- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Tuesday, October 16, 20189:00 amSecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program9 a.m. - 3 p.m. - Earn 12 CPEs!CISO, Uplight; Co-Host, Colorado = Security podcastRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: 202Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.
9:00 amSecureWorld PLUS - How to Build the Future: A Deep Dive into AI, Blockchain, and Preparing Your Organization for 5-10 Years Ahead9 a.m. - 3 p.m. - Earn 12 CPEs!The Bald Futurist, Former Chief Evangelist and Futurist, IntelRegistration Level:- SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: 201In this workshop, you will learn about two of the most important technologies shaping our future, Artificial Intelligence and Blockchain technology. You will then learn how to use the Futurecasting process to model, plan, and build future experiences, including some that are a built around AI and Blockchain. While it does discuss some technical topics at a high level, this workshop is open and accessible to anyone and everyone. Sign up today to boost your knowledge on both AI and Blockchain, and to learn new techniques that will enable you to imagine, plan and build the future.
Hear from Steve as he gives a preview of what he will cover in this PLUS course: https://youtu.be/eN-wYrdPyjs
AGENDA
8:00-8:15 a.m. Introductions
8:15-9:45 a.m. Artificial Intelligence: How AI Will Reshape Every Business, Including Yours (1.5 hours)
Artificial intelligence (AI) is a profoundly important set of technologies that are already shaping the way we live our lives, and the ways that businesses operate. As the second era of computing, AI will have as profound of an effect on business and society as did electrification and traditional digital computers. Over the next decade, AI will transform all our lives and will reshape every industry. AI will power autonomous vehicles, smart robots, drones, virtual assistants, and chatbots. It will manage our smart cities, power sentient factories, and oversee our smart energy grids. AI will turbo-charge medical diagnosis, revolutionize customer service, and aid in the discovery of new materials and new pharmaceuticals. AI will reshape every business process, and could reshape the structure of every team. The HR Director and CIO of every company will need to become best friends as IT and HR co-own a blended human-machine labor force. Every IT person needs to understand the capabilities, limitations, and implications of artificial intelligence, no matter their level of technical acumen. This session explains what Artificial Intelligence is and how it can be used. Attendees will then review the main concepts of AI: artificial neural networks, deep learning, supervised learning, unsupervised learning, reinforcement learning, and generative adversarial networks. Finally, the session will explore how AI may develop in the future, and how it will require a rethinking of every workflow, and every workplace.
9:45-10:00 a.m. BREAK
10:00-11:30 a.m. Blockchain Beyond Cryptocurrencies: Your Foundation to Create New Business Value (1.5 hours)
Cryptocurrencies like Bitcoin are just one of the many applications that can be built on top of Blockchain technology. Blockchain has rapidly become a valuable platform for new value creation across a wide range of industries. Heavyweights like IBM, Walmart, Accenture, Intel, and Bank of America are all placing big bets in this area. Over the last thirty years, we have moved from the client-server era, through the cloud computing era, and now with Blockchain to the era of distributed applications. Blockchain technology removes the need for central authorities, creates trust in a trestles world, reduces transaction costs, and dramatically improves traceability. In this session, you’ll cover Blockchain basics, understand why Blockchain technology is so disruptive, and learn how distributed applications (dApps) enable a new innovation paradigm that brings with it new funding and collaboration models. You’ll then look at examples of how Blockchain is already being used to solve problems in a wide range of industries, from real-estate to supply chain, and healthcare to energy. Be sure that you are prepared to take full advantage of the increased levels of trust, privacy, traceability, and data security made possible by Blockchain technology. Every IT person needs to understand the implications of this technology to their business.
11:30-1:00 p.m. LUNCH
1:00-4:00 p.m. Futurecasting Workshop (3 hours)
In this workshop, you’ll learn all the main steps of the Futurecasting process, a proven foresights process developed by futurist, Brian David Johnson. You will then practice each of these major steps—trend synthesis, personas, rapid futurecasting, science fiction prototyping, and backcasting—and start to develop some plans for the future. Some of these plans will build upon what you learned during the two morning sessions focused on AI and Blockchain. In addition to using Rapid Futurecasting to design simple experiences that you may wish to create, you will also consider the investments, partnerships, R&D effort, and talent plans you might need to succeed. “The best way to predict the future is to design it”. So said engineer, inventor, and futurist Buckminster Fuller. Similar statements have been credited to Alan Kay, Peter Drucker, and even Abraham Lincoln. The bottom line is that in order to seize a leadership position in any market, a company needs to take an active role in defining the future that they want to build, and then develop a comprehensive plan to build that imagined future. Attend this workshop to learn how to deploy the Futurecasting process at your company, or perhaps in your own life, as a way to help you model, plan, and then build the future that you want.
4:00 p.m. CLOSE
- Wednesday, October 17, 20187:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amLocal Association Panel: Open to all attendeesPresentation: Greater Cincinnati IT Security Groups: Better Yourself and CareerSecurity Administrator, 19-facility Healthcare SystemVice President, Greater Cincinnati ISSAChair, CiNPA Security SIG, Financial Services industrySystems Administrator, VFIS of OhioSr. Information Security Analyst, Greater Cincinnati Hospital SystemRegistration Level:- Open Sessions
8:00 am - 9:15 amLocation / Room: 2012013 brought us the leaked documents of Edward Snowden, the launch of HealthCare.gov, and the threat of nation-state actors. Target, JPMorgan Chase, and Home Depot ushered re-introduced targeted attacks against US organizations in 2014. 2015 highlighted the cost of our personal data with the US Office of Personnel Management and Ashley Madison data breaches. DDoS and cryptoware-as-a-service rose in popularity in 2016. 2017 revealed the hidden vulnerabilities in our software, highlighted by Equifax.
The field of IT Security is ever-evolving. For many in the industry, this is the challenge that drives our passion. But let’s face it, it can also be overwhelming and we can all use some help! Join us for a roundtable lead by WLW 700 AM and Clear Channel’s “Dave The IT Guy” as he leads representatives from some of Greater Cincinnati’s local IT Security Groups: CiNPA +SIG, ISSA, (ISC)2, Security MBA. We will discuss local resources that are available to you here in our city to better yourself and your career.
8:30 amWhere Does It Hurt? The Anatomy of a Data BreachCorporate Compliance Counsel, PaycorRegistration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: 202Awareness is not understanding. In the age of Google and WebMD, people are aware of a lot, but they don’t understand nearly as much. Case in point: All that causes sickness is not cancer, and not all who lose data have had a breach.
My goal in this presentation is to challenge your understanding of what makes up a data breach by explaining its full anatomy so that you can diagnose where it hurts and how to fix it—or if you are even sick at all. All while sharing some of life’s best medicine (laughter) along the way.
8:30 amIoT and Criminal LawLaw Professor, University of DaytonRegistration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: 203This presentation will provide a broad overview of the various ways IoT impacts criminal law and procedure. 9:30 amOPENING KEYNOTE — Going Digital: Building Your Strategic Roadmap for the Next Wave of Digital TransformationThe Bald Futurist, Former Chief Evangelist and Futurist, IntelRegistration Level:- Open Sessions
9:30 am - 10:30 amLocation / Room: Keynote TheaterThe next major wave of digital transformation will integrate the physical parts of your business even more intimately with the digital world, using sensors, analytics, artificial intelligence, robotics, augmented reality, 5G networking, and blockchain technology. In this talk, former Intel futurist Steve Brown presents a fast-paced, fun exploration of what it will mean to “go digital” in the next decade, and reviews the business and security strategies we will need to navigate the road ahead.
Hear from Steve as he gives a preview of what he will cover in his keynote: https://youtu.be/Er1spVCyzS8
10:30 amConference Break / Exhibitor Product DemonstrationRegistration Level:- Open Sessions
10:30 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council Roundtable - (VIP / Invite Only)Americas IT Security Operations Manager, Munich Re (Group)Registration Level:- VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: 108This session is for Advisory Council members only.
11:15 amBranding Cybersecurity AwarenessCybersecurity Awareness Program LeaderRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: 204People have an affinity for brands and those who love using a given product or service will often promote those brands to others through word of mouth. When awareness programs are branded and executed correctly, employees are more engaged and will likely share information with their coworkers. This session will cover how branding your cybersecurity awareness program creates an opportunity to build trust with your users while influencing behaviors and the way they think about protecting information. 11:15 am[Trend Micro] Thwarting a Cyber-Physical Attack in the IoT EraVP, Infrastructure Strategies, Trend MicroRegistration Level:- Open Sessions
11:15 am - 12:00 pmLocation / Room: 201While businesses and consumers see opportunity and efficiency in the billions of devices now connected to the Internet of Things and Industrial Internet of Things, cyber criminals also see an opportunity in the vulnerabilities created with each connection. This session will outline three things you need to understand in order to prevent a cyber-physical attack in our digitally connected world.
11:15 amRSA: Securing the Vendor EcosystemPractical Steps for Securing Third parties That Fuel Your Digital TransformationSr. Product Manager, RSASr. Director, Product Marketing, SecurityScorecardRegistration Level:- Open Sessions
11:15 am - 12:00 pmLocation / Room: 202As companies across the world pursue digital transformations, vendors are playing an increasingly key role. They store our customer data, process our payments, and host our cloud platforms. It isn’t enough to just pursue security within our own organization. We have to ensure security across the entire vendor ecosystem. Join SecurityScorecard and RSA Archer as they share a best-practice approach for securing the new frontiers of digital business.
11:15 amGet Out of Your Own Way: Building a User-First Security ProgramHead of Information Security and Privacy, Safelite GroupRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: 203For years, security programs have been about how to stop people from doing what they want to do. On top of that, we force users to take boring computer-based training, subject them to impossible password requirements, and punish them when they click on a bad link. It’s time to rethink the security user experience In this talk, Grant Sewell will walk through some of the worst user experiences we create in our security programs, and provide some examples on how to fix them. Creating a positive security culture requires understanding your business and employees, treating them with dignity, and thinking with a mentality that puts the user first.
12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Americas IT Security Operations Manager, Munich Re (Group)Registration Level:- VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: 108This session is for Advisory Council members only.
12:15 pmLUNCH KEYNOTE: Think Big! Securing the World - The State of Cybersecurity in the Aviation IndustrySVP, Global Chief Information & Product Security Officer, GE AviationRegistration Level:- Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote TheaterUnderstand the risks, threats and unique challenges in the Aviation industry as we strive to build a secure and resilient eco -system. 1:15 pmPanel: Cloudy With a Chance of BreachRegistration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: 201Everything old is new again. Migrating to the cloud certainly is not a new thing. It is for some smaller companies that are just now able to afford making the move to the cloud. Cloud boasts a secure, disaster proof option for companies to store their data offsite with access to that data from practically anywhere. So, who’s fault is it when the data is compromised? What if your information is stolen from the cloud because another user’s data was at fault? At the end of the day, isn’t the cloud just someone else’s computer? Join this panel discussion as they guide you through the pros and cons in migrating to the cloud.
Panelists:
Geoff Rance, Trend Micro
Kes Jecius, Redseal
Tim O’Connor, Cadre
Moderator: Tom Dager1:15 pmPanel: Building a Better Mouse Trap (Emerging Threats)Registration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterTo be successful, as an industry, we must strive to get ahead of the bad guys. Easy enough to say but how? By taking a look at the capabilities of the threats we see today we should be able to make some educated guesses on what threats of tomorrow will look like. We know the bad guys don’t follow the rules, take the path of least resistance, and don’t care who they hurt in the process. We need to start thinking like them so that we can figure out what their next step is instead of guessing/hoping.
Panelists:
Adam Gates, Malwarebytes
Paul Schofield, enSilo
Matthew Gardiner, Mimecast
Donovan Blaylock, Sailpoint
Moderator: Andy Willingham2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:- Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
2:30 pmNetworking Break — Dash for Prizes and CyberHunt winners announcedRegistration Level:- Open Sessions
2:30 pm - 2:45 pmLocation / Room: SecureWorld Exhibitor FloorBe sure to have your badge scanned with participating exhibitors throughout the day. Past prizes have included Kindles, Bose wireless headphones, gift cards, iPads, drones, and more! *Must be present to win.
3:00 pmTeaching the Human: Security Awareness Program Design and DiscussionAmericas Lead for Human Cyber Risk and Education, EYRegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: 203At any given moment in their work day, a person will make a security decision that will impact your organization. Have you enabled your workforce with the knowledge to make the right one? Generational and cultural differences, as well as learning styles, will all impact the design of a security awareness program. Learn about these factors and how social engineering is the greatest threat your workforce faces in this session.
3:00 pmDLP Demystified: How I Learned to Stop Worrying and Love my Inner Blue Team RootsVice President, Greater Cincinnati ISSARegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: 202Today data breaches have become a common fixture of our daily lives. Executives are paying closer attention to their organization’s security posture and funding projects aggressively. Often these projects involve a rollout of flashy new technology and / or devices. These solutions are sold, marketed, and deployed as silver bullet solutions. Technologies such as DLP are “open sandbox” tools that allow a company to build policies around how data can be stored, processed, and transmitted. The same Lego “bricks” can be used to make a space shuttle can also be used to make a dinosaur, a pirate ship, or even a spooky castle. The same is true in Data Loss Prevention (DLP).
3:00 pmCheck Point Software Technologies: Blueprint For Architecting Your CloudSecurity Engineer, Check Point Software TechnologiesRegistration Level:- Open Sessions
3:00 pm - 3:45 pmLocation / Room: 201This session will explore the top five principles to building a secure cloud environment, how to achieve the best security controls for your cloud, and how to keep security aligned with the agile, elastic and dynamic nature of the cloud.
- ADTBooth: 406
For over 140 years, ADT has made the security of our customers our top priority. Today, more than 18,000 professionals in over 200 locations throughout the U.S. and Canada ensure that our 8 million customers stay as safe and secure as possible.
- ASISBooth:
ASIS International is the world’s largest membership association for security professionals. With hundreds of chapters across the globe, ASIS is recognized as the premier source for learning, networking, standards, and research. ASIS ensures its members and the security community have access to the intelligence and resources necessary to protect their people, property, and information assets. www.asisonline.org
- AttivoBooth: 301
Attivo Networks provides real-time detection and analysis of inside-the-network threats. The Attivo ThreatDefend Deception and Response Platform detects stolen credentials, ransomware, and targeted attacks within user networks, data centers, cloud, SCADA and IoT environments by deceiving an attacher into revealing themselves. Comprehensive attach analysis and actionable alerts empower accelerated incident response.
- BarklyBooth: 308
Barkly is advancing endpoint security with the strongest, smartest protection delivered with simplicity. The Barkly Endpoint Protection Platform provides multi-vector attack blocking for exploits, scripts, executables, ransomware, and more, and has visibility into all levels of the system, including the CPU. Barkly is formed by an elite team of security and SaaS experts from IBM, Cisco, and Intel, backed by investors NEA and Sigma Prime, and independently certified for anti-virus replacement, HIPAA, PCI DSS & NIST. Learn more by visiting us at www.barkly.com, or follow us on Twitter @BarklyProtects.
- Big Switch NetworksBooth: 106
Big Switch Networks is the next-gen networking company. Big Monitoring Fabric is an NPB that enables pervasive visibility and security across all workloads: physical, VM , container or cloud. Big Mon Inline enables pervasive security in the DMZ while offering lower-cost and SDN-centric operational simplicity. Tech partnerships include: A10, Palo Alto Networks, Symantec, FireEye, ExtraHop, Riverbed.
- BitdefenderBooth: 203
Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.
From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.
- CA TechnologiesBooth: 110
CA Technologies helps customers succeed in a future where every business— from apparel to energy— is being rewritten by software. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live— from the data center to the mobile device.
Our business management software and solutions help our customers thrive in the new application economy by delivering the means to deploy, monitor and secure their applications and infrastructure. Our goal is to help organizations develop applications and experiences that excite and engage and, in turn, open up money-making opportunities for their businesses.
- Cadre Information SecurityBooth: 206
Data and network security is a critical element for any business, but it is not enough to win. To win, cybersecurity must be viewed through the prism of business process management, align with capabilities and core competencies of the business and be optimized to minimize or eliminate the friction. For more than 25 years, Cadre Information Security enables operationally obsessed, mid-market companies to lower their costs, gain more control and increase the velocity and impact of the efforts. For more information, visit www.cadre.net
- Carbon BlackBooth: 302
Carbon Black is Transforming Security Through Big Data and Analytics in the Cloud Growing trends in mobility and cloud have made the endpoint the new perimeter. New and emerging attacks are beating traditional defenses, and security teams are too reactive and held back by their technologies. Carbon Black is leveraging the power of big data and analytics to solve the challenges surrounding endpoint security. With the Cb Predictive Security Cloud platform, we are transforming cybersecurity to deliver a new generation of cloud-delivered security solutions designed to protect against the most advanced threats.
- Check Point Software TechnologiesBooth: 202
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- CI SecurityBooth: 305
CI Security provides Managed Detection & Response services, combining purpose—built technology with expert security analysts to perform full-cycle threat detection, investigation, response, and recovery. With clients across healthcare, public sector, and financial services, CI Security’s technology platform, Security Operations Center, and Information Security consulting services minimize the impact of security breaches, and add significant value to existing internal IT teams.
- Cincinnati Networking Professionals AssociationBooth: TBD
Established in 1991, the non-profit Network Professional Association (NPA) is a professional association for computer network professionals. Members adhere to a code-of ethics, demonstrate continual professional development and knowledge, adhere to the latest best practice standards, and strive for continual growth. International awards for professionalism honor individuals for outstanding achievements and meeting the values of professionalism.
The NPA offers a Certified Network Professional CNP credential and provides advocacy for workers in the field. Members receive a certificate of membership, quarterly journal publications, chapters and programs, and opportunities to volunteer and publish.
- CylanceBooth: 108
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
- DarktraceBooth: 104
Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,500 organizations to protect against threats to the cloud, email, IoT, networks, and industrial systems.
The company has over 1,200 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.
- EC-CouncilBooth:
International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.
- ECTFBooth:
As a result of the amalgamation of advanced technology and the Internet, both the quantity and sophistication of cybercrimes targeting U.S. financial institutions and critical infrastructure have increased. Today, criminal trends show an increased use of phishing emails, account takeovers, malicious software, hacking attacks and network intrusions resulting in significant data breaches. To protect the nation’s financial infrastructure from cyber and financial criminals, the Secret Service has adopted a multipronged approach.
- ForeScout Technologies, Inc.Booth: 301
ForeScout Technologies, Inc. has pioneered an agentless approach to network security to address the explosive growth of the Internet of Things (IoT), cloud computing and operational technologies (OT). We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of today’s vast array of physical and virtual devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2018, more than 2,900 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions.
- ImpervaBooth: 201
Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.
- InfraGard CincinnatiBooth:
The mission of the InfraGard Cincinnati Members Alliance is to increase the security of the United States’ national infrastructure through information exchange, education, outreach, and similar efforts. To accomplish our goal, we strive to maintain a close working relationship between federal agencies such as the Federal Bureau of Investigation and the Department of Homeland Security, law enforcement agencies, subject matter experts such as cybersecurity and physical security professionals, industry-specific experts, and numerous other professionals.
- ISACA CincinnatiBooth:
The Greater Cincinnati ISACA® Chapter is a not-for-profit professional association serving the information technology audit, security, and control community. We support the areas of Cincinnati & Dayton, Ohio and Northern Kentucky. The chapter consists of over 450 professionals that represent a cross-section of the public, private, and not-for-profit business sectors at all levels within those industries.
Purpose: To promote the education of individuals for the improvement and development of their capabilities relating to the auditing of and/or management consulting in the field of Information Technology audit and control.
- ISC2 Cincinnati Tri-State ChapterBooth:
Follow us on Twitter: https://twitter.com/Cinci_Tri_ISC2
- ISSA Greater Cincinnati ChapterBooth:
The Greater Cincinnati Information Systems Security Association is a non-profit group dedicated to providing educational and networking opportunities to promote the exchange of ideas, knowledge, and member’s growth within the information security profession. The Greater Cincinnati Chapter will host monthly meetings with a variety of security professionals. Please check our events page for further information on upcoming events.
- Ixia, a Keysight BusinessBooth: 304
We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.
- MalwarebytesBooth: 408
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations, simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives. Visit us at www.malwarebytes.com/business.
- NexumBooth: 301
Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio, and Wisconsin, as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.
- OWASP CincinnatiBooth:
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas.
The Cincinnati chapter leads are Andy Willingham and Allison Shubert. Chapter meetings are free and open to anyone interested in information security, risk management, data protection and application security.
- Preempt SecurityBooth: 303
Preempt delivers a modern approach to authentication and securing identity in the Enterprise. Using patented technology for Conditional Access, Preempt helps Enterprises optimize Identity hygiene and stop attackers and insider threats in real-time before they impact business. Preempt continuously detects and preempts threats based on identity, behavior and risk across all cloud and on-premises authentication & access platforms. This low friction and more prescriptive approach empowers security teams more visibility & control over accounts and privileged access, achieve compliance and auto-resolve incidents. Learn more: www.preempt.com.
- ProofpointBooth: 201
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- Rapid7Booth: 205
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- RSA a Dell Technologies CompanyBooth: 206
RSA Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change.
- SecurityScorecardBooth: 206
SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.
- SentinelOneBooth: 102
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- SRG Advisory Group LLCBooth: 207
SRG Advisory Group LLC was founded to bring an innovative approach to the management and security of your data. We deliver powerful information security insight, project delivery, and leadership to clients in a diverse range of industries. Formed with an international team of security experts and accomplished project leaders, SRG Advisory Group LLC can achieve results for you that provide sustainable security platforms. Most importantly, we ensure that everything offered is within your budgetary requirements.
- TechTargetBooth:
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- The CircuitBooth:
Our goal is to deliver education and informational programs; enable members to connect and foster collaboration between IT solution and service providers, corporate IT departments, the individuals within these organizations and the businesses that support them.
- Trend MicroBooth: 204
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- ZscalerBooth: 306
Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.
- Alex WoodCISO, Uplight; Co-Host, Colorado = Security podcast
Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.
- Steve BrownThe Bald Futurist, Former Chief Evangelist and Futurist, Intel
Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.
Steve is passionate about helping people to imagine and build a better future. Whether talking about the future of work in a post-automation world, doing a deep dive on artificial intelligence, or discussing the future of flying cars, Steve inspires his audiences to think beyond the current status quo and to reimagine their businesses, and their lives, for the better.
Steve speaks and writes in plain language on how continued advances in computing will intersect business, cultural and human trends to create both new opportunities and new challenges. His new book, Hacking Reality, will be published later this year. Steve has been featured on BBC, CNN, Bloomberg TV, ABC News, Wired, WSJ:Digits, CBS, and many other media outlets.
- David HowardSecurity Administrator, 19-facility Healthcare System
David Howard is a CISSP, Certified Ethical Hacker, and holder of many other certifications. He also has 20 years of experience and currently is the senior member of the security staff of a regional hospital system. He is the host of Bring Your Own Security Radio, heard on iHeartRadio's app and many of their AM/FM stations nationwide, and is known as Dave The IT Guy on air.
- Micah BrownVice President, Greater Cincinnati ISSA
Micah K. Brown is a member of the IT Security Engineering team at American Modern Insurance, part of the Munich RE Group. Over the past two years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations located in North and South America. In this role Micah has learned the many intricacies of what works in a successful DLP project. In his free time, Micah serves on the Greater Cincinnati ISSA Chapter as Vice President. Micah graduated from the University of Cincinnati and holds an active CISSP.
- Matt ScheurerChair, CiNPA Security SIG, Financial Services industry
Matt Scheurer is a Systems Security Engineer working in the Financial Services industry and serves as Chair of the Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG). He holds a CompTIA Security+ Certification and possesses multiple Microsoft Certifications including MCP, MCPS, MCTS, MCSA, and MCITP. He has presented on numerous Information Security topics as a featured speaker at local area technology groups and many large Information Security conferences all across the Ohio, Indiana, and Kentucky Tri-State. Matt maintains active memberships in a number of Information Technology and InfoSec focused organizations.
- Barry KimballSystems Administrator, VFIS of Ohio
Barry is a Material Science Engineer turned IT System Admin Contractor. He runs the Cincinnati chapter of SMBA (Security Master Beer Appreciation) and is a member of ISSA. He enjoys tinkering with materials that make computers work—through logic electric circuits to board OS's and coding—covering a wide range of the field of IT. His favorite tool for making things work together: 5-pound armorsmithing sledge.
- JD MiltonSr. Information Security Analyst, Greater Cincinnati Hospital System
- Zachary BriggsCorporate Compliance Counsel, Paycor
Zach Briggs is Corporate Compliance Counsel at Paycor, a human capital management SaaS company based in Cincinnati. He has a management degree from Purdue University and his Juris Doctor from Northern Kentucky University. Zach enjoys seeing how things work and making them work better. He is responsible for driving compliance initiatives across Paycor’s entire organization, but has a special place in his heart for his friends in InfoSec. https://www.linkedin.com/in/zacharybriggs/
- Thaddeus HoffmeisterLaw Professor, University of Dayton
Law professor who is writing a book on IoT and the law.
- Steve BrownThe Bald Futurist, Former Chief Evangelist and Futurist, Intel
Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.
Steve is passionate about helping people to imagine and build a better future. Whether talking about the future of work in a post-automation world, doing a deep dive on artificial intelligence, or discussing the future of flying cars, Steve inspires his audiences to think beyond the current status quo and to reimagine their businesses, and their lives, for the better.
Steve speaks and writes in plain language on how continued advances in computing will intersect business, cultural and human trends to create both new opportunities and new challenges. His new book, Hacking Reality, will be published later this year. Steve has been featured on BBC, CNN, Bloomberg TV, ABC News, Wired, WSJ:Digits, CBS, and many other media outlets.
- Victoria ThomasCybersecurity Awareness Program Leader
Victoria L. Thomas is an award-winning senior leader with talent for designing, developing and implementing world-class, global cybersecurity awareness programs. With nearly 10 years experience, she brings a strong creative perspective to the field and provides practical solutions that not only build awareness, but also cultivate advocacy and foster behavioral change. Her unique blend of marketing strategies, corporate communications and change management have led to increased visibility and employee commitment for major companies, including Kimberly-Clark Corporation, General Motors, Ally Financial, and other Fortune companies. She has an undergraduate degree in Communications/Public Relations from University of Michigan, graduate degree from Eastern Michigan University in Integrated Marketing Communications, and is a Prosci® Certified Change Practitioner.
- William J. Malik, CISAVP, Infrastructure Strategies, Trend Micro
William Malik helps clients structure their IT environments to minimize the loss, alternation, or inadvertent exposure of sensitive information. His information technology career spans over four decades. Prior to Trend Micro, he worked at Gartner for twelve years where he led the information security strategies service and the application integration and middleware strategies service. Before Gartner, William was CTO of Waveset, an identity management vendor. He also co-authored the Cobit version 3 standard. In addition, he spent 12 years at IBM, where he worked in MVS development, testing, and business planning. William is a Certified Information Systems Auditor (CISA).
- Emily ShipmanSr. Product Manager, RSA
Emily Shipman is a senior product manager, responsible for RSA Archer’s Integrated Risk Management offerings. Emily previously spent seven years in Archer’s presales consulting group, working with hundreds of GRC customers globally to develop tailored solutions for cutting-edge risk management. As a product manager, she drives Archer’s innovation roadmap to develop a more holistic, data-driven view of risk across all solution areas.
- Philip MarshallSr. Director, Product Marketing, SecurityScorecard
Phil Marshall is a security industry veteran with more than 17 years of experience in both network and data security. At SecurityScorecard, he oversees the company’s go-to-market strategy in partnership with the product management organization. Prior to joining SecurityScorecard, Phil worked at security firms Black Duck, Cryptzone, Rapid7, and RSA. Phil has served as a subject matter expert at industry events, including (ISC)2 and ISACA conferences. He has presented on topics such as network based access control, identity security, application security, and open source governance and management. He began his career in the digital publishing space with publications including Dr. Dobb’s Journal and Byte magazine. Phil earned a BA at Bates College and an MBA, cum laude, at the F.W. Olin Graduate School of Business at Babson College.
- Grant SewellHead of Information Security and Privacy, Safelite Group
Grant Sewell manages the Information Security and Privacy program at Safelite Group, the largest provider of vehicle glass repair, replacement, and calibration services in the United States. He serves on the board of directors for the Retail & Hospitality ISAC, the Central Ohio Chapter of (ISC)², and has held information security leadership roles with several Fortune 500 companies and U.S. Government agencies. Grant has more than a decade of experience in security, holds numerous industry certifications, and is a frequent speaker at regional and national conferences.
- Deneen DeFioreSVP, Global Chief Information & Product Security Officer, GE Aviation
Deneen currently serves as SVP, Chief Information & Product Security Officer, for GE Aviation in Cincinnati, Ohio. And most recently she has taken on an expanded role for GE Aviation as co-leader of Aviation’s Digital League 2.0. She has also served as SVP, Chief Technology Officer, Security & Compliance, for GE Digital.
She is responsible for leading GE’s overall approach to implementing secure & compliant technology platform solutions and services enabling the digital industrial. She also has responsibility for securing GE Aviation's information and assets, and ensuring ongoing compliance to global regulatory and contractual requirements. She has developed advanced capabilities in Cyber Security Operations, Cyber Intelligence, Threat Management, IP Protection, Data Loss Prevention & Regulatory Risk Management.
Deneen brings more than 15 years of experience in the digital technology and project management space. In 2015, Deneen was named GM, Global Chief Technology and Risk for GE Aviation and, in 2017, she was promoted to GM, Global Chief Information and Product Security for GE Aviation and GE Digital. In this role, Deneen served as a technical expert and advisor to GE’s most senior leaders on cyber risk related to products, services and ongoing operations.
She began her career with GE Aviation in 2001 as a senior technology manager. In her time with GE, Deneen has held roles of increasing responsibility across multiple GE businesses, including Aviation, Corporate, and Power. Deneen earned her bachelor’s degree from Kent State University. She is passionate about diversity in the tech industry and promoting STEM education.
- Alexandra PanaretosAmericas Lead for Human Cyber Risk and Education, EY
With a background in broadcasting and operational security, Alex specializes in secure communications and education, awareness program development, the psychology of social engineering, human-based risk mitigation, and behavior analytics. She has over 12 years of experience developing and implementing security awareness, communication, and education strategies in Fortune 50/100 companies and other global enterprises. Alex is OPSEC Manager II Certified by the U.S. Army and the Joint Information Operations Warfare Center (JIOWC). She volunteers with local law enforcement agencies educating parents, community groups, and youth organizations on information security and social media safety in her free time.
- Micah BrownVice President, Greater Cincinnati ISSA
Micah K. Brown is a member of the IT Security Engineering team at American Modern Insurance, part of the Munich RE Group. Over the past two years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations located in North and South America. In this role Micah has learned the many intricacies of what works in a successful DLP project. In his free time, Micah serves on the Greater Cincinnati ISSA Chapter as Vice President. Micah graduated from the University of Cincinnati and holds an active CISSP.
- Kurt JohnsonSecurity Engineer, Check Point Software Technologies
Check Point Security Engineer, three years;
Pro Serve/Consultant, four years;
Sr. Engineer in Financial Services, six years;
Firewall Monkey, two years
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes