Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, March 1, 20239:00 am[PLUS Course] Understanding the Threat Surface with API SecurityCyber Director, Elliott DavisRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmAPIs are found in many places within modern IT architectures. APIs are used in modern web applications and provide rich interactive experiences for users. Mobile applications leverage APIs to interact with backend systems. Businesses interact with one another in real time using these connections. With all these interconnections, APIs have become a target for attackers to exploit as they are often overlocked. This session will dive into the areas to focus on for API security, including how advisories abuse APIs, and what can be done to protect the API.
9:00 am[PLUS Course] Real-World Cyber Risk Management and Resilience PlanningCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmKey components covered include:
1) Lifecycle for investigating and responding to a cyberattack (such as a ransomware attack)
2) The legal, compliance, and regulatory issues that arise from such attacks
3) Legal and regulatory requirements for cyber risk management programs
4) Assessing and understanding the real-world business impact cyber risk has on the company
5) Prioritizing risks and developing a strategic action plan to execute
6) Implementing simple and cost-effective strategies that take into account legal, compliance, and regulatory requirements
7) The role of cyber insurance in overall resilience and incident response preparation - Thursday, March 2, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amCloud Security Alliance Charlotte Chapter MeetingOpen to all attendeesRegistration Level:Open Sessions
8:00 am - 8:50 amGet involved with CSA research to help define best practices, guidance and frameworks to help industry secure the cloud.
8:00 amLake Norman IT Professionals Chapter MeetingOpen to all attendeesRegistration Level:Open Sessions
8:00 am - 8:50 amSession description to come.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Opening Keynote] Threats to National Security in CyberspaceJIOC Commander, United States Cyber CommandRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterAs 2022 was a record-breaking year with the volume of cyberattacks, data breaches, and phishing scams on the rise, there was also an increase in state-sponsored hacktivism cases. In her keynote, Col. Candice Frost covers known hacking groups, their methods, motivations, and relationship to greater geopolitical developments. Col. Frost covers state-affiliated threats, while also touching other adjacent realms of the cyberthreat ecosystem, such as ransomware, DDoS attacks, and stolen information. In addition, she covers critical infrastructure, election security, and the security of local and state governments.9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amRisk Management: Understanding How to Assess and Communicate Cybersecurity RisksCybersecurity Director, Gannett FlemingRegistration Level:Conference Pass
10:15 am - 11:00 amThis interactive session will present a simple model for assessing and managing cybersecurity risks in an organization. This five-step approach is a practical method that anyone can follow. We will also discuss how to communicate risks to executive leadership.
10:15 am[Qualys] Cybersecurity Risk ManagementRegistration Level:Conference Pass
10:15 am - 11:00 amSession description coming soon.
10:15 amMoving to an Endpoint-Centric Zero Trust Security ModelTechnology Strategist, SentinelOneRegistration Level:Open Sessions
10:15 am - 11:00 amMany organizations are leaving behind their legacy perimeter-based security model in favor of a Zero Trust security model. While corporate identities and endpoints are trusted by default with a legacy perimeter-based security model, this is not the case with a Zero Trust security model. In a Zero Trust environment, everything is assumed to be breached, and user identities and endpoints must prove otherwise. In this presentation we will discuss the fundamentals of Zero Trust and how an organization can successfully navigate towards a Zero Trust security model.
11:10 amSurvey Results: Is the Cybersecurity Field Recession Proof?CEO, (ISC)2Registration Level:Conference Pass
11:10 am - 11:55 amSession description coming soon.
11:10 am[Panel] There’s a Bad Moon on the Rise – Are You Ready?Identifying the Current Threat LandscapeDirector, Security Strategy, PhosphorusRegistration Level:Open Sessions
11:10 am - 11:55 amLike the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.
The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.
Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.
11:10 am[Exabeam] Goodbye SIEM Effectiveness GapRegistration Level:Open Sessions
11:10 am - 11:55 amSession description coming soon.
12:00 pm[Lunch Keynote] CISA Services for Cybersecurity ResilienceChief of Cybersecurity, Region 4, DHS Cybersecurity and Infrastructure Security AgencyRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterResilience is more than a buzzword; it’s the backbone of any cybersecurity program—from strategy to planning to tools put in place to keep organizations secure. And don’t forget the people, trusted cybersecurity professionals who are the most resilient of all and put plans into action. This session covers resilience concepts and CISA services that help assess, develop, and maintain operational cybersecurity resilience.
12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pmIncreasing Attack Vectors from Overlayed IoT DevicesVP, IT Security, McCormick & CompanyRegistration Level:Conference Pass
1:15 pm - 2:15 pmSession description to come.
1:15 pm[Gigamon] Cloud VisibilityRegistration Level:Open Sessions
1:15 pm - 2:15 pmSession description coming soon.
1:15 pm[Panel] Lucy in the Cloud with DiamondsSecuring Your Cloud EnvironmentRegistration Level:Open Sessions
1:15 pm - 2:15 pmCan you “imagine” if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? While it is possible for that to happen with their hit-laden collection of songs today, it’s merely a tiny example of how businesses operate at a minimum in a hybrid cloud environment—many in a cloud-only platform.
With that comes security issues and another major area which cybersecurity professionals must work diligently to protect.
Our panel of experts share the good, the bad, and the ugly of operating in a cloud environment, what it takes to make the move to hybrid or multi-cloud successful, how to protect data from insider and outsider threats, and what it takes to provide the support DevOps teams need.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pm[Fireside Chat] Your Career in CybersecurityBISO, Bank of AmericaAuthor, "Break In Cyber," vCISORegistration Level:Conference Pass
2:30 pm - 3:15 pmWhether you are aspiring to break into cybersecurity or you are on your journey to becoming a CISO, this session is designed to help you “level up” in your career. This fireside chat discusses:
- Best ways to achieve career growth
- Education (certifications or on-the-job experience?)
- Short-term career planning
- Long-term career planning
- Different paths in cybersecurity (Red Team, Blue Team, GRC, and more)
Even if you are satisfied in your current role, learn how to make yourself “recession proof.”
2:30 pmInadvertent and Intentional Threats: The Lines Are BlurredSr. Director, Cyber Security, Acumatica, Inc.Registration Level:Conference Pass
2:30 pm - 3:15 pmSession description to come.
2:30 pmHear from Dr. Zero Trust: Trends, Technologies, and FrameworksAdvisor, AkeylessRegistration Level:Open Sessions
2:30 pm - 3:15 pmSession description coming soon.
3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pmTransforming Information Security for Businesses of All SizesCTO, Center for Internet SecurityRegistration Level:Open Sessions
3:45 pm - 4:30 pmIn order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirement that does not scale. Requirements placed on the end organization exacerbate the burden, whereas “shift left,” setting requirements on the vendor, can alleviate it. Industry has a unique opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns for security management is paramount.
3:45 pmCybersecurity Really Is a Team SportCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:Conference Pass
3:45 pm - 4:30 pmWhy strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams.
- AccessIT GroupBooth: TBD
AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.
AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.
- AkeylessBooth: TBD
Akeyless’ unique combination of innovative technology and cloud-native architecture, enables enterprises to fastly secure DevOps, cloud workloads, and legacy environments, while meeting compliance and regulations.
- Arctic Wolf & VaronisBooth: TBD
Arctic Wolf® is the market leader in security operations. Using the cloud native Arctic Wolf® Platform, we provide security operations as a concierge service. For more information about Arctic Wolf, visit arcticwolf.com.
Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation. For more information about Varonis, visit varonis.com.
- Atlantic Data SecurityBooth: TBD
Since 1993, Atlantic has been representing industry leading security products to help get customers to an acceptable level of IT security risk. Atlantic works extensively with both large enterprises and SMB markets, understanding their business goals before any solution is recommended. Atlantic’s strict focus ensures that customers receive the highest level of both service and support.
- AxoniusBooth: TBD
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.
- Critical StartBooth: TBD
Critical Start is a cybersecurity company with a holistic, customer-focused approach. We work with our customers to understand the impact of IT on their business and determine the associated risks. Using this risk profile, we can offer big-picture guidance on the strategies and controls that will enable them to effectively manage risk and improve security. Critical Start is 100% employee owned by a team of experts who are passionate about security, quality and service. For more information on what sets us apart, visit criticalstart.com.
- ExabeamBooth: TBD
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- CSA Charlotte ChapterBooth: TBD
CSA chapter membership allows opportunities for continued learning, security awareness, networking, and career growth.
- Network with peers and subject matter experts
- Gain valuable insight from industry professionals and peers
- Build cloud security awareness at the community level
- Participate in cloud security education and training locally
- Participate in CSA research and development
- Discuss cloud vulnerabilities and brainstorm solutions
- Be a leader in the cloud security field
- Member discounts on training and exams
- ISACA CharlotteBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
- (ISC)2Booth: TBD
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.
- Lake Norman IT ProfessionalsBooth: TBD
Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!
- NetskopeBooth: TBD
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- North Carolina InfraGardBooth: TBD
North Carolina InfraGard membership is comprised of professionals from various size companies of all industries. We hold regular meetings to discuss issues, threats and other matters that impact their companies. Speakers from public and private agencies and the law enforcement communities are invited. It is our goal to improve and extend information sharing between private industry and the government. InfraGard members gain access to information that enables them to protect their assets and in turn give information to government that facilitates its responsibilities to prevent and address terrorism and other crimes. Attend a local chapter meeting, meet FBI officials from your area and help protect your nation’s infrastructure.
- OpenText Security SolutionsBooth: TBD
OpenText is a world leader in Information Management, helping companies securely capture, govern and exchange information on a global scale. OpenText solves digital business challenges for customers, ranging from small and mid-sized businesses to the largest and most complex organizations in the world.
- Phosphorous CybersecurityBooth: TBD
Phosphorus Cybersecurity® is the leading xTended Security of Things™ platform designed to secure the rapidly growing and often unmonitored Things across the enterprise xIoT landscape. Our Extended Enterprise xIoT Security Platform delivers Attack Surface Management, Hardening & Remediation, and Detection & Response to bring enterprise xIoT security to every cyber-physical Thing in your enterprise environment. With unrivaled xIoT discovery and posture assessment, Phosphorus automates the remediation of the biggest IoT, OT, and Network device vulnerabilities—including unknown and inaccurate asset inventory, out-of-date firmware, default credentials, risky configurations, and out-of-date certificates.
- Qualys, Inc.Booth: TBD
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
- SecurEnds, IncBooth: TBD
SecurEnds provides companies with a tool to automate user access reviews (UAR) across cloud and on-prem applications to meet SOX, ISO27001, PCI, HIPAA, HITRUST, FFEIC, GDPR, and CCPA audit requirements. Utilizing fuzzy logic to pull data from systems of record (SOR), complimentary identity governance and administration (IGA) solutions, and SaaS-based, custom, and legacy downstream applications, SecurEnds provides a complete, end-to-end process for UAR, then automates it out of the box.
- SentinelOneBooth: TBD
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.
- Tego + RubrikBooth: TBD
Tego is an engineering-led, forward thinking technology team that creates competitive advantage by solving problems and delivering results with remarkable efficiency. Collectively, we’ve spent decades solving IT challenges while supporting the full spectrum of commercial and government entities of all sizes. We have an expert understanding of the strategies, tools and methodologies that support mission-critical data center and cloud services. Based in North Carolina, Tego has a strong commitment to fostering long term relationships and delivering unparalleled support.
Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance. We are trusted by the world’s leading companies and industry-leading partners. Get Rubrik’s latest news, download the media press kit, and reach out to the press team. Learn more at rubrik.com.
- TevoraBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- George Jouldjian, InstructorCyber Director, Elliott Davis
George has 21 years of experience as an IT Security Professional who works with clients in a variety of industries to analyze and improve their overall security posture through penetration testing and threat assessments. He also advises organizations on cyber incident response and provides comprehensive cybersecurity consulting services. George has conducted network and application penetration tests for clients worldwide, including Fortune 500 companies, and conducted Internet of Things (IoT) security reviews for commercial devices.
Certifications: CISSP, GPEN, GWAPT, GXPN, GMOB, QSA, CISM, CISA, OSCP, OSWP, OSEP, eCPTX, eWPTX, CCSP
- Shawn E. Tuma, InstructorCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Col. Candice E. FrostJIOC Commander, United States Cyber Command
Candice E. Frost is the Joint Intelligence Operations Center Commander at the United States Cyber Command. As the commander, Colonel Frost leads over 200 employees from the Defense Intelligence Agency (DIA), National Security Agency, and Department of Defense, to provide and produce intelligence required to direct, operate, and secure Department of Defense networks, systems, and data; deter or defeat strategic threats to U.S. interests and infrastructure; and support achievement of Joint Force Commanders objectives.
Before serving in her current role, Colonel Frost was the Director of Foreign Intelligence with the Headquarters of the Army Staff, G-2. She was responsible for daily briefings of the future strategic environment to the Secretary of the Army, Chief of Staff of the Army, Vice Chief of Staff of the Army, and the Army G2.
Colonel Frost’s commitment to national security includes three decades of public service. Her career in intelligence and cyber, includes operational tours of duty in the Balkans, multiple deployments to Afghanistan, and currently, her work at Fort Meade. Candice was instrumental in the integration of women into combat arms and served close to half of her career in infantry divisions. Colonel Frost is an adjunct professor at Georgetown University teaching masters students in the Security Studies Program. She has spoken and instructed at colleges and universities to include Harvard, MIT, Columbia, Universities of Arizona, Florida, and Illinois. She also briefed the National Intelligence Council and spoke at conferences like RSA and the Billington Summit about technology and national security.
A graduate of the United States Military Academy at West Point, Colonel Frost holds masters degrees from Central Michigan University and the United States Army School of Advance Military Studies. Her awards and decorations include the Bronze Star, Legion of Merit, and Combat Action Badge. She is also the recipient of the Billington Cybersecurity Workforce Development Award, Business Council for Peace Lifetime Mentorship Award, and the Lifetime Achievement Award in Muscatine, Iowa.
She is a member of the Executive Advisory Council for AFCEA DC. COL Frost is the past recipient of numerous fellowships, including Seminar XXI at the Massachusetts Institute of Technology, the Army War College Fellowship with the Central Intelligence Agency, and the Foundation for Defense of Democracies Fellowship. Colonel Frost pivots in 2023 from the United States Army after more than twenty-five years of service.
- Tamika BassCybersecurity Director, Gannett Fleming
Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.
- Chris BoehmTechnology Strategist, SentinelOne
Chris Boehm currently works as Technology Strategist at SentinelOne. As a cybersecurity thought leader, he drives strategy and works closely with some of the largest organizations in the world. Prior to SentinelOne, he was a Senior Product Manager at Microsoft in the Azure Security engineering division. In his 5 years at Microsoft, he focused on driving product strategy and delivering strategic customer enablement. Chris worked closely with the Microsoft Cyber Defense Operations Center (CDOC) and Microsoft Threat Intelligence team (MSTIC) to work side by side on research and enablement to create a more intuitive investigation experience for Security Operations Centers.
- Clar RossoCEO, (ISC)2
Clar Rosso has more than two decades of experience helping global professional associations and certifying bodies grow and strengthen member value. As CEO of (ISC)², she has established a forward-looking strategic framework and set bold goals for the future of the association. Under her direction, (ISC)² has established a Diversity, Equity, and Inclusion (DEI) program to support the profession’s growth, developed a global advocacy strategy to ensure members’ concerns are represented on a global stage, and has helped to shift the cybersecurity workforce shortage conversation to one that is focused on shrinking the gap.
- Robert EspositoDirector, Security Strategy, Phosphorus
As Director of Security Strategy at Phosphorus Cybersecurity, Robert helps organizations address xIoT attack surface management and preventative risk mitigation, enabling organizations to safely embrace an increasingly Thing-based world. He has been a cybersecurity professional in the Silicon Valley for over 20 years, with his early career focused on environmental industrial control systems for major semiconductor manufacturers' photolithography processes. Since then he has been part of several successful cybersecurity companies and system integrators in roles such as field engineer, systems engineer, solutions architect, and technical advisor. His career highlights include a Boeing/Narus patent for behavioral-based botnet beacon detection, pen testing on Boeing's 787 Dreamliner, SecOps program wins for Singapore and Japan, working with the DoD, DHS, and DOE, including Boeing Energy Project 1304 – a partnership with DOE & PJM Interconnection RTO for cyber security enhancements for the Smart Grid Demonstration Program. Robert has a deep understanding of SecOps and often speaks with clients regarding their security and identity programs, automation, orchestration, and visibility.
- Panel Discussion
- Sean McCloskeyChief of Cybersecurity, Region 4, DHS Cybersecurity and Infrastructure Security Agency
Sean McCloskey is the Chief of Cybersecurity, Region 4, within the Department of Homeland Security’s (DHS) Cyber and Infrastructure Security Agency (CISA). As the Chief of Cybersecurity, Sean leads the Cyber Security Advisors in Region 4 that assist critical infrastructure owners and operators in improving their cybersecurity capabilities and posture. Sean is based in Charlotte, North Carolina.
Prior to joining DHS, Mr. McCloskey served as an information security consultant with over 18 years of experience supporting government clients. Mr. McCloskey has also served for over 26 years in the United States Marine Corps Reserve (USMCR).
Mr. McCloskey holds a B.S. in Computer Science and a M.S. in Information Security and Assurance.
- John Opala, PhDVP, IT Security, McCormick & Company
Cybersecurity thought leader with over 19 years of technical and leadership experience in multiple disciplines.
- Panel Discussion
- Rob DalzellBISO, Bank of America
Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has worked in the following cybersecurity areas: BISO, Third Party Defense, Vulnerability Management, Identity and Access management, Responsible Vulnerability Disclosure, email encryption and general security awareness. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte and recently completed a Master’s degree in Cybersecurity. He is an ardent believer in life-long learning. In his spare time, Rob can be found playing or officiating soccer, generating sawdust or digging in the dirt around his house and trying to keep a British sports car running.
- Mike MillerAuthor, "Break In Cyber," vCISO
Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For over 25 years, Mike has specialized in both offensive and defensive cybersecurity, and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to follow his passion by helping organizations understand business risk and strategically aligning a company’s security posture to protect it.
- Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Kathleen MoriartyCTO, Center for Internet Security
Kathleen Moriarty, Chief Technology Officer, Center for Internet Security, has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.
Kathleen achieved over 20 years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet.
Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College. Published work: "Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain," July 2020.
- Shawn E. TumaCo-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your cybersecurity community for learning and professional growth. Register today!
