Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, February 7, 2018
    9:00 am
    SecureWorld PLUS - Winning the Risk/Security Revolution: A Bootcamp
    • session level icon
    Join us the day before the conference and earn 6 additional CPEs! 9 a.m. - 3 p.m.
    speaker photo
    Futurist, Author & Professor, Named "One of the top 50 brains in technology today" by Fast Company
    speaker photo
    Regional Partner with Coopers & Lybrand (now PWC), Former IT Risk Manager, Goldman Sachs, Wells Fargo, and McKesson
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 214

    80%+ of all human existence is now impacted by digital activity. ~100% of all digital activity operates on dated technology platforms NOT designed to be secure. 60%+ of in-place senior executives espouse strongly held [bordering on toxic] misconceptions of risk and security fundamentals. We will dive into strategy development and communication throughout the organization. This workshop is geared toward those who want to be considered a respected source of influence in the industry. Futurist Thornton May and a faculty of local experts will facilitate a highly interactive workshop showcasing the stories, strategies, frameworks, and best practices of leaders who are winning the Risk/Security Revolution.

    9:00 am
    SecureWorld PLUS - Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    CISO and Adjunct Faculty, University of Massachusetts
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 215

    The University of Massachusetts has developed a 6 hour SecureWorld Plus training class that focuses on designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who are currently using the NIST Cybersecurity Framework or are planning to use the NIST Cybersecurity Framework for their cybersecurity program will benefit from this course. The course will show attendees how to use Cloud Platforms to implement and maintain security controls based on the NIST Cybersecurity Framework.

    This innovative education and training program includes the following key elements:
    • A Controls Factory that consists of three main areas; Engineering, Technology and Business
    • The Engineering Area includes a focus on threats, vulnerabilities, assets, identities, business environment and the NIST Cybersecurity Framework
    • The Technology Area includes a focus on technical controls (based on the CIS 20 Critical Controls), security technologies, Security Operations Center (SOC) and technology testing
    • The Business Area includes a focus on business controls (based on ISO 27002), cyber workforce (based on the NICE Workforce Framework) and cyber risk program (based on AICPA Description Criteria)

    The class will help individuals and organizations acquire knowledge, skills and abilities to:
    • Develop a strategy to adopt the NIST Cybersecurity Framework (NCSF)
    • Create a comprehensive Cybersecurity Program based on the NIST Cybersecurity Framework, technical controls and business controls
    • Engineer, implement, manage the 20 critical controls based on the cloud platform
    • Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
    • Establish an executive scorecard to measure and communicate risks, and develop an action plan / program roadmap to remediate controls gaps

    About the Instructor – Larry Wilson:
    • Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
    • Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
    • Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 4 years
    • Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework

    The program and its author have won the following industry awards:
    • Security Magazine’s Most Influential People in Security, 2016
    • SANS People Who Made a Difference in Cybersecurity Award, 2013
    • Information Security Executive (ISE) North America Program Winner for Higher Education, 2013

  • Thursday, February 8, 2018
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Advisory Council Breakfast: (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: 215

    This session is for our Advisory Council members only. Light breakfast, coffee and tea served.

    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:00 am
    Charlotte InfraGard 5th Annual CyberCamp – Volunteer Meetup
    • session level icon
    Open to All Attendees
    speaker photo
    Director, InfraGard CyberCamp
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 9:15 am
    Location / Room: Keynote Theater
    8:30 am
    Wombat: State of the Phish™ 2018 – What Your Peers Are Doing to Reduce Successful Phishing Attacks
    • session level icon
    speaker photo
    Brand Communications Manager, Wombat Security Technologies
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 211A

    Join Wombat Security Technologies’ Brand Communications Manager, Gretel Egan, as she discusses key findings from the 2018 State of the Phish™ Report. In this session you will gain insight into current vulnerabilities, industry-specific phishing metrics and emerging threats. This collection of data is taken from tens of millions of simulated phishing attacks sent through Wombat’s Security Education Platform over a 12-month period, responses from quarterly survey’s, and an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors.

    8:30 am
    iovation: How Device Risk Insight Drives Dynamic MFA
    • session level icon
    speaker photo
    Sr. Director, Product Marketing, iovation Inc.
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 212A

    If you need to authenticate or authorize external customers into your online site, service or app, you face a daunting set of challenges. First, you need to provide enough security at the right time in the user’s journey to stop account takeovers and exploits. Second, your customers need a rewarding, friction-free user experience. We’ll discuss how device intelligence – real-time assessment of your user’s device — provides the insight that drives the “right” kind at the adaptive multifactor authentication at the right time. We’ll use examples of customers in retail, finance and gaming achieving this balance today.

    8:30 am
    ABCs of GDPR
    • session level icon
    speaker photo
    CISO, SPX Corporation
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: 216AB

    With the upcoming May 2018 effective date for GDPR compliance, it is important to understand the basics of responsible information management. Organizations must focus on people and process, not just technology, to implement and evidence their compliance. This is an organization-wide issue and requires partnership among IT and diverse business functions. Accountability can leverage a risk-based approach, but compliance by accident will not work.

    9:30 am
    Opening Keynote: Risk & Security’s Bright Future: Mapping the Road Ahead
    • session level icon
    speaker photo
    Futurist, Author & Professor, Named "One of the top 50 brains in technology today" by Fast Company
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    There has never been a better time to be a risk/security professional. Disruptive technologies fundamentally expand the “Art of the Possible;” reshape the solution provider ecosystem [with a new hierarchy of winners & losers]; and discombobulate expectations of how and by whom risk and security should be managed/led.

    In an entertaining and highly interactive session, Thornton May will share with attendees how leading Risk/Security Cartographers chart the future. Like the movers and shakers of the Renaissance, we stand on the shores of a new world –a Mundus Novus as Americo Vespucci labeled it in 1502.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:15 am
    Information Security Plans
    • session level icon
    speaker photo
    Counsel, Elkins PLC, ; Associate Fellow, Kings College, U. of London; non-resident Senior Fellow, Middle East Institute, Washington, D.C.
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 211A

    The presentation examines the need for policies, objectives, controls, processes and procedures to help companies manage the risk, threats, and vulnerabilities that can cause loss as a result of a cyber breach or loss of confidential/proprietary information. It examines organizational responsibilities, key steps in forging and executing an Information Security Plan, and what you can do to better protect yourself from loss.

    11:15 am
    Cyber Threats and Trends
    • session level icon
    speaker photo
    Supervisory Special Agent, FBI
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 216AB

    The interconnected nature of our digital society provides for efficiency and convenience but also creates opportunities for malicious activity. This presentation will address cyber threats, recent trends and how to engage with the FBI in the event of a cyber incident.

    11:15 am
    baramundi — Innovative Endpoint Management: A Holistic Approach to Vulnerability Management, Patching, OS Upgrades, and Software Distribution
    • session level icon
    speaker photo
    Executive Manager, baramundi software USA, Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 211B
    Windows Fall Anniversary Update, Office 365 Migration, Vulnerability and Patch Management: Are any of these three topics causing your blood pressure to rise? This session will show you how you can automate OS migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required—buckle up!

     

    11:15 am
    Centrify: Zero Trust Security: A New Paradigm for a Changing World
    • session level icon
    speaker photo
    Director, Product Management & Strategy, Centrify Corp
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 212A

    A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade–when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop–Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 215

    This session is for Advisory Council members only. Lunch will be served.

    12:15 pm
    LUNCH KEYNOTE: Cybersecurity 2.0 - Controls, Governance, and Business Reimagined
    • session level icon
    speaker photo
    Founder & CEO, Binary Sun Cyber Risk Advisors
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    Our backs are up against a wall of never ending breaches, blame, and ineffective controls. Hear from not only a thought leader, but someone with operation experience as a CISO, General Counsel, and Chief Privacy Officer today as we will discuss new controls, how to lead and govern along side the Board, and how to enable business through better cybersecurity.

    1:15 pm
    Panel: What Will They Think of Next? (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Phishing and Social Engineering Scams 2.0
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 216AB
    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    Cyber Risk in the Supply Chain: Where Is Your Weakest Link?
    • session level icon
    speaker photo
    Managing Director, UHY Advisors
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 212A

    Every organization has a supply chain, and many don’t know which members are the weakest link in the chain. Cybersecurity is no longer limited to what you do within your own organization. Many of the largest breaches in recent history have been the result of inadequate security with vendors and other members of the supply chain. This session will provide you with the risks and some possible remedies for how your organization can better manage the organizations that make up your supply chain and other business partners.

    3:00 pm
    Bio-Metric Cyber Exposure
    • session level icon
    speaker photo
    Sr. Information Security Manager, Snyder's-Lance, Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: 211A

    Imagine someone using your stolen fingerprints to access your bank accounts – or worse, your organization’s treasure trove of data? After all, recovering a stolen fingerprint is substantially tougher than a password. Through a series of live demonstrations, Mike will share how to calculate your personal and business Bio-metric risk and, more importantly, how to reduce it. Question to be asked is “What are my Bio-metric Cyber Exposures @home and @work?”

    3:00 pm
    Executive Panel: Effectively Managing Cyber and Information Security Risk From the Executive Level
    • session level icon
    speaker photo
    Sr. Manager, IT Audit, CHAN Healthcare
    speaker photo
    Cybersecurity Consultant, ExecSec Inc.
    speaker photo
    Chief Information Officer / Chief Information Security Officer , RoundPoint Mortgage Servicing Corporation
    speaker photo
    Director of Cybersecurity, The Babcock and Wilcox Company
    speaker photo
    Senior Manager, Experis
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: 216AB

    Nowadays, executives need to understand that twentieth century organizational and risk management models may not be well-suited to succeed in mitigating cyber / infosec risks. Executives need to lead initiatives to be involved in activities that provide management and the workforce the strategic and operational roadmap to be successful at the enterprise level, and obtain excellence in technical security risk areas.

    Technical
    Having awareness—and high-level understanding—of well-known frameworks (e.g., NIST CSF, Cloud Security Alliance, COSO, etc.) that management can use to obtain excellence in:
    • Access and Identity Management
    • Data Protection
    • Third Party Risk
    • Risk Assessment
    • Identify, Protect, Detect, Respond and Recover from cybersecurity attacks

    Executive Engagement
    Cyber and Information Security should be fully integrated into executive and organizational culture. For that to happen, executives must be engaged in a number of Cyber/InfoSec activities to purposely and positively affect the organizational fabric:
    • Develop strategies and long term vision
    • Involve Cyber/InfoSec with Board or Committees of the Board
    • Effectively obtain ownership and engagement from key business process owners and stakeholders.
    • Be fully aware of the facts
    • Make personnel decisions, if necessary, to build a leadership team that is both technical and business savvy

    3:45 pm
    Happy Hour Reception
    • session level icon
    Join your fellow security professionals for wine, beer and appetizers compliments of Allstate.
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 5:00 pm
    Location / Room: Ballroom A/D (near registration)

    Join your peers for complimentary hors d’oeuvres, wine, beer and conversation following SecureWorld. This is a great opportunity to network with other security professionals from the Charlotte area, and to discuss the hot topics from the day.
    Compliments of Allstate

Exhibitors
  • Allstate
    Booth: 320

    WE ARE THE GOOD HANDS.
    The Allstate Corporation is the largest publicly held personal lines property and casualty insurer in America, serving more than 16 million households nationwide. Founded in 1931, Allstate has been dedicated to protecting our customers from life’s uncertainties and preparing them for the future for more than 85 years.

    Allstate became a publicly traded company in 1993, and is listed on the New York Stock Exchange under the trading symbol ALL. As of year-end 2015, Allstate had nearly $104.7 billion in total assets.

  • Anomali
    Booth: 100

    Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

  • NETSCOUT Arbor
    Booth: 100

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • baramundi software USA, Inc.
    Booth: 440

    baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,000 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.

  • Bay Pay Forum
    Booth: TBD

    The BayPay Forum, a Silicon Valley-based international network composed of over 14,000 payment and commerce executives, entrepreneurs and investors from thousands of different companies, serves as a forum to connect members in identifying and understanding the emerging trends and innovations in the industry.

  • Binary Defense Systems
    Booth: 220

    BDS is a company that works with you to understand your environment, what you have and building defenses to combat what we face today and for the attacks of tomorrow. Technology is continuously changing, businesses change every day – in order to keep up with the changes, BDS has created an extensively flexible yet highly accurate way of detecting attackers. We are attackers, and we know the best ways in detecting how attackers breach your network. An added bonus with BDS – continual penetration tests are performed regularly to enhance and develop additional safeguards. We are here to defend, protect and secure your company.

  • BitSight Technologies
    Booth: 240

    BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company’s Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums.For more information, please visit www.bitsighttech.com or follow us on Twitter (@BitSight)

  • Centrify
    Booth: 300

    Centrify provides unified identity management across data center, cloud and mobile environments. Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

  • Check Point Security
    Booth: 240

    Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

  • CIOReview
    Booth: TBD

    CIOReview is a technology magazine that talks about the enterprise solutions that can redefine the business goals of enterprises tomorrow. It is the leading source that shares innovative enterprise solutions developed by established solutions providers, upcoming hot enterprises and is a neutral source for technology decision makers. Published from Fremont, California, CIOReview is an excellent platform for the enterprise to showcase their innovative solutions.

  • Cloud Security Alliance (CSA)
    Booth: 510

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • CPAC
    Booth: TBD

    CPAC is an all volunteer, 501-(c)3, professional peer group. CPAC promotes promotes awareness about the value contingency planning provides business, government and individuals, by identifying common problems, proposing solutions and sharing lessons learned from past experiences. CPAC also assists in objectively identifying vendor resources which may facilitate effective contingency planning and disaster recovery. While CPAC is a membership organization, all regular meetings are free and open to the public.

  • DHG
    Booth: 600

    Headquartered in Charlotte, NC, DHG ranks among the top 20 public accounting firms in the nation. With more than 2,000 professionals in 13 states, we combine deep experience with a strong commitment to personal service. We are passionate about helping our clients succeed—and we do so through a resourceful approach to solving problems, providing solutions and helping our clients achieve their goals.

    Dedicated client focus and relationships have been and always will be our touchstone. Here at DHG, you’ll receive personalized service provided by a team of professionals who are eager to share their knowledge and experience with you. We draw on our extensive resources to combine comprehensive assurance, tax and advisory services.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Forcepoint
    Booth: 100

    Forcepoint safeguards users, data and networks against the most determined adversaries, from insider threats to outside attackers, across the threat lifecycle – in the cloud, on the road, in the office. It simplifies compliance and enables better decision-making for more efficient remediation, empowering organizations to focus on what’s most important to them.

  • ForeScout Technologies, Inc.
    Booth: TBD

    ForeScout Technologies, Inc. has pioneered an agentless approach to network security to address the explosive growth of the Internet of Things (IoT), cloud computing and operational technologies (OT). We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of today’s vast array of physical and virtual devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2018, more than 2,900 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions.

  • Forsythe
    Booth: TBD

    Forsythe is a leading enterprise IT company, providing advisory services, security, hosting and technology solutions for Fortune 1000 organizations. Forsythe helps clients become more agile, secure, digital businesses as they optimize, modernize and innovate their enterprise IT. We do this by using both new and traditional IT effectively to meet their business needs. Founded in 1971, Forsythe is privately held and 100-percent employee-owned, with nearly 1,000 employees in 40 locations, and more than $1 billion in annual revenues. Whether we are helping a company secure its data or envision a large data center transformation, we will do whatever it takes to help make it happen.

  • Gigamon
    Booth: 150

    Gigamon is leading the convergence of network and security operations to reduce complexity and increase efficiency of security stacks. Our GigaSECURE® Security Delivery Platform is a next generation network packet broker that makes threats more visible – across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of security tools.

  • Global Cyber Alliance
    Booth:

    The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to confronting cyber risk and improving our connected world. It is a catalyst to bring communities of interest and affiliations together in an environment that sparks innovation with concrete, measurable achievements. While most efforts at addressing cyber risk have been industry, sector, or geographically specific, GCA partners across borders and sectors. GCA’s mantra “Do Something. Measure It.” is a direct reflection of its mission to eradicate systemic cyber risks. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney’s Office, the City of London Police and the Center for Internet Security. Learn more at www.globalcyberalliance.org

  • GuidePoint Security LLC
    Booth: 100

    GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com

  • Imperva
    Booth: 410

    Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.

  • Institute of Internal Auditors (IIA)
    Booth: 610

    Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession’s global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.

  • InfraGard
    Booth: 520

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • iovation
    Booth: 340

    iovation protects online businesses and their end users against fraud and abuse, and identifies trustworthy customers through a combination of advanced device identification, shared device reputation, device-based authentication and real-time risk evaluation. More than 3,500 fraud managers representing global retail, financial services, insurance, social network, gaming and other companies leverage iovation’s database of billions of Internet devices and the relationships between them to determine the level of risk associated with online transactions. The company’s device reputation database is the world’s largest, used to protect 15 million transactions and stop an average of 300,000 fraudulent activities every day. The world’s foremost fraud experts share intelligence, cybercrime tips and online fraud prevention techniques in iovation’s Fraud Force Community, an exclusive virtual crime-fighting network.

  • ISACA
    Booth: 130

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • (ISC)2
    Booth: 210

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

  • Ixia, a Keysight Business
    Booth: 540

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • Mimecast
    Booth: 630

    Mimecast Is Making Email Safer For Business.
    Mimecast’s security, archiving and continuity cloud services protect business email and deliver comprehensive email risk management in one fully-integrated subscription service.
    Mimecast reduces the risk, complexity and cost traditionally associated with protecting email. You no longer have to manage an array of disjointed point solutions from multiple vendors. And you mitigate single vendor exposure if you have moved your primary email server to the cloud with services like Microsoft Office 365.
    Our best-of-breed services protect the email of over 24,900 customers and millions of users worldwide against targeted attacks, data leaks, malware and spam. We give employees fast and secure access to sensitive business information, and ensure email keeps running in the event of a primary service outage.

  • Netanium
    Booth: 240

    Netanium is a trusted, Information Security consultant and solution provider, focused on helping organizations to overcome resource constraints & streamline their evolving security programs.
    Netanium works with organizations to streamline the technologies and processes that best fits its current infrastructure, resources, and security strategy. Netanium has over 15 years of experience focused on data management and managing cybersecurity risk.

  • North Carolina Technology Association
    Booth: 420

    Founded in 1993, the North Carolina Technology Association (NCTA) is a 501 (c) (6) not-for-profit association focused on advancing the state’s tech industry. NCTA has 700+ member companies, organizations and institutions representing more than 200,000 North Carolina based employees.

  • Preempt Security
    Booth: 100

    Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented Behavioral Firewall that couples User Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to mitigate threats in real-time without engaging already overwhelmed security teams.

  • Proofpoint
    Booth: 310

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • SailPoint
    Booth: 400

    SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint’s customers are among the world’s largest companies in a wide range of industries.

  • Skybox Security
    Booth: 100

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • TrustedSec
    Booth: 220

    TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.

     

  • Wombat Security Technologies
    Booth: 200

    Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Thornton May
    Futurist, Author & Professor, Named "One of the top 50 brains in technology today" by Fast Company

    Thornton is one of America’s premier executive educators, designing and delivering high impact curricula at UCLA, UC-Berkeley, Arizona State University, The Ohio State University, Harvard University, the University of Kentucky, Babson, and the Olin College of Engineering. His programs mine the knowledge of the audience delivering practical insights in an engaging and interactive manner.

    As a futurist, Thornton writes columns on technology for three leading publications, researches at four think tanks, and advises major organizations and government agencies on how to think differently about technology—all the while conducting seminal anthropological field research into technology-use behaviors of the various tribes comprising modern society.

    No stranger to the risk and infosec tribe, Thornton has written for CSO Magazine and frequently advises, lectures, and always learns from professionals in the various agencies of the American intelligence community. In a previous life, Thornton served as the Chief Awareness Officer (CAO) for one of the world’s first managed security services firm.

    Thornton brings a scholar's patience for empirical research, a second-to-none gift for storytelling, and a stand-up comedian’s sense of humor to his audiences. His recent book, "The New Know: Innovation Powered by Analytics," examines the intersection of the analytic and IT tribes.

    The editors at eWeek honored Thornton, including him on their list of Top 100 Most Influential People in IT. The editors at Fast Company labeled him "one of the top 50 brains in technology today."

  • speaker photo
    Vincent Campitelli
    Regional Partner with Coopers & Lybrand (now PWC), Former IT Risk Manager, Goldman Sachs, Wells Fargo, and McKesson

    Vince has extensive experience in the converged fields of information technology and risk management. As a Regional Partner with Coopers & Lybrand (now PWC) he was a member of a small team of partners who led the adaptation of technology into the traditional fields of accounting and auditing. Post public accounting, he applied his mastery of risk management and technology with leading Wall Street and Healthcare organizations including Salomon Smith Barney, Goldman Sachs and McKesson Corporation. He developed and designed risk-based continuous improvement processes to monitor IT business systems and applications that resulted in improvements in operational performance and the reduction in outages and control deficiencies. Most recently, Vince has been consulting with the Office of the CEO of the Cloud Security Alliance (CSA) in supporting enterprise members applying CSA Security Guidance and Research results into their Cloud adoption and implementation programs.
    Vince is an active participant in numerous conferences on Information Security and Risk Management. He also serves on the Advisory Boards of several security advisory and educational organizations.

  • speaker photo
    Larry Wilson
    CISO and Adjunct Faculty, University of Massachusetts

    Larry Wilson is currently a senior consultant and former Chief Information Security Officer for the University of Massachusetts President's Office. In the CISO role, Larry was responsible for developing, implementing and overseeing compliance with the UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the UMass cybersecurity program, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. Larry has also worked with multiple companies in multiple industries to help design, build and maintain their Cybersecurity Programs and evaluate their current security posture.

  • speaker photo
    Doug Cassle
    Director, InfraGard CyberCamp

    Doug Cassle is a Board Member of the Charlotte InfraGard chapter and is the Director of the 5th annual Charlotte InfraGard CyberCamp. Doug has an extensive background and currently works for Palo Alto Networks as a Security Specialist. Doug is a highly accomplished professional with a successful 13-year career defining strategies to deliver sophisticated solutions, build market share, and drive revenue growth.

    Doug is skilled in partnering with stakeholders, management and teams to identify business requirements and case drivers, design solutions, and direct the delivery of technology and business strategies for businesses and government entities. Maintains superior relationship, account, program, and staff management skills. Strength in building synergy between leadership, teams, partners and clients to support strategic business objectives across complex environments. Doug is a natural communicator and team leader recognized for facilitating the capture and delivery of key projects and programs; and consistently meeting or exceeding established goals.

    CORE COMPETENCIES
    • Strategic Business & Operational Planning
    • Revenue / Market Growth & Profit Improvement
    • Proposal Development & Contract Negotiations
    • Cross-Functional Team Development & Leadership
    • Solutions Design, Delivery & Management
    • Program Planning, Execution & Management
    • Technology & Business Needs Assessments
    • Customer, Partner, Vendor & Team Relation

    Doug has a BS in Engineering from NC State and has the following certifications: CISSP, CEH v8, ITIL v3, VTSP.

  • speaker photo
    Gretel Egan
    Brand Communications Manager, Wombat Security Technologies

    Gretel Egan is the Brand Communications Manager for Wombat Security Technologies, a leading provider of information security awareness and training software that helps organizations educate employees. She has extensive experience in researching and developing cybersecurity education content and was named one of “10 Security Bloggers to Follow” by IDG Enterprise.

  • speaker photo
    Michael Thelander
    Sr. Director, Product Marketing, iovation Inc.

    Michael has a 20-year history in product marketing and product management, with a focus over the last seven years on cybersecurity. He held senior product marketing and product management roles at security leader Tripwire, and has other career highlights that include co-founding a successful startup and receiving patents for network technology. He loves to educate markets, tell stories that demonstrate value, play music, and on occasion fly small airplanes into active volcanoes.

  • speaker photo
    Lisa Tuttle
    CISO, SPX Corporation

    For 20 years, Lisa Tuttle has led global organizations and managed technology teams with her engaging enthusiasm and unique combination of information security, privacy, compliance and legal expertise. As CISO of SPX Corporation, she provides technology vision and strategic leadership for the company's information security, privacy, compliance and vendor management programs. She excels at partnering with IT and Business teams and has a passion for mentoring Women in Technology and encouraging STEM education. Lisa holds industry leading certifications in risk (CRISC), security (CISM, CISSP) and privacy (FIP, CIPM, CIPT, CIPP/US, CIPP/C, CIPP/E, CIPP/G).

  • speaker photo
    Thornton May
    Futurist, Author & Professor, Named "One of the top 50 brains in technology today" by Fast Company

    Thornton is one of America’s premier executive educators, designing and delivering high impact curricula at UCLA, UC-Berkeley, Arizona State University, The Ohio State University, Harvard University, the University of Kentucky, Babson, and the Olin College of Engineering. His programs mine the knowledge of the audience delivering practical insights in an engaging and interactive manner.

    As a futurist, Thornton writes columns on technology for three leading publications, researches at four think tanks, and advises major organizations and government agencies on how to think differently about technology—all the while conducting seminal anthropological field research into technology-use behaviors of the various tribes comprising modern society.

    No stranger to the risk and infosec tribe, Thornton has written for CSO Magazine and frequently advises, lectures, and always learns from professionals in the various agencies of the American intelligence community. In a previous life, Thornton served as the Chief Awareness Officer (CAO) for one of the world’s first managed security services firm.

    Thornton brings a scholar's patience for empirical research, a second-to-none gift for storytelling, and a stand-up comedian’s sense of humor to his audiences. His recent book, "The New Know: Innovation Powered by Analytics," examines the intersection of the analytic and IT tribes.

    The editors at eWeek honored Thornton, including him on their list of Top 100 Most Influential People in IT. The editors at Fast Company labeled him "one of the top 50 brains in technology today."

  • speaker photo
    James Farwell
    Counsel, Elkins PLC, ; Associate Fellow, Kings College, U. of London; non-resident Senior Fellow, Middle East Institute, Washington, D.C.

    James counsels clients in the areas of Cybersecurity and Privacy Protection. He has a CIPP/US certification from the International Association of Privacy Professionals. James advised the U.S. Department of Defense and U.S. Special Operations Command on cybersecurity and strategic communication. He served as consultant to the U.S. Department of Defense,

  • speaker photo
    Brian Cyprian
    Supervisory Special Agent, FBI

    Brian N. Cyprian has been the supervisor for the FBI’s Charlotte Cyber Task Force since March 2016. He worked at FBI Headquarters managing national security computer intrusion investigations prior to arriving in Charlotte. Brian has a B.S. in Computer Information Systems and an MBA in Commerce from Texas A&M University.

  • speaker photo
    Jonathan Lange
    Executive Manager, baramundi software USA, Inc.

    Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.

  • speaker photo
    Tim Hill
    Director, Product Management & Strategy, Centrify Corp

    Tim Hill joined Centrify in the fall of 2017 as the Director of Product Management & Strategy, he is a US Air Force Veteran who post military joined Amp Inc./TE Connectivity Inc. through the embattled years as part of Tyco International Inc., as their Information Security Manager, and M&A team member, later at PHEAA as the VP of Enterprise Security, then Anthem Inc. as a Security Director in the CISO's office in 2014 through 2017. He has participated in first hand breach recovery efforts and has seen first-hand what is being done right and wrong. Tim has a strong background in IAM which he uses to drive productivity solutions through our customer, leveraging investments and optimizing the full business process and execution.

  • speaker photo
    Christopher Pierson
    Founder & CEO, Binary Sun Cyber Risk Advisors

    Dr. Chris Pierson is the Founder & CEO of Binary Sun Cyber Risk Advisors - providing strategic & operational advice on the intersection of cybersecurity, business, risk and law for companies and boards. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity, anti-fraud, and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy & Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was a founding executive of Viewpost, a FinTech payments company, serving as their CSO and General Counsel and was also the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s (RBS) U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cyber Security Practice representing companies on cybersecurity and data breaches. Chris is a graduate of Boston College (B.A., M.A.) and The University of Iowa (Ph.D., J.D.), is a sought after keynote speaker on cybersecurity and privacy, board advisor for startups, and is frequently quoted by the media on these topics.

  • speaker photo
    David Barton
    Managing Director, UHY Advisors

    David Barton is a Managing Director with UHY Advisors and practice leader of the Internal Audit, Risk, and Compliance practice, which provides consulting and attestation services around information technology controls, cybersecurity, and compliance. He has over 25 years of practical experience in information systems and technology risk and controls. David is frequently asked to speak at national and regional events, such as SecureWorld and the Cloud Security Alliance Congress. He is the primary author of the CSA position paper on AICPA Service Organization Control Reports. He regularly provides his input and opinions for national publications such as Compliance Week, Accounting Today, and the Atlanta Journal Constitution. David holds an MBA and BS in Business Administration from Appalachian State University. He is Certified in Risk and Information Systems Control (CRISC), received the Certified Information Systems Auditor (CISA) designation in 1988, and is a member of the Atlanta chapter of the Cloud Security Alliance. David has active civic memberships with the Atlanta chapter of the Porsche Club of America and the Tire Rack Street Survival® program for teen driver education. He is also a certified high-performance driving instructor and former Porsche Club racer.

  • speaker photo
    Mike Muscatell
    Sr. Information Security Manager, Snyder's-Lance, Inc.

    Mike Muscatell is a seasoned IT veteran with more than twenty years in the Information Security field. He is a certified ethical hacker. Was honored as top 100 professionals in the Information Security Field by Strathmore's for 2014. Member of a number of security organizations including Infragard, US Chamber of Commerce Cyber Committee.

  • speaker photo
    Moderator: James Kidwell
    Sr. Manager, IT Audit, CHAN Healthcare
  • speaker photo
    Cheri Sigmon
    Cybersecurity Consultant, ExecSec Inc.

    Leveraging 21 years of experience in leadership, information security and workforce development, as a Chief Information Security Officer (CISO), Office of the Secretary of Defense (OSD), Cheri secured sensitive military networks/communications/technology. The Joint Staff; USSTRATCOM Joint Task Force-Global Network Operations; Headquarters Air Combat Command; US Joint Forces Command. Retired US Air Force officer, Clemson University alum, native of York, SC.

  • speaker photo
    Brent Chapman
    Chief Information Officer / Chief Information Security Officer , RoundPoint Mortgage Servicing Corporation

    Brent Chapman is a successful technology executive with 17 years’ experience and currently serves as Chief Information Officer and Chief Information Security Officer of RoundPoint Mortgage Servicing Corporation. Mr. Chapman is the senior leader responsible for technology and information security, developing short and long term corporate strategic and operational plans with emphasis on the role that technology, information, and communication services support the plans and growth of the business. Mr. Chapman is a Six Sigma Black Belt, Certified ScrumMaster (CSM), has an MBA from Oakland University and a BA from Carthage College.

  • speaker photo
    Gary Howell
    Director of Cybersecurity, The Babcock and Wilcox Company
  • speaker photo
    Stephen Head
    Senior Manager, Experis

    Stephen is a Senior Manager in the Charlotte office of Experis Finance and has been a CISSP for over 20 years. He has managed an information security practice for a Global 1000 company, is the author of two books published by Thomson Reuters, is a CPA, CGMA, CMA, CISA, CISM, CGEIT, CRISC, CISSP, CBCP, CFE, CHP, CHSS, CITP, CPCU, MCSE, and has an MBA degree from Wake Forest University. He served for two terms as the International Chair of the ISACA Standards Board, and was instrumental in the creation and rollout of the CISM security management certification. He also served on the AICPA National Accreditation Commission and was a member of the AICPA Information Technology Executive Committee.

  • speaker photo
    Happy Hour
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store