Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, August 21, 2018
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:30 am
    ISSA, ISACA and (ISC)2 Joint Networking Meeting
    • session level icon
    Open to all Attendees
    speaker photo
    CEO, Adaptable Security, Communications Director for (ISC)2
    speaker photo
    VP, Information Security, Netflix DVD
    speaker photo
    Head of Security & Compliance, Vera
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 201

    Interested in your local associations? Join ISSA and (ISC)2 for a social meet and greet and chapter news.

    8:30 am
    Emerging Trends for Cyber Risk Management: Preparing for Our Cyber Future
    • session level icon
    speaker photo
    Sr Security Strategist II, Uber Technologies Inc.
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: 212
    Cyber Risk Management is increasingly becoming more important and becoming a matter important enough for highest levels in companies. Recent changes like NIST Cyber Security Framework, EU PSD2 etc demonstrate increasing focus on risk by standards bodies and governments.

    Speaker shall draw upon his two decades of experience in dealing with risk in various capacities discussing how to leverage newer frameworks for the risk management and how to plan for a future with more determined adversaries.

    8:30 am
    Role of Information Risk and Compliance in Digital Healthcare
    • session level icon
    speaker photo
    CEO & Founder, HAYAG Corp
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: 202
    Information technology is becoming a core part of healthcare with the new technology innovation. The risk and compliance strategy and guidance is challenging.
    This presentation focuses on some of the key attributes to take into consideration for creating an IT GRC model to ensure the safety, privacy, and security of the patients.Some of the attributes include:
    – Data as the centerpoint/ focus point of building the GRC model
    – Data classification based on its risk and impact
    – Thinking through Data Lifecycle Approach to attain a detailed      understanding of data and its impact
    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    9:30 am
    OPENING KEYNOTE — Going Digital: Building Your Strategic Roadmap for the Next Wave of Digital Transformation
    • session level icon
    speaker photo
    The Bald Futurist, Former Chief Evangelist and Futurist, Intel
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    The next major wave of digital transformation will integrate the physical parts of your business even more intimately with the digital world, using sensors, analytics, artificial intelligence, robotics, augmented reality, 5G networking, and blockchain technology. In this talk, former Intel futurist Steve Brown presents a fast-paced, fun exploration of what it will mean to “go digital” in the next decade, and reviews the business and security strategies we will need to navigate the road ahead.

    Hear from Steve as he gives a preview of what he will cover in his keynote: https://youtu.be/Er1spVCyzS8

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable - (VIP / Invite Only)
    • session level icon
    speaker photo
    VP, Information Security, Netflix DVD
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: 211

    This session is for Advisory Council members only.

    11:15 am
    Field Guide to Privacy Law Compliance: EU GDPR, California Privacy, and ROW
    • session level icon
    speaker photo
    Partner, Baker McKenzie
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Keynote Theater

    Companies have to prepare for more EU-style data regulation, now also in California, in addition to existing privacy laws, at a time when data processing becomes more and more essential to business analysis, artificial intelligence, autonomous cars, the Internet of Things and other technologies. Lothar Determann provides a field guide overview and practical guidance for companies relating to strategic decisions regarding data processing and compliance management, including geographic approaches, business focus, and risk management. The session will also cover Top 10 Compliance Priorities, Common Pitfalls and Mistakes to Avoid and thoughts on how companies can align compliance with EU GDPR and the New California Consumer Privacy Act.

    11:15 am
    How to Attract, Manage, and Retain the Millennial Workforce
    • session level icon
    speaker photo
    Founder, JButler International
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 212

    A strategic and tactical view of the employee life cycle as a millennial. Jeff covers techniques to grab the attention, interest, and commitment from millennials. Management techniques to leverage their potential and later engagement strategies. Lastly, engagement strategies that top CEOs are using in their workforces.

    11:15 am
    Practical Test-Driven Security
    • session level icon
    speaker photo
    CISO, Zenefits
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 201
    Resilience means being able to effectively stop adversary behavior from causing consequences. Often, teams spend more time theorizing about what controls will provide a reduction in risk. This talk is all about creating a mental model and technology to not just continuously validate your controls, but drive real data into answering “Are We Secure?”
    11:15 am
    Comodo: Re-Think Cyber - AI and the Human Touch Safeguarding Against Known and Unknown Threats
    • session level icon
    speaker photo
    Regional Account Executive, Comodo Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 202

    Today’s cybersecurity threat level remains at its highest level in history: malware runs rampant, and organizations large and small are besieged by phishing, breaches, take-downs and DDoS attacks. In this environment, cybersecurity presents the greatest challenges to IT organizations.  Join Comodo Cybersecurity experts and see how their patented auto-containment technology works defending against known and unknown malware signatures.  In conjunction, they will talk to and demonstrate the visibility they have throughout their global customer footprint of nearly 89 million endpoint users.   To conclude, Comodo will give a brief overview of their budding partner program and how they’re growing the Comodo Cybersecurity ecosystem.

    12:00 pm
    Advisory Council LUNCH Round Table - (VIP / Invite Only)
    • session level icon
    speaker photo
    Sr. Director, Information Security, Cisco
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 211

    This session is for Advisory Council members only.

    12:15 pm
    LUNCH KEYNOTE: From Breach Fatigue to Action: How to Stay Focused to Learn
    • session level icon
    speaker photo
    CISO & Executive Director, Social Interest Solutions
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    By looking backward we can more securely move forward. With so many breaches being reported in the media Information Security professionals can develop “breach fatigue,” losing sight of the cause-and-effect of the controls that failed and not learning from those mistakes. This talk uses specially created technology to re-create some of the more famous and significant breaches, then walks participants through the actual hacks of the vulnerabilities that allowed the breach to occur, and then discusses how the failed controls could have been hardened to reduce or even eliminate the risk.
    1:15 pm
    Panel: Future Threatscape—Ransomware & Beyond
    • session level icon
    speaker photo
    Sr. Sales Engineer, Malwarebytes
    speaker photo
    Sr. Malware Researcher, Endgame
    speaker photo
    Head of Security & Compliance, Vera
    speaker photo
    CISO, Stanford Children’s Health | Lucile Packard Children’s Hospital
    speaker photo
    Enterprise Solutions Architect, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 212
    1:15 pm
    Panel: What Will They Think of Next? (Emerging Threats)
    • session level icon
    speaker photo
    Head of Threat Labs, Juniper Networks
    speaker photo
    Director, Corporate IT and Security, Qualys
    speaker photo
    CISO & Executive Director, Social Interest Solutions
    speaker photo
    Account Executive, Jazz Networks
    speaker photo
    VP, Security & Compliance, Coupa Software
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

     

     

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    Less Talk and More Action: How the Global Cyber Alliance Is Making a Difference and You Can Too
    • session level icon
    speaker photo
    Global Communications Officer, Global Cyber Alliance
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 201

    The Global Cyber Alliance (GCA) is an international nonprofit focused on developing and deploying practical solutions, made freely available, that measurably improve our collective cybersecurity.

    In this session, you’ll learn about GCA’s more than 200 global partnerships and how their resources—such as the email authentication (DMARC) Setup Guide and the Quad 9 web security service (which blocks 2 million threats a day)—can help your organization. Looking forward, we’ll discuss GCA’s plans to make smart cities more secure cities by tackling security challenges associated with IoT devices and technologies.

    3:00 pm
    CSO Council Panel: Good Security is Boring
    • session level icon
    Executive Panel
    speaker photo
    CISO, Zenefits
    speaker photo
    Director of Security, Stitch Fix
    speaker photo
    VP of Security, Coinbase
    speaker photo
    Information Security Leader
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 212

    The latest cool thing is a lot of fun to focus on, but when we take a step back and examine breaches that affect the majority of organizations their root causes relate to fundamental security capabilities. This panel will be a rousing discussion of the “boring” parts of security. The foundational elements of a strong security program are all too easy to ignore because they aren’t the latest artificial blockchain intelligence.

    3:00 pm
    Re-thinking Our Talent Shortage: Planning for the Future Began Yesterday
    • session level icon
    speaker photo
    Partner, Jobplex
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 202
    All too often, breaches or attacks on organizations are the result of an otherwise trustworthy employee’s negligence. Whether it’s using a company device on a public wifi or ignoring password updates to confidential data, it’s human nature to error. So…how do we mitigate that? Can we pre-screen for that? This expert presentation will discuss little-known tactics deployed to avoid potential hiring risks, while also integrating non-security professionals into a highly secure environment.
  • Wednesday, August 22, 2018
    9:00 am
    SecureWorld PLUS - How to Build the Future: A Deep Dive into AI, Blockchain, and Preparing Your Organization for 5-10 Years Ahead
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    The Bald Futurist, Former Chief Evangelist and Futurist, Intel
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 211

    In this workshop, you will learn about two of the most important technologies shaping our future, Artificial Intelligence and Blockchain technology. You will then learn how to use the Futurecasting process to model, plan, and build future experiences, including some that are a built around AI and Blockchain. While it does discuss some technical topics at a high level, this workshop is open and accessible to anyone and everyone. Sign up today to boost your knowledge on both AI and Blockchain, and to learn new techniques that will enable you to imagine, plan and build the future.

    Hear from Steve as he gives a preview of what he will cover in this PLUS course: https://youtu.be/eN-wYrdPyjs

    AGENDA

    8:00-8:15 a.m. Introductions

    8:15-9:45 a.m. Artificial Intelligence: How AI Will Reshape Every Business, Including Yours (1.5 hours)

    Artificial intelligence (AI) is a profoundly important set of technologies that are already shaping the way we live our lives, and the ways that businesses operate. As the second era of computing, AI will have as profound of an effect on business and society as did electrification and traditional digital computers. Over the next decade, AI will transform all our lives and will reshape every industry. AI will power autonomous vehicles, smart robots, drones, virtual assistants, and chatbots. It will manage our smart cities, power sentient factories, and oversee our smart energy grids. AI will turbo-charge medical diagnosis, revolutionize customer service, and aid in the discovery of new materials and new pharmaceuticals. AI will reshape every business process, and could reshape the structure of every team. The HR Director and CIO of every company will need to become best friends as IT and HR co-own a blended human-machine labor force. Every IT person needs to understand the capabilities, limitations, and implications of artificial intelligence, no matter their level of technical acumen. This session explains what Artificial Intelligence is and how it can be used. Attendees will then review the main concepts of AI: artificial neural networks, deep learning, supervised learning, unsupervised learning, reinforcement learning, and generative adversarial networks. Finally, the session will explore how AI may develop in the future, and how it will require a rethinking of every workflow, and every workplace.

    9:45-10:00 a.m. BREAK

    10:00-11:30 a.m. Blockchain Beyond Cryptocurrencies: Your Foundation to Create New Business Value (1.5 hours)

    Cryptocurrencies like Bitcoin are just one of the many applications that can be built on top of Blockchain technology. Blockchain has rapidly become a valuable platform for new value creation across a wide range of industries. Heavyweights like IBM, Walmart, Accenture, Intel, and Bank of America are all placing big bets in this area. Over the last thirty years, we have moved from the client-server era, through the cloud computing era, and now with Blockchain to the era of distributed applications. Blockchain technology removes the need for central authorities, creates trust in a trestles world, reduces transaction costs, and dramatically improves traceability. In this session, you’ll cover Blockchain basics, understand why Blockchain technology is so disruptive, and learn how distributed applications (dApps) enable a new innovation paradigm that brings with it new funding and collaboration models. You’ll then look at examples of how Blockchain is already being used to solve problems in a wide range of industries, from real-estate to supply chain, and healthcare to energy.  Be sure that you are prepared to take full advantage of the increased levels of trust, privacy, traceability, and data security made possible by Blockchain technology. Every IT person needs to understand the implications of this technology to their business.

    11:30-1:00 p.m. LUNCH

    1:00-4:00 p.m. Futurecasting Workshop (3 hours)

    In this workshop, you’ll learn all the main steps of the Futurecasting process, a proven foresights process developed by futurist, Brian David Johnson. You will then practice each of these major steps—trend synthesis, personas, rapid futurecasting, science fiction prototyping, and backcasting—and start to develop some plans for the future. Some of these plans will build upon what you learned during the two morning sessions focused on AI and Blockchain. In addition to using Rapid Futurecasting to design simple experiences that you may wish to create, you will also consider the investments, partnerships, R&D effort, and talent plans you might need to succeed. “The best way to predict the future is to design it”. So said engineer, inventor, and futurist Buckminster Fuller. Similar statements have been credited to Alan Kay, Peter Drucker, and even Abraham Lincoln. The bottom line is that in order to seize a leadership position in any market, a company needs to take an active role in defining the future that they want to build, and then develop a comprehensive plan to build that imagined future. Attend this workshop to learn how to deploy the Futurecasting process at your company, or perhaps in your own life, as a way to help you model, plan, and then build the future that you want.

    4:00 p.m. CLOSE

Exhibitors
  • Arctic Wolf Networks
    Booth: 103

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOCTMservice is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.

  • BeyondTrust
    Booth: 309

    Your Ally Against Cyber Security Threats
    BeyondTrust cyber security solutions deliver the visibility to reduce risks and the control to act against internal and external data breach threats.

  • Secure Diversity
    Booth:

    Seecure Diversity is an innovative non-profit organization with leaders that think out of the box who have created strategies & solutions in placing qualified women and underrepresented humans into cybersecurity roles. We foster gender diversity, equity, and inclusion in the cybersecurity industry through conferences, networking, mentoring, professional development, and community outreach. One of our primary goals is to raise awareness and increase the number of women and underrepresented humans in the cybersecurity workforce. Founded in 2015 by Deidre Diamond; our mission is the equal representation of women and men in the cybersecurity workforce by engaging and collaborating with organizations and businesses to improve the recruitment and retention of women; utilize marketing and social media platforms to raise awareness of women in cybersecurity careers; remove cybersecurity institutional barriers and innovate new strategies to leverage existing resources.

  • Comodo Cybersecurity
    Booth: 203

    In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers globally.

     

  • CI Security
    Booth: 301

    CI Security provides Managed Detection & Response services, combining purpose—built technology with expert security analysts to perform full-cycle threat detection, investigation, response, and recovery. With clients across healthcare, public sector, and financial services, CI Security’s technology platform, Security Operations Center, and Information Security consulting services minimize the impact of security breaches, and add significant value to existing internal IT teams.

  • CSO Council
    Booth:

    The CSO Council is a non-profit corporation that supports a community of CSOs enabling the members to leverage experience and expertise of each other for the more effective and timely protection of their organization’s critical information assets. The CSO Council organizes conferences, panel discussions, webinars and special events to facilitate communications among its members and the information security community.

  • DatriumDVX
    Booth: 103

    DatriumDVX combines the best technologies of SAN and HCI for a new breed of convergence which enables 10x more performance, 10x faster RTO, 10x lower AWS costs. Learn how we provide military grade, AES global encryption with a single click and seamless integration with Public Cloud for long term backup/archival. 

  • DirectDefense
    Booth: 101

    Founded in 2011, DirectDefense offers security services that are unmatched within the industry. Our core strength is our deep experience in performing assessments for a wide array of networks, platforms, and applications. Our seasoned consultants are focused on providing world-class security services to our clients.

    Regardless of industry – financial, insurance, retail, hospitality, healthcare, education, gaming, technology, or energy and utilities, our wealth of knowledge and experience can assist you in achieving your security testing and strategy goals.

  • EC-Council
    Booth:

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Endgame
    Booth: 102

    Organizations spent $75 billion on security last year, yet they still face breaches at an alarming rate. Endgame exists to transform that paradigm and not accept breaches as the status quo.

    To solve these challenges, we can’t apply the same people, processes and technology and expect different results.

    We bring to bear the best across enterprise tech, security domain expertise, data science, user experience, and academia to challenge the industry-standard of what makes a good security product.

    That’s what we’re doing everyday at Endgame.

  • Global Cyber Alliance
    Booth:

    The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to confronting cyber risk and improving our connected world. It is a catalyst to bring communities of interest and affiliations together in an environment that sparks innovation with concrete, measurable achievements. While most efforts at addressing cyber risk have been industry, sector, or geographically specific, GCA partners across borders and sectors. GCA’s mantra “Do Something. Measure It.” is a direct reflection of its mission to eradicate systemic cyber risks. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney’s Office, the City of London Police and the Center for Internet Security. Learn more at www.globalcyberalliance.org

  • (ISC)2 Silicon Valley
    Booth:
  • InfraGard San Francisco Bay Area Member Alliance
    Booth:
  • ISSA San Francisco Bay Area
    Booth:

    Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.

  • ISSA Silicon Valley
    Booth:

    The Information Systems Security Association (ISSA) is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members.

    Our chapter is comprised of over 250 Silicon Valley Information Security Staff, Consultants, Managers, Executives, and other business professionals. Our members come from Small Businesses and Fortune 100 companies. Our demographics are diverse, yet we share the common thread that we understand the criticality of Information Security as an enabler of today’s key business objectives and the improvements that will come tomorrow.

  • ISACA Silicon Valley Chapter
    Booth:

    ISACA-SV is proud to serve our Bay Area constituents. Our mission is to serve those involved with various aspects of information security, assurance, risk management, privacy, audit, and similar topics associated with IT control and governance related activities.

    The Silicon Valley Chapter of ISACA® was started in 1982, and has grown to over 800 members. Our members reside throughout the Bay Area centering in the Silicon Valley. We are a very active chapter, and have won multiple awards over the years, including two worldwide awards.

  • Jazz Networks
    Booth: 104

    Jazz Networks is a cyber analytics platform that simplifies insider threat detection and breach prevention. It works by collecting rich metadata before it’s encrypted from endpoints and servers, with machine learning analyzing to identify behavioral pattern changes. Alarms are raised for events that require attention and response time is swift with native platform actions.

  • Juniper
    Booth: 208

    Our customers don’t set out to build networks. They build on ideas that reinvent, reimagine, and improve the world around them. It makes sense that we should begin there, too.

    Through our passion for creating high-performing networks, Juniper extends knowledge, collaboration, and human advancement in industries around the world—such as energy, healthcare, education, and many others.

    While our innovative product and services portfolio evolves continuously, we need to reach farther to secure our customers’ long-term success. We’re looking beyond the horizons of today’s business challenges, and the technology future we see is built on real-time service integration. That means everything we develop must align with our vision.

  • Malwarebytes
    Booth: 204

    Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations, simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives. Visit us at www.malwarebytes.com/business.

  • Okta
    Booth: 305

    Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

  • Oracle
    Booth: 401

    Oracle Dyn is a global business unit focused on the cloud infrastructure that connects users with digital content and experiences across a global Internet. Dyn, a pioneer in DNS, has now added the Zenedge web application firewall (WAF) and DDoS mitigation products to secure applications, networks, databases, and APIs from malicious Internet traffic. Our solutions are powered by a global network that drives 40 billion traffic optimization decisions daily for more than 3,500 enterprise customers, including preeminent digital brands such as Netflix, Twitter, LinkedIn and CNBC.

  • OWASP Bay Area
    Booth:

    The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

  • SentinelOne
    Booth: 111

    SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.

  • SSH Communications Security
    Booth: 201

    As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture and save on operational costs. SSH Communications Security is headquartered in Helsinki and has offices in the Americas, Europe and Asia. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. For more information, visit www.ssh.com

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tevora-Skybox
    Booth: 105

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
    https://www.skyboxsecurity.com/

  • Tools4ever
    Booth: 107

    Tools4ever is one of the largest vendors in Identity Governance & Administration (also known as Identity & Access Management) with more than 5 million managed user accounts.

    Since 1999 Tools4ever has developed and delivered several software solutions and consultancy services such as User Provisioning, Downstream Provisioning, Workflow Management, Employee Self-Service and Access Governance (RBAC). In the area of Password Management, Tools4ever offers Single Sign-On and Self-Service Password Reset among others.

    Tools4ever’s Identity Governance & Administration (IGA) solutions are installed in organizations from various sectors ranging in size from 300 to over 200,000 user accounts.

  • WhiteHat Security
    Booth: 202

    Digital life consists of digital experiences, and applications drive these digital experiences. The only way enterprises can truly provide safe digital experiences to their customers, partners, employees and entire ecosystem, is by securing the applications at the heart of their business.

    WhiteHat exists to make this possible. The WhiteHat Application Security Platform enables enterprises to secure their digital businesses. From application creation through production, and from the desktop to mobile devices, we secure the apps that people rely on in their personal and professional lives.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Lan Jenson
    CEO, Adaptable Security, Communications Director for (ISC)2
  • speaker photo
    Jimmy Sanders
    VP, Information Security, Netflix DVD
  • speaker photo
    Adnan Dakhwe
    Head of Security & Compliance, Vera
  • speaker photo
    Shreyas Kumar
    Sr Security Strategist II, Uber Technologies Inc.

    Shreyas Kumar is a Senior Security Strategist II at Uber. He leads Uber's payments security and Vendor security globally. He is a member of Cloud Technical SIG of PCI. He is also a visiting Professor of Computer Science at San Jose State University. Previously he has worked at Adobe and Oracle. He holds multiple security certifications. He has spoken in multiple international conferences and has been a invited speaker at Universities. Shreyas holds a MS degree in Computer Science from Texas A&M University and a Bachelors degree from IIT Roorkee.

  • speaker photo
    Hema Lakkaraju
    CEO & Founder, HAYAG Corp

    Hema Lakkaraju has worked in the healthcare industry for 10 years in software and IT compliance.

  • speaker photo
    Steve Brown
    The Bald Futurist, Former Chief Evangelist and Futurist, Intel

    Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.

    Steve is passionate about helping people to imagine and build a better future. Whether talking about the future of work in a post-automation world, doing a deep dive on artificial intelligence, or discussing the future of flying cars, Steve inspires his audiences to think beyond the current status quo and to reimagine their businesses, and their lives, for the better.

    Steve speaks and writes in plain language on how continued advances in computing will intersect business, cultural and human trends to create both new opportunities and new challenges. His new book, Hacking Reality, will be published later this year. Steve has been featured on BBC, CNN, Bloomberg TV, ABC News, Wired, WSJ:Digits, CBS, and many other media outlets.

  • speaker photo
    Jimmy Sanders
    VP, Information Security, Netflix DVD
  • speaker photo
    Lothar Determann
    Partner, Baker McKenzie

    Lothar has been helping companies in Silicon Valley and around the world take products, business models, intellectual property, and contracts global for nearly 20 years. He advises on data privacy law compliance, IT commercialization, copyrights, open source licensing, electronic commerce, technology transactions, sourcing, and international distribution via Baker McKenzie’s offices in San Francisco and Palo Alto. He is a member of the firm’s International/Commercial Practice Group and the TMT and Healthcare industry groups.

  • speaker photo
    Jeff Butler
    Founder, JButler International

    Jeff Butler is a speaker, author and passionate millennial who helps organizations improve their relationships with millennial employees. Unlike other experts on millennials, Jeff has been in the trenches of what it means to be a millennial and what it takes to retain and keep them engaged. With Jeff ‘s versatile background, he has helped fortune 500 companies and thousands of professionals across the United States – in addition to appearing on TEDx in both 2016 and 2017.

  • speaker photo
    Justin Berman
    CISO, Zenefits

    Justin is the CISO at Zenefits. Previously he lead security at Flatiron Health, lead security architecture at Bridgewater Associates, and built business at Aspect Security. He focuses on data and adversary driven approaches to security, and on centering security in business value.

  • speaker photo
    Timothy Colby
    Regional Account Executive, Comodo Cybersecurity

    Tim has been selling and consulting in the Information Security industry for nearly 7 years. He has worked alongside security practitioners within Small-to-Medium size businesses up go Fortune 10 companies, delivering numerous security products and services throughout the years. Tim is responsible for developing Comodo Cyber Security’s channel partnerships in the Western United States.

  • speaker photo
    Sujata Ramamoorthy
    Sr. Director, Information Security, Cisco

    Sujata is a Sr. Director of Information Security at Cisco and leads the group. Sujata and her team partner across Security & Trust Organization, Supply Chain, IT and various Product teams to deliver foundational capabilities to secure Cisco’s business operations and Cloud Offers. This includes establishing security standards, partnering to build foundational security capabilities, delivering consumable security stacks in strategic environments in a DevSecOps model and driving adoption across Cisco.

  • speaker photo
    Michael Landeck
    CISO & Executive Director, Social Interest Solutions

    Mike Landeck led the security implementation and then operationalized two of the country’s largest cloud-based healthcare IT projects. He has been responsible for the overall security of systems with financial transactions of over $4 billion per month, as well security programs regulated by HIPAA, SOX, PCI, FISMA (NIST 800-53), the IRS (FTI IRS 1075), and FedRAMP. Mike is currently the Executive Director of Security at Social Interest Solutions, overseeing operational security and product security, and participating in innovation and strategy. Mike is a frequent conference speaker and workshop presenter, speaking across the country on such topics as software security testing and security program management.

  • speaker photo
    Ibrahim Al-Islam
    Sr. Sales Engineer, Malwarebytes
  • speaker photo
    Amanda Rousseau
    Sr. Malware Researcher, Endgame
  • speaker photo
    Adnan Dakhwe
    Head of Security & Compliance, Vera
  • speaker photo
    Auston Davis
    CISO, Stanford Children’s Health | Lucile Packard Children’s Hospital
  • speaker photo
    Tam Huynh
    Enterprise Solutions Architect, SentinelOne
  • speaker photo
    Mounir Hahad
    Head of Threat Labs, Juniper Networks
  • speaker photo
    Jim Almerico
    Director, Corporate IT and Security, Qualys
  • speaker photo
    Michael Landeck
    CISO & Executive Director, Social Interest Solutions

    Mike Landeck led the security implementation and then operationalized two of the country’s largest cloud-based healthcare IT projects. He has been responsible for the overall security of systems with financial transactions of over $4 billion per month, as well security programs regulated by HIPAA, SOX, PCI, FISMA (NIST 800-53), the IRS (FTI IRS 1075), and FedRAMP. Mike is currently the Executive Director of Security at Social Interest Solutions, overseeing operational security and product security, and participating in innovation and strategy. Mike is a frequent conference speaker and workshop presenter, speaking across the country on such topics as software security testing and security program management.

  • speaker photo
    Mark Barragan
    Account Executive, Jazz Networks
  • speaker photo
    Philip Cox
    VP, Security & Compliance, Coupa Software
  • speaker photo
    Aimee Larsen Kirkpatrick
    Global Communications Officer, Global Cyber Alliance

    Aimée Larsen Kirkpatrick is the Global Communications Officer for the Global Cyber Alliance (GCA), where she is responsible for strategic communications for the international nonprofit. Prior to GCA she was President of ALK Strategies, a communication and public affairs consulting practice. Aimée was formerly with the National Cyber Security Alliance (NCSA), where among other programs, she led the development of the successful STOP. THINK. CONNECT public cybersecurity awareness campaign and the San Diego Securing Our eCity Model City project. Aimée was a 2012 Executive Women’s Forum Women of Influence Award recipient. She has a BA from Washington State University.

  • speaker photo
    CSO Council
  • speaker photo
    Justin Berman
    CISO, Zenefits

    Justin is the CISO at Zenefits. Previously he lead security at Flatiron Health, lead security architecture at Bridgewater Associates, and built business at Aspect Security. He focuses on data and adversary driven approaches to security, and on centering security in business value.

  • speaker photo
    Charles Nwatu
    Director of Security, Stitch Fix
  • speaker photo
    Philip Martin
    VP of Security, Coinbase
  • speaker photo
    Julie Tsai
    Information Security Leader
  • speaker photo
    Tighe Burke
    Partner, Jobplex

    Tighe Burke is a Partner and Cybersecurity Practice Lead with Jobplex Inc. in Denver, securing the next-generation of leaders on behalf of technology clients around the globe. Tighe has developed powerful domain expertise executing searches for InfoSec functional roles as well as on behalf of security providers.

    He previously spent 5 years as a search consultant in Silicon Valley, and is regularly sought out by the brightest minds in technology to conduct hard-to-fill positions across the security landscape. Tighe has deep experience working with both early-stage and public companies to identify their current and future security leaders.

  • speaker photo
    Steve Brown
    The Bald Futurist, Former Chief Evangelist and Futurist, Intel

    Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.

    Steve is passionate about helping people to imagine and build a better future. Whether talking about the future of work in a post-automation world, doing a deep dive on artificial intelligence, or discussing the future of flying cars, Steve inspires his audiences to think beyond the current status quo and to reimagine their businesses, and their lives, for the better.

    Steve speaks and writes in plain language on how continued advances in computing will intersect business, cultural and human trends to create both new opportunities and new challenges. His new book, Hacking Reality, will be published later this year. Steve has been featured on BBC, CNN, Bloomberg TV, ABC News, Wired, WSJ:Digits, CBS, and many other media outlets.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store