Click here to view registration types and pricing (PDF)
2017 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 4, 2017
    9:00 am
    SecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    SecureWorld PLUS registrants ONLY
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 201

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.

  • Thursday, October 5, 2017
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:30 am
    Keeping Information Security Simple
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    The greatest problems for Information Security are the pervasive fear, uncertainty and doubt many business leaders feel about the costs and benefits surrounding cyber security, leading many to ignore or underinvest in even the most basic risk assessment and mitigation that could save their businesses. But even a simple risk assessment can highlight and quantify enormous risks, which are sometimes easily and cheaply remedied. Frameworks and questionnaires for assessing risk are readily available and straightforward to apply. Opportunities for improvements will be highlighted with compelling examples.

    8:30 am
    The Road To Hiring is Paved in Good Intentions
    • session level icon
    speaker photo
    President, (ISC)2 Silicon Valley Chapter
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Data Breach Digest – Perspective is Reality
    • session level icon
    speaker photo
    Digital Forensics Investigator , Verizon RISK Team
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: 203

    Data breaches are complex affairs. Response activities are proportionately complex involving various stakeholders with slightly different perspective. This presentation covers the 2017 "Data Breach Digest – Perspective is Reality"; a compendium of data breach scenarios told from different stakeholder points of view covering their decisions, actions and crucial lessons learned.

    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    9:30 am
    OPENING KEYNOTE: Building and Nurturing Your Modern Cybersecurity Risk Programs
    • session level icon
    speaker photo
    3-time former CISO (vArmour, Sears, Silver Trail Systems), Founder and IT Security Strategist, Blue Lava Consulting
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    In this presentation, Demetrios Lazarikos (Laz) will explore topics that are top of mind for Fortune 1000 Executives, Board of Directors, and practitioners that have direct involvement in building and assessing modern cybersecurity strategies and programs. Additionally, Laz will provide real world examples and best practices to effectively create, support, and evaluate the lifecycle of cybersecurity programs—a pragmatic session that is not to be missed.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable
    • session level icon
    (VIP / Invite Only)
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: 205
    11:15 am
    IoT Threat Analysis
    • session level icon
    Gain a better understanding of the risks involved with IoT devices.
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    This session will review the current threat landscape, identify security concerns, provide examples and offer recommendations on securing the devices.

    11:15 am
    GDPR: A Check-In on Readiness, Rollout, and Watch-outs
    • session level icon
    speaker photo
    Founder, Mumuration, Inc.
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 204

    The EU General Data Protection Regulation (GDPR) becomes enforceable on May 25, 2018. While well-executed GDPR compliance can empower trust and transparency between individuals and organizations, the depth and complexity of implementation can place significant pressures on IT security. This presentation discusses GDPR readiness, rollout, and watch-outs.

    11:15 am
    Darktrace: Autonomous Cyber Defense: AI and the Immune System Approach
    • session level icon
    speaker photo
    Manager, Darktrace
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 201

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.

    Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 205

    Advisory Council - VIP / INVITE ONLY

    12:15 pm
    LUNCH KEYNOTE: Identifiers vs. Authenticators, and the Initial Authentication Problem
    • session level icon
    Lessons Learned from The Equifax Breach
    speaker photo
    Chief Information Security Officer, Stanford University
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    The recent Equifax breach underscores the importance of differentiating identifiers and authenticators. In this presentation, we'll explore the challenges of and potential approaches to the initial authentication of people to services.

    1:15 pm
    Panel: Hazards on the Horizon - Emerging Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    Just as in the days of yore, you must have watch guards in the tower scanning the horizon for enemy banners. If you follow cyber threats, then you know that the landscape is constantly changing. From the bring your own device (BYOD) workplace to mobile-malware, social engineering, and everything in between, information security has transformed. In order stay ahead of the ever-changing threats, it is imperative to constantly improve and change security policies. Join industry experts as they discuss the importance of rolling with the changes, and how your company can stop the threat before it gets to the castle gate.

    1:15 pm
    Panel: Beware the Highwaymen: Rise of the Cyber Criminal
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 203

    Modern civilization has always been plagued by various classes of criminals. Travelers would hire guards to protect their caravans from hijackers. Thieves came up with various ploys to trick travelers on the road. In today’s day and age the advent of interconnected devices, allowing for portability of corporate secrets, has given rise to a completely different class of nefarious actors. Cyber criminals range from those bent on stealing your personal information to “cyber terrorists” who have the capability to inflict harm on a much wider scale. Uninhibited by current laws, they are very effective given the speeds of networks, lack of appropriate security controls, and the anonymous nature of the attacker. Making matters worse, the crime may be perpetrated by entities outside of the legal jurisdiction where the unlawful act took place. This panel will explore the tools these criminals use, what can be done to prevent them, and how to safeguard your data.

    1:15 pm
    OneTrust: EU Privacy Update: All About the New Disruptive Regulation, The GDPR
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: 201

    As a new era of privacy regulations approaches, security and compliance professionals need to make the GDPR a top priority by building privacy into your security plans. In this session, we'll discuss the key components and importance of the EU's GDPR, and how it directly affects the security professional from data mapping and classification to strict incident response requirements. We’ll also address the importance of demonstrating on-going compliance, and how privacy management software can support security and compliance teams.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    The Power of Apprenticeships in Cybersecurity: A Case Study Solving Skill Gaps to Meet Future Employer Demands
    • session level icon
    speaker photo
    CEO, Transmosis
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 201

    Transmosis Corporation defined and developed the first cybersecurity apprenticeship program in the ICT sector in California. This presentation will provide employers with useful ways to build a pipeline of talent at lower costs, which in turn have higher retention.

    3:00 pm
    Surviving the Siege: Medieval Lessons in Modern Security
    • session level icon
    Discover the 2017 SecureWorld Theme
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    Warfare and the arts of intrusion have advanced considerably since the Middle Ages, but in many ways the principles of fortification we use today remain the same. The great castles of antiquity were ingeniously designed with multiple layers of physical security to protect their inhabitants from persistent, even advanced enemy threats. Their carefully planned and creative defensive measures provide rich metaphors, both positive and negative, for today’s cyber guardians. On the other hand, clever, daring, sometimes brilliant offensive strategies and tactics have historically breached battlements thought to be unassailable. Come join us as we examine lessons that can be applied to securing our own sophisticated digital fortresses.

    3:00 pm
    Mobile Cyber Targets
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    Mobile devices currently come in a large variety of options and as technology progresses those options and cyber risks will potentially become more a reality. So how are devices and data on them targeted now and how can a cyber mobile attack affect you and your business.

    3:00 pm
    Frenemies No More: How Containers Fundamentally Change the Security-Business Relationship
    • session level icon
    speaker photo
    Sr Architect, StackRox
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 203

    There have been many technologies over the past two decades that have helped reshape the landscape for how we operate and secure our businesses. Server and desktop virtualization, the use of mobile devices, the different forms of cloud computing and machine learning are a few examples. Right now there is another technology challenging to reshape that landscape again. The tidal wave of application containerization with Docker is here and companies are adopting this new technology even faster than previous technologies.

    But what does this mean for security? Why is there value in the adoption of containers and orchestrators such as Kubernetes and Mesosphere? How can you use the adoption of containers as an opportunity for better security? What are the obvious challenges, and what are the hidden challenges of securing containers? Come to this presentation to hear more about business considerations for the rapid adoption of application containers. I will also discuss the new approaches needed for security, including new opportunities for better security that is built in and transparent to enable developer velocity and rapid innovation.

Exhibitors
  • #brainbabe
    Booth: TBD

    #brainbabe is directly impacting these statistics: 10% of the cybersecurity workforce is women; 1% of the cyber community is women leaders; and 53% of women end up leaving the industry.
    We do this by:
    1) Offering classroom training for women who want to join the cybersecurity profession
    2) Providing soft skills training to all cybersecurity professionals, enabling effective and harmonious interactions with team members in any environment
    3) Raising awareness about the numerous careers in cybersecurity for girls and women

  • Centrify
    Booth: 204

    Centrify provides unified identity management across data center, cloud and mobile environments. Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

  • Check Point Security
    Booth: 109

    Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

  • CISOSHARE
    Booth: TBD
  • CSO Council
    Booth: TBD

    The CSO Council is a non-profit corporation that supports a community of CSOs enabling the members to leverage experience and expertise of each other for the more effective and timely protection of their organization’s critical information assets. The CSO Council organizes conferences, panel discussions, webinars and special events to facilitate communications among its members and the information security community.

  • Darktrace
    Booth: 208

    Darktrace is the world’s leading machine learning company for cyber security. Created by mathematicians from the University of Cambridge, the Enterprise Immune System uses AI algorithms to automatically detect and take action against cyber-threats within all types of networks, including physical, cloud and virtualized networks, as well as IoT and industrial control systems. A self-configuring platform, Darktrace requires no prior set-up, identifying advanced threats in real time, including zero-days, insiders and stealthy, silent attackers. Headquartered in San Francisco and Cambridge, UK, Darktrace has 24 offices worldwide.

  • Dasher Technologies
    Booth: 206

    Dasher Technologies, Inc. ® is a premier IT solution provider that delivers expert technical resources along with trusted account executives to architect and deliver complete IT solutions and services to help our clients execute their goals, plans and objectives.

  • Delta Risk
    Booth: 101

    Delta Risk was founded in 2007 from a vision of strategic and operational effectiveness to assist private sector and government organizations in understanding their current cyber security posture and building advanced cyber defense and risk management capabilities. We are a global provider of strategic, operational, and advisory solutions, including managed security services and security consulting services. Delta Risk is a Chertoff Group company.

  • DirectDefense
    Booth: 401

    Founded in 2011, DirectDefense offers security services that are unmatched within the industry. Our core strength is our deep experience in performing assessments for a wide array of networks, platforms, and applications. Our seasoned consultants are focused on providing world-class security services to our clients.

    Regardless of industry – financial, insurance, retail, hospitality, healthcare, education, gaming, technology, or energy and utilities, our wealth of knowledge and experience can assist you in achieving your security testing and strategy goals.

  • Dome9
    Booth: 107

    Dome9 delivers verifiable cloud infrastructure security and compliance to organizations across every public cloud. The Dome9 Arc SaaS platform leverages cloud-native security controls and cloud-agnostic policy automation to enable comprehensive network security, advanced IAM protection, and continuous compliance in Amazon Web Services (AWS), Microsoft Azure and Google Cloud environments. Dome9 offers technologies to assess security posture, detect misconfigurations, model gold standard policies, protect against attacks and identity theft, and conform to security best practices in the cloud. Organizations use Dome9 Arc for faster and more effective cloud security operations, pain-free compliance and governance, and rugged DevOps practices.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • ExtraHop
    Booth: TBD

    ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com

  • FireEye
    Booth: 111

    FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000.

  • FireMon
    Booth: 409

    FireMon is at the forefront of the security management category, delivering first-ever functionality such as firewall behavior testing, workflow integration, traffic flow analysis and rule recertification. Our solutions have helped more than 1,500 organizations around the world gain visibility into and control over their complex network security infrastructures.

  • ISC2
    Booth: TBD

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation - The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISSA San Francisco Bay Area
    Booth: TBD

    Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.

  • ISACA
    Booth: TBD

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • Ixia
    Booth: 103

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks.
    Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • OneTrust
    Booth: 108

    OneTrust is the leading and fastest growing privacy management software platform used by hundreds of organizations globally to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and Privacy Shield.

  • Proofpoint
    Booth: 202

    Proofpoint secures and improves enterprise email infrastructure with solutions for email security, archiving, encryption and data loss prevention. Proofpoint solutions defend against spam and viruses, prevent leaks of confidential and private information, encrypt sensitive emails and archive messages for retention, e-discovery and easier mailbox management. Proofpoint solutions can be deployed on-demand (SaaS), on-premises (appliance) or in a hybrid architecture for maximum flexibility and scalability. For more information, please visit http://www.proofpoint.com.

  • SentinelOne
    Booth: 205

    SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.

  • Sumo Logic
    Booth: 203

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • Synopsys
    Booth: 201

    Synopsys offers the most comprehensive solution for integrating security and quality into your SDLC and supply chain. Whether you’re well-versed in software security or just starting out, we provide the tools you need to ensure the integrity of the applications that power your business. We don’t stop when the test is over. Our experts also provide remediation guidance, program design services, and training that empower you to build and maintain secure software. For more information go to www.synopsys.com/software.

  • IBM Resilient
    Booth: 104

    IBM Resilient’s mission is to help organizations thrive in the face of any cyberattack or business crisis. The industry’s leading Incident Response Platform (IRP) empowers security teams to analyze, respond to, and mitigate incidents faster, more intelligently, and more efficiently. The Resilient IRP is the industry’s only complete IR orchestration and automation platform, enabling teams to integrate and align people, processes, and technologies into a single incident response hub. With Resilient, security teams can have best-in-class response capabilities. IBM Resilient has more than 150 global customers, including 50 of the Fortune 500, and hundreds of partners globally. Learn more at www.resilientsystems.com.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Venafi
    Booth: 102

    Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice. As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility. Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

  • Ziften
    Booth: 301

    Ziften delivers all-the-time visibility and control for any asset, anywhere - client devices, servers, and cloud VMs – whether on-network or remote; connected or not. Our SysSecOps platform empowers enterprises, governments, and MSSPs to quickly repair endpoint issues, reduce their overall risk posture, speed threat response, and increase operations productivity.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Tim O'Brien
    President, (ISC)2 Silicon Valley Chapter

    Tim O’Brien is a 17-year information security professional and a subject matter expert in risk and
    incident management, intrusion and data analysis and secure architecture design. Tim is well versed in
    developing technical solutions, determining the best options for the business and its goals, and creating
    comprehensive implementation plans that minimize risk for the organization. His excellent analytical
    and problem-solving skills, with emphasis on understanding relationships among technical problems,

  • speaker photo
    James Habben
    Digital Forensics Investigator , Verizon RISK Team

    James is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures.

  • speaker photo
    Demetrios Lazarikos
    3-time former CISO (vArmour, Sears, Silver Trail Systems), Founder and IT Security Strategist, Blue Lava Consulting

    Demetrios Lazarikos (Laz), a recognized visionary for building Information Security, fraud, and big data analytics solutions, is the Founder and IT Security Strategist for Blue Lava Consulting.

    Laz has more than 30 years' experience in building and supporting some of the largest InfoSec programs for financial services, retail, hospitality, and transportation verticals. Some of his past roles include: CISO at vArmour, CISO at Sears, CISO at Silver Tail Systems (acquired by RSA/EMC), VP of Strategic Initiatives at ReddShell Corporation (acquired by TrustWave), and a former PCI QSA.

    Laz is an Adjunct Professor at Pepperdine University's Graziadio School of Business and Management. He holds a Master’s in Computer Information Security from the University of Denver and an MBA from Pepperdine University, and has earned several security and compliance certifications.

  • speaker photo
    Megan Bell
    Founder, Mumuration, Inc.

    Megan Bell has 20+ years of experience in building data products and services, and 15+ working with regulated data. Currently, she consults on data anonymization, privacy-by-design, and security/ privacy analytics, as well as training programs for InfoSec analytics. Previously, she led a consulting practice focused on investigations, forensics, and incident response.

  • speaker photo
    Parker Ashley
    Manager, Darktrace

    Parker Ashley is a Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Finance to Aerospace, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats.

  • speaker photo
    Michael Duff
    Chief Information Security Officer, Stanford University

    Michael completed his undergraduate and graduate degrees in physics and computer science at MIT. He founded a web-based EMR startup and later served as CTO of the acquiring organization. Michael taught computer science courses at Miami University, and then led the information security program at SRI International for the next 11 years. He joined Stanford in 2012.

  • speaker photo
    Chase Norlin
    CEO, Transmosis

    Chase Norlin is the CEO of Transmosis and a veteran of the tech industry. He is dedicated to strengthening America's workforce through cybersecurity awareness training and technology training. Norlin is a national and international speaker on workforce development and cybersecurity.

  • speaker photo
    Rob Fry
    Sr Architect, StackRox

    Rob Fry is an accomplished architect, inventor and public speaker with 20 years of experience. In his current role, he is part of the executive engineering team and oversees architecture and security detection strategy. Previously at Netflix, he patented a security orchestration platform and specialized in cloud security and automation. In his free time, he enjoys working with academia, advising startups and participating on advisory boards.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store
DON'T MISS OUT

Join us for high-quality, affordable cybersecurity training and networking. Sign up today!