Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 7, 2016
    9:00 am
    SecureWorld Plus - Sept. 7th - Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 201
  • Thursday, September 8, 2016
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Advisory Council Kickoff Breakfast - Third Party Risk Management - (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: 204
    8:30 am
    Managing Your Security Career; Which Hill Will You Climb?
    • session level icon
    speaker photo
    Information Technology Chief Security Officer, Western & Southern Financial Group
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: 201
    8:30 am
    OpenDNS, Part of Cisco: How to Block Threats Before, During & After an Attack
    • session level icon
    speaker photo
    Systems Engineer, OpenDNS, now part of Cisco
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 202
    8:30 am
    Selling a Product? Don’t Be The Breach!
    • session level icon
    speaker photo
    Global Product Security Manager, Johnson & Johnson
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 203
    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Cybersecurity 2.0 - Thought Leadership for Changing Times
    • session level icon
    speaker photo
    Founder & CEO, Binary Sun Cyber Risk Advisors
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    11:15 am
    Arbor Networks: The DDoS Shakedown: Extortion is Alive and Well
    • session level icon
    speaker photo
    Sr. Director, Product Marketing, Arbor Networks
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 203
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    speaker photo
    Systems Engineer, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 201
    11:15 am
    Securing Payment Card Transactions with PCI
    • session level icon
    speaker photo
    Senior Director, Data Security Standards, PCI Security Standards Council
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 202
    12:00 pm
    Advisory Council Roundtable Lunch - (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 204
    12:15 pm
    LUNCH KEYNOTE: Radware The Current Economics of Cyber Attacks
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: After the Hack
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 201
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    3:00 pm
    Collaborative Security Awareness Programs
    • session level icon
    speaker photo
    CISO, American Financial Group
    speaker photo
    Senior Communications Manager, American Financial Group
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 201
    3:00 pm
    Privacy and Data Security Law Update: Data Breach & Cyber Incident Response Preparedness
    • session level icon
    speaker photo
    Partner, Graydon Head
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 202
    3:00 pm
    Third Party Vendor Management and Reports Provided by Service Organization Related to Controls
    • session level icon
    speaker photo
    Audit Senior Manager - IT Assurance, Crowe Horwath LLP
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 203
Exhibitors
  • Cincinnati, OH 2016
    Booth: 200
  • Cincinnati, OH 2016
    Booth: 106
  • Cincinnati, OH 2016
    Booth: 204
  • Cincinnati, OH 2016
    Booth: 330
  • Cincinnati, OH 2016
    Booth: 104
  • Cincinnati, OH 2016
    Booth: 302
  • Cincinnati, OH 2016
    Booth: 210
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Mike Rock
    Information Technology Chief Security Officer, Western & Southern Financial Group

    Michael Rock is the information technology chief security officer for Western & Southern Financial Group (Western & Southern) based in Cincinnati. In this role, Rock oversees security efforts across the enterprise and identifies security initiatives and standards. He leads three functions: information technology risk, information security risk management services and cybersecurity operations. Prior to joining the company in 2014, Rock managed information security at Procter & Gamble. He began his career at Procter & Gamble in 2000, became an information security manager in 2009 and was promoted to information security section manager in 2013.

    Rock is a 2006 graduate from the University of Phoenix with a master of arts in business administration and a 1994 graduate from Florida State University with a bachelor of science in political science and government. He holds the Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP) designations. Rock resides in West Chester, Ohio, with his wife, April, and their four children, McKenzie, Bishop, Sophia and Sawyer.

  • speaker photo
    Paul Singleton
    Systems Engineer, OpenDNS, now part of Cisco
  • speaker photo
    Jon Litchfield
    Global Product Security Manager, Johnson & Johnson

    Jon Litchfield is the Global Product Security Manager at Johnson & Johnson. Jon has 15 years of information technology experience and 8 years of information security experience. Jon holds several industry and security certifications including CISA, PMP, and has recently applied for his CISM certification. Jon started his career in information security as a security lead and was promoted to Information security manager within Johnson & Johnson where he managed web applications, network security, third party risk, security incidents, and security awareness functions. Recently Jon has been focusing on security within Internet of Things (IoT) products and medical devices.

  • speaker photo
    Christopher Pierson
    Founder & CEO, Binary Sun Cyber Risk Advisors

    Dr. Chris Pierson is the Founder & CEO of Binary Sun Cyber Risk Advisors - providing strategic & operational advice on the intersection of cybersecurity, business, risk and law for companies and boards. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity, anti-fraud, and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy & Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was a founding executive of Viewpost, a FinTech payments company, serving as their CSO and General Counsel and was also the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s (RBS) U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cyber Security Practice representing companies on cybersecurity and data breaches. Chris is a graduate of Boston College (B.A., M.A.) and The University of Iowa (Ph.D., J.D.), is a sought after keynote speaker on cybersecurity and privacy, board advisor for startups, and is frequently quoted by the media on these topics.

  • speaker photo
    Sean Brady
    Sr. Director, Product Marketing, Arbor Networks
  • speaker photo
    Jeff Dolence
    Systems Engineer, Radware
  • speaker photo
    Emma Sutcliffe
    Senior Director, Data Security Standards, PCI Security Standards Council

    Emma Sutcliffe oversees a number of PCI Security Standards, including the PCI DSS and PA-DSS. She chairs the PCI SSC’s Technical Working Group (TWG) and the Tokenization Working Group, where she works closely with the Payment Brands and Affiliate members to develop standards, supporting documentation and guidance papers. Sutcliffe has over 15 years’ information security experience.

  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    JD Rogers
    CISO, American Financial Group

    JD Rogers is the AVP of Enterprise Information Security at American Financial Group. American Financial Group is committed to providing insurance products through Great American Insurance Group that help to secure a healthy financial future for individuals and businesses. We believe that specialization is the key element to the success of our organization, as we focus on serving niche industries we know well.

    JD has over 18 years of information security experience. This experience ranges across many industries, with the majority of the experience in the energy, manufacturing, and financial space. This range of exposure has given JD a unique opportunity to learn and apply security best practices to risks facing these industries.

    He holds many industry standard security certifications, and is a regular speaker at several information security related events. He is also an active member in serving his local community.

  • speaker photo
    Amy Zimmerman
    Senior Communications Manager, American Financial Group
  • speaker photo
    Jack Greiner
    Partner, Graydon Head

    Jack Greiner is a commercial litigator who has is heavily involved in the areas of data privacy, Information Law, and social media. His peers selected him for inclusion in The Best Lawyers in America for his work in Commercial Litigation, Litigation-Banking and Finance, Litigation-First Amendment, and Litigation-Intellectual Property from 2005 to 2006.

  • speaker photo
    Sue Horn
    Audit Senior Manager - IT Assurance, Crowe Horwath LLP

    Sue is a Senior Manager in the IT Assurance Group within the Audit practice of Crowe Horwath, LLP with over 12 years of experience. Sue specializes in IT Assurance services such as support for all areas of computer based controls evaluated as part of Crowe’s financial audits, Service Organization Controls (SOC) attestation reports, and HITRUST certifications for various industries. Sue has been involved in the creation of the methodology used to perform SOC examinations and HITRUST certified assessments at Crowe and is a thought leader in regard to SOC reporting. Her clients include information technology services, financial services, insurance, healthcare, and manufacturing organizations.

secure world app
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store