Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 26, 2016
    9:00 am
    Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
  • Thursday, October 27, 2016
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    7:30 am
    Advisory Council VIP Kickoff Breakfast - Let's Talk About Risk (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    8:30 am
    DarkTrace: The Enterprise Immune System: Using Machine Learning For Next Generation Cyber Defense
    • session level icon
    speaker photo
    VP, DarkTrace
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    8:30 am
    Mobile Computing: Threats, Vulnerabilities and Risk Factors
    • session level icon
    speaker photo
    Chief Information Security Officer, City of Palo Alto
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Productivity Tools or Security Blindspots?
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    ISSA Session: Building and Securing a True Disaster Recovery within the Cloud
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Senior Cloud Security Engineer, Netflix
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Blockchain As Security?
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    U.S. Dept. of Justice, Stanford University
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:15 am
    Defending Against Cyber Threats in Complex Environments
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    Gaining Better Visibility into Risk- The Future of GRC
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Managing Director, Grant Thornton
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    War Stories from the Trenches – Information Security Survival
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    12:00 pm
    VIP Lunch Roundtable – VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Radware The Current Economics of Cyber Attacks
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    1:15 pm
    Ensilo: We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat?
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Co-Founder & CEO, enSilo
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    1:15 pm
    Panel: Rise of the Cyber Criminal
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    1:15 pm
    Tomorrow’s Datacenter Security is Needed Today
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit floor
    2:30 pm
    Dash for Prizes Winners Announced
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    4 Tips for CIOs to Secure Mobile Endpoints
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    Arbor Networks: Advanced Threat & DDoS Landscape
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Principal Security Technologist, NETSCOUT Arbor
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    Breaking the Kill Chain - How to Prevent, Detect, and Mitigate Threats to Your Organization
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    Globalization of Cyber Crime
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Assistant to the Special Agent in Charge, United States Secret Service, San Francisco Field Office
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
Exhibitors
  • Alert Logic
    Booth: 207

    Whether your company is transitioning infrastructure to the cloud, taking advantage of managed hosting services, or continuing to rely on owned data centers, Alert Logic offers intrusion detection, vulnerability assessment and log management solutions that are coupled with 24/7 monitoring and expert guidance services from our security operations center. More than 1,500 enterprise customers trust Alert Logic to secure and protect their digital information, and rely on us for keeping in step with increasingly complex regulatory issues. In addition to our team of GIAC analysts dedicated to careful observation and assessment of threats to your data, our research team stays on top of emerging developments so we can stop potential security breaches before they strike. We also have a dedicated support team ready to answer any questions you have about our products and services.

  • NETSCOUT Arbor
    Booth: 103

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • BRMA
    Booth: TBD

    BRMA is Northern California’s largest business recovery association. We are pleased that you found our web site. This must mean that you have an interest in disaster recovery planning, business recovery planning, or emergency response management. Our membership and programs may have the answers to your questions, or we may be able to direct you to those answers.

  • Business Resiliency and Relief Foundation
    Booth: TBD

    The Business Resiliency and Relief Foundation was first formed as a foundation to assist small and medium sized businesses with aid and relief after a disaster and assist them with their needs to enable them to continue to function and operate.

  • Cisco
    Booth: TBD

    Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

  • CSO Council
    Booth: TBD

    The CSO Council is a non-profit corporation that supports a community of CSOs enabling the members to leverage experience and expertise of each other for the more effective and timely protection of their organization’s critical information assets. The CSO Council organizes conferences, panel discussions, webinars and special events to facilitate communications among its members and the information security community.

  • CyberArk Software
    Booth: 108

    CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

  • Darktrace
    Booth: 247

    Darktrace is the world’s leading AI company for cyber defense. With over 7,000 deployments worldwide, the Enterprise Immune System is relied on to detect and fight back against cyber-attacks in real time. The self-learning AI takes one hour to install, works across the cloud, SaaS, corporate networks, IoT and industrial systems, and protects against the full range of cyber-threats and vulnerabilities, from insider threats and ransomware, to stealthy and silent attackers. Darktrace has 800 employees and 40 offices worldwide, with headquarters in San Francisco, and Cambridge, UK.

  • Digital Forensics Association (DFA)
    Booth: TBD

    The Digital Forensics Association (DFA) is a non-profit organization dedicated to fostering education, providing networking opportunities and conducting research to benefit the digital forensics community.

  • enSilo
    Booth: 203

    enSilo is a cyber-security company that offers a real-time data protection platform against advanced attacks. The company was founded on the recognition that external threat actors cannot be prevented from infiltrating networks, and instead focuses on preventing the theft and tampering of critical data in the event of a cyber-attack. enSilo enables organizations to continue running their business operations securely and without interruption, even during investigation and remediation of attacks, by blocking in real-time any data-related malicious activity. enSilo’s platform requires no prior knowledge or configuration of users or data.

  • Fidelis Cybersecurity
    Booth: 241

    Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy. For more information, go to www.fidelissecurity.com.

  • Forcepoint
    Booth: TBD

    Forcepoint safeguards users, data and networks against the most determined adversaries, from insider threats to outside attackers, across the threat lifecycle – in the cloud, on the road, in the office. It simplifies compliance and enables better decision-making for more efficient remediation, empowering organizations to focus on what’s most important to them.

  • ForeScout Technologies, Inc.
    Booth: TBD

    ForeScout Technologies, Inc. has pioneered an agentless approach to network security to address the explosive growth of the Internet of Things (IoT), cloud computing and operational technologies (OT). We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of today’s vast array of physical and virtual devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2018, more than 2,900 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions.

  • GirlsCanHack
    Booth: TBD

    GirlsCanHack’s mission is to make the world of cybersecurity accessible to women, motivate them to pursue a career in this field, and support them while doing it. “Women are natural hackers. They have the mindset. They just need technical skills.”

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA Sacramento Chapter
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.

  • ISACA Silicon Valley Chapter
    Booth: TBD

    ISACA-SV is proud to serve our Bay Area constituents. Our mission is to serve those involved with various aspects of information security, assurance, risk management, privacy, audit, and similar topics associated with IT control and governance related activities.

    The Silicon Valley Chapter of ISACA® was started in 1982, and has grown to over 800 members. Our members reside throughout the Bay Area centering in the Silicon Valley. We are a very active chapter, and have won multiple awards over the years, including two worldwide awards.

  • International Information Systems Security Certification Consortium, Inc., (ISC)²®
    Booth: TBD

    Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

  • ISSA New England
    Booth: TBD

    The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.

    Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.

    Visit the National Headquarter’s website at www.issa.org.

  • NETSCOUT
    Booth: 236

    NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.

  • Radware
    Booth: 200

    Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

  • Sirius
    Booth: TBD

    Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.

  • Spirent Communications
    Booth: TBD

    Spirent Communications is the industry leader in security and applications testing solutions. Today’s IT needs granular visibility of data, giving rise to a new generation of network security solutions like Next Generation Firewalls, SDN, IDS, and IPS. To better-prepare and protect your network, Spirent offers state-of-the-art testing technology to help you gauge the performance and effectiveness of your security environment by emulating the most realistic traffic volumes, stressing with high rate DDoS attacks, assessing security strength with real threat and attack scenarios, and testing security robustness with advanced fuzzing capabilities.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales e-Security
    Booth: TBD

    Thales e-Security is the leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. We ensure that the data belonging to companies and government entities is both secure and trusted in any environment – on-premise, in the cloud, in data centers or big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged user control and high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales e-Security is part of Thales Group.

  • Venafi
    Booth: TBD

    Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice. As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility. Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Randy Cheek
    VP, DarkTrace

    Randy Cheek has over 10 years experience in the enterprise software industry across a number of roles, both commercial and technical. From startups to Fortune 500 companies, he has led teams responsible for key strategic accounts and has consistently led business growth throughout his career. As one of the first members of Darktrace US, he offers a unique perspective on the security industry and its approaches to cyber defense. Randy holds a degree in Applied Mathematics and resides in the Bay Area.

  • speaker photo
    Raj Patel
    Chief Information Security Officer, City of Palo Alto

    As CISO since early 2012, Raj has established an Information Security Steering Committee comprised of executive management, and developed an information security strategy and roadmap for future activities. In support of the strategy to ensure the confidentiality, integrity and availability of the information systems that support the operations and assets of the City, he has implemented an ISO 27001-based (Information Security Management Systems) security framework and created a new Information Security and Privacy Policies.

    Prior to joining the City of Palo Alto, Raj held positions as Director of Information Security and Compliance at Kaiser Permanente, Chief Information Security Marshal at Oracle Corporation/Sun Microsystems, and Senior IT Manager for Development and IT Security at Sun Microsystems. It was during this period that he published Business Process Outsourcing (BPO) Security Policy and Specifications, which became an industry-leading practices to ensure security and privacy.

  • speaker photo
    Jeremy Heffner
    Senior Cloud Security Engineer, Netflix

    Mr. Heffner is a software and security professional who has worked on numerous commercial and government projects. His passion is for securing and building scalable, survivable, and fault-tolerant distributed systems. His focus includes cyber attack and defense, information gathering and analysis, and scaling systems globally through automation and dynamic optimization.

  • speaker photo
    Kathryn Haun
    U.S. Dept. of Justice, Stanford University

    Please note: Kathryn will be speaking in her personal, not official capacity.
    Based in San Francisco, Kathryn Haun is a federal prosecutor with the U.S. Department of Justice and is its first-ever coordinator for emerging financial technologies. Since 2006, she has served as an Assistant U.S. Attorney, first in the Washington D.C. area and later in San Francisco, California. She has investigated and prosecuted hundreds of violations of federal criminal law in U.S. courts, with a focus on organized crime syndicates, cybercrime, the Dark Net, and fraud. Kathryn speaks frequently to international and domestic audiences on the intersection of emerging technologies and government regulation. In addition to her role at the Justice Department, she teaches Stanford Law School’s first-ever course on Cybercrime and Digital Currency and is frequently called on by U.S. and international policymakers for her expertise in these areas.

    She has successfully investigated and prosecuted corporate compliance failures, and negotiated criminal resolutions with Fortune 500 tech companies. Kathryn has also served as lead counsel in numerous jury trials, including RICO murder and organized crime cases, all to successful verdict, and led several high-profile, complex investigations including against Ripple Labs, Inc. and against the former federal agents investigating the Silk Road marketplace.

  • speaker photo
    Orus Dearman
    Managing Director, Grant Thornton
  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    Roy Katmor
    Co-Founder & CEO, enSilo
  • speaker photo
    Gary Sockrider
    Principal Security Technologist, NETSCOUT Arbor

    Gary is an industry veteran bringing over 25 years of broad technology experience ranging from network security to routing and switching, data center, mobility and collaboration. His previous roles include security SME, consultancy, customer support, IT and product management. He seeks to understand and convey the constantly evolving threat landscape, as well as the techniques and solutions that address the challenges they present. Prior to joining Arbor in 2012, he spent 12 years at Cisco Systems and held previous positions with Avaya and Cable & Wireless.

  • speaker photo
    Shawn Bradstreet
    Assistant to the Special Agent in Charge, United States Secret Service, San Francisco Field Office

    Shawn M. Bradstreet is the Assistant to the Special Agent in Charge at the San Francisco Field Office. In this capacity, Mr. Bradstreet is the supervisor of the San Francisco Electronic Crimes Task Force and previously supervised the Bay Area Financial Crimes Task Force. Mr. Bradstreet is a 17-year veteran of the U.S. Secret Service.

    Mr. Bradstreet is a 17-year veteran of the U.S. Secret Service. He started his career as a Uniform Division Officer at the White House Branch. He transferred to the New York Field Office serving on the New York Electronic Crimes Task Force, Financial Crimes Squad, Counterfeit Section, and the Protection squad. Mr. Bradstreet relocated back to Washington, D.C. where he served on the Presidential Protective Division under Former President George W. Bush and President Barack H. Obama. Mr. Bradstreet most recently served a three year assignment in the Criminal Investigative Division at Secret Service Headquarters in Washington D.C.

    Mr. Bradstreet is a native of Northern Maine and received a Bachelor of Arts in Criminal Justice at Cedarville University in Ohio.

secure world app
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store