googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 7, 2016
    9:00 am
    SecureWorld Plus - Sept. 7th - Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    President, CISSP, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: 201
  • Thursday, September 8, 2016
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Advisory Council Kickoff Breakfast - Third Party Risk Management - (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: 204
    8:30 am
    Managing Your Security Career; Which Hill Will You Climb?
    • session level icon
    speaker photo
    Information Technology Chief Security Officer, Western & Southern Financial Group
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: 201
    8:30 am
    OpenDNS, Part of Cisco: How to Block Threats Before, During & After an Attack
    • session level icon
    speaker photo
    Systems Engineer, OpenDNS, now part of Cisco
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 202
    8:30 am
    Selling a Product? Don’t Be The Breach!
    • session level icon
    speaker photo
    Global Product Security Manager, Johnson & Johnson
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: 203
    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Cybersecurity 2.0 - Thought Leadership for Changing Times
    • session level icon
    speaker photo
    Founder & CEO, BlackCloak
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    11:15 am
    Arbor Networks: The DDoS Shakedown: Extortion is Alive and Well
    • session level icon
    speaker photo
    Sr. Director, Product Marketing, Arbor Networks
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 203
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    speaker photo
    Systems Engineer, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: 201
    11:15 am
    Securing Payment Card Transactions with PCI
    • session level icon
    speaker photo
    Senior Director, Data Security Standards, PCI Security Standards Council
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: 202
    12:00 pm
    Advisory Council Roundtable Lunch - (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 204
    12:15 pm
    LUNCH KEYNOTE: Radware The Current Economics of Cyber Attacks
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: After the Hack
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 201
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    3:00 pm
    Collaborative Security Awareness Programs
    • session level icon
    speaker photo
    CISO, American Financial Group
    speaker photo
    Senior Communications Manager, American Financial Group
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 201
    3:00 pm
    Privacy and Data Security Law Update: Data Breach & Cyber Incident Response Preparedness
    • session level icon
    speaker photo
    Partner, Graydon Head
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 202
    3:00 pm
    Third Party Vendor Management and Reports Provided by Service Organization Related to Controls
    • session level icon
    speaker photo
    Audit Senior Manager - IT Assurance, Crowe Horwath LLP
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: 203
Exhibitors
  • Cincinnati, OH 2016
    Booth: 200
  • Cincinnati, OH 2016
    Booth: 106
  • Cincinnati, OH 2016
    Booth: 204
  • Cincinnati, OH 2016
    Booth: 330
  • Cincinnati, OH 2016
    Booth: 104
  • Cincinnati, OH 2016
    Booth: 302
  • Cincinnati, OH 2016
    Booth: 210
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.

  • speaker photo
    Mike Rock
    Information Technology Chief Security Officer, Western & Southern Financial Group

    Michael Rock is the information technology chief security officer for Western & Southern Financial Group (Western & Southern) based in Cincinnati. In this role, Rock oversees security efforts across the enterprise and identifies security initiatives and standards. He leads three functions: information technology risk, information security risk management services and cybersecurity operations. Prior to joining the company in 2014, Rock managed information security at Procter & Gamble. He began his career at Procter & Gamble in 2000, became an information security manager in 2009 and was promoted to information security section manager in 2013.

    Rock is a 2006 graduate from the University of Phoenix with a master of arts in business administration and a 1994 graduate from Florida State University with a bachelor of science in political science and government. He holds the Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP) designations. Rock resides in West Chester, Ohio, with his wife, April, and their four children, McKenzie, Bishop, Sophia and Sawyer.

  • speaker photo
    Paul Singleton
    Systems Engineer, OpenDNS, now part of Cisco
  • speaker photo
    Jon Litchfield
    Global Product Security Manager, Johnson & Johnson

    Jon Litchfield is the Global Product Security Manager at Johnson & Johnson. Jon has 15 years of information technology experience and 8 years of information security experience. Jon holds several industry and security certifications including CISA, PMP, and has recently applied for his CISM certification. Jon started his career in information security as a security lead and was promoted to Information security manager within Johnson & Johnson where he managed web applications, network security, third party risk, security incidents, and security awareness functions. Recently Jon has been focusing on security within Internet of Things (IoT) products and medical devices.

  • speaker photo
    Dr. Christopher Pierson
    Founder & CEO, BlackCloak

    Dr. Chris Pierson is the Founder & CEO of BlackCloak, a pioneer of personal digital protection for corporate executives, high-profile and high-net-worth individuals and their families. Chris has been on the front lines of cybersecurity, privacy protection, and fighting cybercrime in both the public and private sectors over 20 years. At the Department of Homeland Security, Chris served as a special government employee on their Cybersecurity and Privacy Committees. He’s also spent time as the Chief Privacy Officer for Royal Bank of Scotland, the world’s 3rd largest bank, as the Chief Information Security Officer for two prominent FinTechs, and as President of the Federal Bureau of Investigation’s Arizona InfraGard. Chris is also a Distinguished Fellow of the Ponemon Institute, a globally recognized keynote speaker & cybersecurity thought leader, and is frequently quoted by the media on cybersecurity & privacy topics.

  • speaker photo
    Sean Brady
    Sr. Director, Product Marketing, Arbor Networks
  • speaker photo
    Jeff Dolence
    Systems Engineer, Radware
  • speaker photo
    Emma Sutcliffe
    Senior Director, Data Security Standards, PCI Security Standards Council

    Emma Sutcliffe oversees a number of PCI Security Standards, including the PCI DSS and PA-DSS. She chairs the PCI SSC’s Technical Working Group (TWG) and the Tokenization Working Group, where she works closely with the Payment Brands and Affiliate members to develop standards, supporting documentation and guidance papers. Sutcliffe has over 15 years’ information security experience.

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    JD Rogers
    CISO, American Financial Group

    JD Rogers is the Chief Information Security Officer for American Financial Group, where he leads the IT security vision, strategy and function for the insurance holding company. JD has more than 20 years of information security experience working in the energy, manufacturing, finance and insurance industries. He joined American Financial Group in 2008 as the Director of Information Security for Great American’s Annuity Group, and assumed leadership of this function enterprise-wide in 2013. In this role, he created a cross-company information security group—the first of its kind for the organization. Previously, he held information security positions at Toyota, Duke Energy and Cinergy. Placing a strong focus on security integration into business process and culture, JD serves as a security evangelist to the 36 different business units within American Financial Group, regularly conducting department-wide presentations and one-on-one conversations, as well as presenting at industry conferences such as Black Hat, SecureWorld and the Dayton Defense Conference. JD Rogers holds a Bachelor of Science in computer science from Northern Kentucky University and a Master of Science in information systems from the University of Denver. He also holds numerous designations, including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), and GIAC Certified ISO-27000 Specialist (G2700).

  • speaker photo
    Amy Zimmerman
    Senior Communications Manager, American Financial Group
  • speaker photo
    Jack Greiner
    Partner, Graydon Head

    Jack Greiner is a commercial litigator who has is heavily involved in the areas of data privacy, Information Law, and social media. His peers selected him for inclusion in The Best Lawyers in America for his work in Commercial Litigation, Litigation-Banking and Finance, Litigation-First Amendment, and Litigation-Intellectual Property from 2005 to 2006.

  • speaker photo
    Sue Horn
    Audit Senior Manager - IT Assurance, Crowe Horwath LLP

    Sue is a Senior Manager in the IT Assurance Group within the Audit practice of Crowe Horwath, LLP with over 12 years of experience. Sue specializes in IT Assurance services such as support for all areas of computer based controls evaluated as part of Crowe’s financial audits, Service Organization Controls (SOC) attestation reports, and HITRUST certifications for various industries. Sue has been involved in the creation of the methodology used to perform SOC examinations and HITRUST certified assessments at Crowe and is a thought leader in regard to SOC reporting. Her clients include information technology services, financial services, insurance, healthcare, and manufacturing organizations.

secure world app
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes