security policies and architecture for the company as a whole.
In previous job roles, Ode held the position of senior IT systems security analyst for the Idaho State Police Cyber Crime Unit. Mr. Ode joined the Idaho State Police from Adecco, where he provided multi-platform server and security support for MPE, UNIX, NT, and SAP systems on a 24x7 basis to clients worldwide. Prior to Adecco, he began his career as a Unix Systems Security Officer and Systems Administrator for the US Air Force at Elmendorf Air Force in Anchorage, Alaska. Ode holds a BS in Information Technology from the University of Phoenix, Idaho campus and an Associate of Applied Science degree from Maxwell Air Force Base, Alabama.
- Alex WoodCISO, Pulte Financial Services, & Co-Host, Colorado = Security podcast
Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes