Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, June 6, 2017
    9:00 am
    SecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 31

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.

  • Wednesday, June 7, 2017
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Advisory Council Round Table BREAKFAST: The Costs and Consequences of Insider Threat - (VIP / Invite Only)
    • session level icon
    Coffee / Breakfast Served
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: 30
    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:30 am
    InfraGard: Cybersecurity 2022: Cyber Vulnerabilities in the Near Future
    • session level icon
    Open to All Attendees
    speaker photo
    Squad CY-3, FBI Chicago
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Keynote Theater
    8:30 am
    Wombat Security: State of the Phish: Understanding End User Behaviors Towards Phishing
    • session level icon
    speaker photo
    Chief Architect, Wombat Security Technologies
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 24

    Hear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves and, learn about the most devastating types
    of phishing emails used and how to prevent them.

    8:30 am
    A New Framework for Overcoming Common Security Challenges
    • session level icon
    speaker photo
    Assistant Director, Information Security, ISC2, SANS
    speaker photo
    Director of Security Architecture, GE Digital
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: 25

    This session will focus on challenges typically encountered in managing security operations teams like budget, talent management, and reducing noise. Often times, these challenges directly connect to tangible gaps in mission/vision/strategy. We will introduce a framework and approach for managing these challenges.

    9:30 am
    OPENING KEYNOTE: The Cost and Consequences of Complexity in IT Security
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    The actions of Imposters, negligent and malicious insiders can have significant financial and reputational consequences for companies. Most companies, according to recent Ponemon Institute research, admit they have failed to detect a data breach involving the loss or theft of business-critical information. They also believe it is highly likely that one or more pieces of information critical to the success and competitiveness of their companies is now in the hands of a competitor. In this session, Dr. Larry Ponemon will quantify the cost of the insider risk, why the threat is serious and how to secure business-critical information in the workplace.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:15 am
    Articulating InfoSec Business Value with a Better Story
    • session level icon
    speaker photo
    Director of Information Technology, Gift of Hope, Founder, CHICAGO Metrics
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 26

    InfoSec leaders need to be able to tell their story in order to maintain a large gap between utility and cost to an organization. This talk will explore telling that story by discussing: metrics and their presentation, a brief overview of why stories matter, and most importantly, controlling the story.

    11:15 am
    Cisco: First Line of Defense: Adding a Security Layer
    • session level icon
    speaker photo
    Consulting Systems Engineer, Cisco
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 25

    A decade ago, firewalls and antivirus software were enough to protect against infiltration, but today’s threats are stealthy and patient. Without a predictive security intelligence program, an organization lacks proactive defense and potentially compromises massive amounts of sensitive data. We will lead a conversation on how security approaches can leverage DNS to prevent attacks before they happen

    11:15 am
    Radware: Cyber War Chronicles – Stories from the Virtual Trenches
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 24

    2017 saw a continuation of some cybersecurity threats, as well as the emergence of some attack types and trends. Ransom attacks, political hacks, and new dynamics around the accessibility and capability of attack tools have added even more challenges to security. This session will explore some of the latest evolutions of the threat landscape, through a combination of market intelligence, real-world case studies, and direct insights from those on the front lines of cybersecurity.

    11:15 am
    Building a Grassroots Cyber Threat Intelligence Community and Automating the Intelligence
    • session level icon
    Quick Start Guide for Threat Intel Program
    speaker photo
    CISO, Cook County
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 27

    Prescriptive steps in developing your own threat intelligence community. All meat no fluff!

    12:00 pm
    Advisory Council Round Table LUNCH: Riding the IoT Cloud - Marketing Genius or Privacy Nightmare? (VIP / Invite Only)
    • session level icon
    Lunch Served
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 30
    12:15 pm
    LUNCH KEYNOTE: Cisco – Emerging Threats
    • session level icon
    speaker photo
    Senior Threat Researcher, Cisco Talos
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    People responsible for defending networks realize that the security threat landscape is constantly changing. Understanding how threats evolve is critical to building better defenses. In this Keynote, Earl will analyze threats Talos has recently identified to illustrate some of the latest attacker techniques that people must defend against.

    1:15 pm
    Illumio: Adaptive Segmentation: What Cybersecurity Can Learn From the Secret Service
    • session level icon
    speaker photo
    Head of Cybersecurity Strategy, Illumio
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 25

    The Secret Service’s control of the environment around the President is the foundation of their security strategy. In cybersecurity, we rarely understand (much less control) our networks. This talk applies lessons from the Secret Service to network defense, showing how organizations can use understanding and control to enhance their cybersecurity.

    1:15 pm
    Panel: Stopping the Attacks (Incident Response)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 24

    Security teams are struggling to keep up with the myriad of attack vectors that exist. Future InfoSec professionals will take a more adversarial approach to incident response. Will we have artificial intelligence helping threat hunters squash attacks before they can do any significant damage on the network while alerting the authorities in real time? Can a true partnership form between organizations and law enforcement to share information?

    Join our experts as they discuss challenges modern security teams face and how we can build a better plan for tomorrow.

    1:15 pm
    Panel: What Will They Think of Next (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    It would seem the more we “build a better mousetrap” the better the threats become. Will machine learning and AI be used against us in the future? Will these and other innovations be hacked and used for gain? Will the Crime as a Business platform take off where business competitors are utilizing these attacks for the upper hand? Perhaps the cars that are being hacked will evolve into driverless vehicles that are hacking companies from inside there own parking lots. What about drones?

    So many questions, let’s see what our experts say on this panel.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    New CISO: First 90 Days
    • session level icon
    speaker photo
    VP, Information Security, Tribune Media
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 26

    This interactive presentation will walk through the stages we go through as the new head of information security in our company from the days preceding “Day One.” Checklists and ideas are shared to help you lift as many stones as possible while inspiring confidence in executive leadership.

    3:00 pm
    baramundi Software: Automating Endpoint Management: Patching, Deployment and System Building Made Easy
    • session level icon
    speaker photo
    Executive Manager, baramundi software USA, Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: 25

    With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network.

    3:00 pm
    Trend Micro: Securing Business Cloud Transformation
    • session level icon
    Security shouldn’t stand in the way of business agility, continuity, and flexibility provided by the cloud.
    speaker photo
    Global VP, Hybrid Cloud Security, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: 24

    Cloud projects today are as commonplace as backyard barbecues. Security should be part of a recipe to successfully meet cloud business adoption metrics, such as Time to Service, Time to Value, and Customer Attainment. This presentation will present a high-level understanding of current challenges, regulations, and business objectives, providing business unit owners the knowledge and tools to securely and effectively deliver products and services to their customers.

Exhibitors
  • baramundi software USA, Inc.
    Booth: 216

    baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,000 customers of all sizes and from every sector benefit from the independent German manufacturer's many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.

  • Binary Defense Systems
    Booth: 100

    BDS is a company that works with you to understand your environment, what you have and building defenses to combat what we face today and for the attacks of tomorrow. Technology is continuously changing, businesses change every day – in order to keep up with the changes, BDS has created an extensively flexible yet highly accurate way of detecting attackers. We are attackers, and we know the best ways in detecting how attackers breach your network. An added bonus with BDS – continual penetration tests are performed regularly to enhance and develop additional safeguards. We are here to defend, protect and secure your company.

  • Check Point Security
    Booth: 305

    Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

  • Cisco
    Booth: 220

    Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

  • CyberTrend
    Booth: TBD

    CyberTrend is a monthly business technology magazine for C-level executives, business owners, and affluent entrepreneurs. CyberTrend covers a broad range of technologies, companies, and solutions. Topics include mobility, security, data analytics, networking, communications, energy efficiency, and storage, among many others. Any technology that helps businesses become more efficient, improve ROI, and stay ahead of the competition is a fit for CyberTrend. CyberTrend helps readers understand the technologies that impact their organizations and make educated decisions when investing in new solutions.

  • DirectDefense
    Booth: 317

    Founded in 2011, DirectDefense offers security services that are unmatched within the industry. Our core strength is our deep experience in performing assessments for a wide array of networks, platforms, and applications. Our seasoned consultants are focused on providing world-class security services to our clients.

    Regardless of industry – financial, insurance, retail, hospitality, healthcare, education, gaming, technology, or energy and utilities, our wealth of knowledge and experience can assist you in achieving your security testing and strategy goals.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • F5
    Booth: 109

    F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

  • FireEye
    Booth: 109

    FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000.

  • Gigamon
    Booth: 117

    Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and performance. Gigamon’s Visibility Fabric™ and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprises government, and service provider networks operate more efficiently.

  • Illumio
    Booth: 217

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • InfraGard
    Booth: 201

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • Integration Partners
    Booth: 320

    We know and understand you have options when choosing the right partner. Networking technology alone isn’t a differentiator, it’s how we do business with you. We’ve curated the best solutions not just to support IT needs, but to support your business strategy. Our culture is one that influences the customer experience. We never stop improving, and so we will never let you fall behind. From this simple and often overlooked practice, we believe the greatest customer relationships come from our mutual and shared strategies. Now just think… WHAT’S POSSIBLE.

  • ISACA
    Booth: 308

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • ISC2
    Booth: 301

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation - The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

  • ISSA Chicago Chapter
    Booth: 110

    The Chicago Chapter of the Information Systems Security Association (ISSA) has a mission to offer a stimulating combination of discussion forums, hands-on learning, CISSP certification training, conferences, and other events which are designed to enhance understanding and awareness of information security issues for information security professionals.

    Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.

  • L&E
    Booth: 309

    L&E is a network of comedians, musicians, and writers that focuses on employee engagement, communication and corporate education. The L&E Privacy & Info Security Suites are a customizable, advertising-like, multimedia communications and awareness campaign consisting of short, fun, memorable songs & jingles, videos & animations, GIFs & Memes that engage employees in 60 seconds or less. We’re constantly creating and trying new things so that you always have a new way to raise and maintain awareness throughout the year. Be interesting! Be positive! Be ubiquitous! www.LearningsEntertainments.com/Suites

  • Nexum
    Booth: 208

    Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio and Wisconsin as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.

  • Preempt Security
    Booth: 209

    Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented Behavioral Firewall that couples User Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to mitigate threats in real-time without engaging already overwhelmed security teams.

  • Proofpoint
    Booth: 205

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Radware
    Booth: 105

    Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

  • SecureWorks
    Booth: 204

    Dell SecureWorks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Dell SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Trend Micro
    Booth: 225

    As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

  • TrustedSec
    Booth: 100

    Our #1 priority is you, our customer. We believe in our services and our quality of them. We truly care about each and every organization as much as you do. Our team is highly talented, skilled, senior, and not a commodity service like other INFOSEC consulting companies. TrustedSec’s model is to staff with only senior level resources and the highest quality of information security consulting. Our brand, reputation, and quality is how we have established ourselves in this industry and with the mindset of “always doing the right thing”. When we work with our customers, it’s more than “just another engagement” – it’s establishing an understanding with an organization, and working to make them better.

  • Venafi
    Booth: 116

    Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice. As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility. Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

  • Wombat Security Technologies
    Booth: 104

    Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

  • Zscaler
    Booth: 108

    Zscaler's Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security including financial services, health care, pharmaceutical, telecom and Internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, Cambridge, Massachusetts, and attended the doctoral program in system sciences at Carnegie Mellon University, Pittsburgh, Pennsylvania. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona, Tucson, Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    SSA Eric Shiffman
    Squad CY-3, FBI Chicago
  • speaker photo
    Kurt Wescoe
    Chief Architect, Wombat Security Technologies

    As Chief Architect at Wombat Security, Kurt is responsible for ensuring Wombat's software and systems are built on a sound foundation. He brings over 10 years of experience in engineering, across multiple industries. He also serves as a faculty member in the School of Computer Science’s master’s program in e-Business at Carnegie Mellon University. Kurt earned his M.Sc. in E-Commerce from CMU, and a B.S. in Computer Engineering from the University of Pittsburgh.

  • speaker photo
    Paul Yates
    Assistant Director, Information Security, ISC2, SANS

    Paul Yates currently serves as the Assistant Director for Information Security at the University of Chicago Medical Center. He is responsible for building and executing the strategy for the Security Operations and Risk Management teams within UCM’s Information Security Office. Mr. Yates has worked in the Healthcare, Consulting and DoD industries in his 9 years of Information Security experience. He also served in the Marine Corps for 5 years. Mr. Yates earned a Master’s degree in InfoSec and Assurance from George Mason (2012) and a MBA from UNC Chapel Hill – Kenan-Flagler Business School (2015). His MBA studies focused on Leadership, Strategy and Entrepreneurship. Mr. Yates is CISSP and GCIH certified. His professional interests include process improvement, data analytics and automation.

  • speaker photo
    Clay Carter
    Director of Security Architecture, GE Digital

    Clay Carter is the Director of Security Architecture at GE Digital and promotes secure, practical design throughout the company. In his five years at GE he has built secure enclave environments, consulted on multiple acquisitions and divestitures, and designed an agile policy & controls program. His current focus is rebuilding an agile security architecture and engineering team. Clay completed his Masters in Systems Engineering at the University of Virginia in 2016 and is an advocate for data-driven security. Prior to GE, Clay ran an agile software development team at Genworth Financial and studied Computer Engineering as an undergraduate.

  • speaker photo
    Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security including financial services, health care, pharmaceutical, telecom and Internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, Cambridge, Massachusetts, and attended the doctoral program in system sciences at Carnegie Mellon University, Pittsburgh, Pennsylvania. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona, Tucson, Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Edward Marchewka
    Director of Information Technology, Gift of Hope, Founder, CHICAGO Metrics

    Edward Marchewka is the Director of Information Technology for Gift of Hope. He has completed an MBA and an MS in Mathematics from Northern Illinois University, and a BS and BA from Thomas Edison State University. He also holds a Certificate in Nonprofit Management and Leadership from Northwestern University.

  • speaker photo
    Natasha Taymourian
    Consulting Systems Engineer, Cisco
  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    Ricardo Lafosse
    CISO, Cook County

    Ricardo Lafosse is the Chief Information Security Officer for Cook County under the Department of
    Homeland Security and Emergency Management, providing strategic information security leadership for
    the second largest County in the United States. In his role, Lafosse is responsible for the implementation and governance of the County’s information security program, including IT-compliance and risk activities.

    Lafosse has been the catalyst for establishing a county-wide IT risk management vision and strategy for Cook County, including development of a County-wide comprehensive IT security risk program. He proactively works with business units to implement practices and procedures that meet County information security standards and policies and advises County executives on the most effective use of information security and risk management strategies to improve the cybersecurity posture of the County.

  • speaker photo
    Earl Carter
    Senior Threat Researcher, Cisco Talos

    Earl Carter is a Senior Threat Researcher in Cisco’s Talos Group. Talos is a team of researchers that constantly examines the threat landscape to drive updated threat intelligence into Cisco security products as well as providing tools and information to the general security community through blogs, whitepapers and security tools.

  • speaker photo
    Nathaniel Gleicher
    Head of Cybersecurity Strategy, Illumio

    As head of Cybersecurity Strategy, Nathaniel is responsible for thought leadership and Illumio’s cybersecurity technology strategy. Prior to Illumio, Nathaniel managed and secured networks, investigated and prosecuted cybercrime at the U.S. Department of Justice, and served as director for cybersecurity policy on the National Security Council at the White House.

  • speaker photo
    Greg York
    VP, Information Security, Tribune Media

    Greg York leads the Information Security team at Tribune Media, home to a diverse portfolio of television and digital properties driven by quality news, entertainment, and sports programming with about 7,000 employees. Greg enjoys inspiring, innovating, and collaborating to drive business value; time with family; backpacking adventures; and craft beer.

  • speaker photo
    Jonathan Lange
    Executive Manager, baramundi software USA, Inc.

    Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.

  • speaker photo
    Carlos Gonzales
    Global VP, Hybrid Cloud Security, Trend Micro

    Carlos has over 20 years of expertise in enterprise software and infrastructure. Prior to joining Trend Micro, Mr. Gonzalez was a Sr. Sales Director at Oracle, responsible for sales and services of Oracle’s Cloud Computing and security initiatives for Latin America.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store