Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 21, 2020
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:30 am
    Building a Security Education & Awareness Function
    • session level icon
    speaker photo
    Leader, RISC Education & Awareness, FIS
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Learn how to design, implement, and gain stakeholder support for your Security Education & Awareness function and continue this momentum through an acquisition. From basics like internal phishing campaigns and annual training to more exciting topics such as awareness videos, expos, development of a champion network and more this session will walk through how we implemented the different pillars of our program and how we expanded upon them during a recent acquisition in which the security education and awareness program was not as robust.

    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)

    8:30 am
    Integrated Intelligence: Ideas on Proactive Threat Intelligence
    • session level icon
    speaker photo
    Threat Intel Engineer, Cardinal Health
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Integrated threat intelligence can empower your organization and help your team be more proactive in its defense measures. This presentation will offer attendees an opportunity to think about threat intelligence in a unique way and identify a customized approach that is tailored to their company’s industry and overall structure. In addition, we will explore how integrated threat intelligence can influence discussions and decision-making within other teams in the organization.
    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)

     

    8:30 am
    Beyond the Security Awareness Check Box
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    It’s time to move beyond the “Awareness” messaging campaigns and the annual compliance training check box. Employees need to take the next step and act on the knowledge that is constantly pushed out to them. A solid Security Awareness program needs to include opportunities for learners to build their skills as well as practice those skills in realistic scenarios. This session will provide an overview of ways to think beyond doing an annual compliance eLearning and focus on providing on-going learning opportunities that are timely and relevant.
    9:30 am
    OPENING KEYNOTE:
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:30 am
    10:30 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable - (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm

    This session is for Advisory Council members only.

    11:15 am
    Another Brick in the Wall
    • session level icon
    speaker photo
    Americas Lead for Secure Culture Activation , Ernst & Young LLP
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Security awareness and training. The Human Element. Change Management. All of these have resulted in extraneous mandatory learning for employees, often without regard to a role- or risk-based education profile. Employees are experiencing learning fatigue at a rapid pace, without significant results on an organization’s overall risk profile. It’s time to stop educating and start engaging, for significant, measurable information security behavior change in your organization. This session will cover learning trends, opportunities for engagement, and examples you can implement immediately.
    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)
    11:15 am
    Digital Analytics and Privacy: Recent Events and Trends
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm

    Innovation in data analytics technologies continues at an extraordinary pace. Privacy professionals must both apply existing legal concepts and track new regulations in analyzing these emerging technologies. This session will discuss the privacy regulatory environment for data analytics and will focus on recent developments and trends.

    11:15 am
    7 Ways to Boost InfoSec’s Influence (and Yours) by Communicating Differently
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    Grow your personal influence, your leadership possibilities and move your InfoSec objectives forward (faster) by thinking differently about how you communicate. Whether your audience is the board, your team, or any part of the business, this session will help you and your communication stand out. Lead by a long-time TV reporter turned cybersecurity journalist who shares a framework for powerful communication you can implement immediately.

    11:15 am
    Third-Party Risk: Creating and Managing a Program that Works!
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm

    Every organization is concerned with third-party risk. No one wants to be the next Target breach. This session will examine the components of third-party risk management and give you some leading practices on how to develop a workable and sustainable process.

     

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm

    This session is for Advisory Council members only.

    12:15 pm
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    [Panel] Identity and Access Management – Zero Trust for the Win?
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Authentication used to be a discreet decision with the purpose of securing a single access point. Today, the ability to utilize many different types of authentication—from passwordless authentication, to certificate-based authentication, to adaptive and multi-factor authentication—is the foundation of a robust access management framework. With all the terms flying around out there: MFA, 2FA, Zero Trust, IAM, etc. its hard to keep track of what is supposed to be working. Our experts will help demystify the jargon, provide best practices, and steer you away from common missteps.

    1:15 pm
    [Panel] Hackers and Exploits and Phishing Attacks! Oh My! (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    We all have heard email is the #1 attack vector. Based on the numbers we are seeing; it is pretty indisputable. But what about the other stuff? Zero Day exploits still make headlines. New ransomware attacks every week. IoT devices are easily hacked. BEC/CEO fraud attacks are at an all time high. Will AI be a tool for the hackers? Join our panelists as they share knowledge on the current threatscape and make some predictions on what is coming soon to a network near you.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    5G: The Hype, the Reality, and Its Impact on Security
    • session level icon
    speaker photo
    VP, Product & Industrial Security, GE
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    There is a lot of hype around 5G. Wireless companies are advertising 5G networks as revolutionary, trade magazines promising 5G enables an IoT explosion, and enterprises and consumers alike are scrambling to gather information to make good decisions. In this talk, we’ll discuss the technology which enables 5G and how those technologies affect security for enterprises and end users.

    3:00 pm
    Role of Information Risk and Compliance in Digital Healthcare
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Information technology is becoming a core part of healthcare with the new technology innovation. The risk and compliance strategy and guidance is challenging.
    This presentation focuses on some of the key attributes to take into consideration for creating an IT GRC model to ensure the safety, privacy, and security of the patients.Some of the attributes include:
    – Data as the centerpoint/ focus point of building the GRC model
    – Data classification based on its risk and impact
    – Thinking through Data Lifecycle Approach to attain a detailed      understanding of data and its impact
    3:00 pm
    The CISO Stop List
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    Each year security teams are faced with new threats, new compliance requirements, new technologies, new environments, and new marching orders from management. Most respond by adding new processes, people, and tools to satisfy the emerging needs, but how often do we look at what we’re already doing and say “That is wrong. That is extraneous. That is of low value”? Or even, “That is hurting the security program. That is hurting my career”? This session will cast a baleful eye on some of the habits security professionals have developed and failed to shed as the landscape evolves.

  • Wednesday, April 22, 2020
    9:00 am
    [SecureWorld PLUS] Building an Incident Response Plan from Scratch: If It's Not Written Down, You Don't Have a Plan!
    • session level icon
    9 a.m. - 3 p.m. • Earn 12 CPEs!
    speaker photo
    Attorney, The Cyber Security Law Firm of Texas
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    In today’s world not knowing how your company will respond when it has a breach is negligent. The last thing you want to do is be caught unprepared when the highly likely, but always untimely, event occurs. Businesses of all sizes need to have an incident response plan! Do you? Do you know where to start? If not, this session is for you. In Part 1 of our session will focus on building basic prevention and monitoring capabilities in order to detect incidents. In Part 2 we will focus on building the appropriate incident response plan for your company. Part 3 we will focus on putting the plan in action and building resiliency.
    9:00 am
    [SecureWorld PLUS] Understanding and Using the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework
    • session level icon
    9 a.m. - 3 p.m. • Earn 12 CPEs!
    speaker photo
    Professor & Sr. Research Scientist, University of Detroit Mercy
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    This course provides in depth awareness of the knowledge, skill, ability (KSA), and competency requirements, of the NIST NICE Cybersecurity Workforce Framework. The student will be given a broad, understanding of the architecture and intent of the NICE model, as well as the purpose and intent of each of the component knowledge, and specialty areas. Students will learn how to design and implement a practical cybersecurity infrastructure solution, that directly applies the job role recommendations, which are specified in the NICE Workforce Model, to the real-world cybersecurity policy guidance requirements of the NIST Cybersecurity Framework.

    Who should attend:
    Any type of C-Level (including CFO and COO)
    Strategic Planners
    Cybersecurity Architects
    Cybersecurity Analysts
    Human Resources Planners

    What will be the audience “take-away”?:
    The student will be able to produce a cybersecurity solution that is tailored to their specific organizational application, which is based on the two most commonly accepted models for cybersecurity best practice.

Exhibitors
  • Armis, Inc
    Booth:

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • BitSight
    Booth:

    BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. For more information, please visit www.bitsight.com, read our blog or follow @BitSight on Twitter

  • Checkmarx
    Booth:

    Checkmarx is the global leader in software security solutions for modern enterprise software development. Checkmarx delivers the industry’s most comprehensive software security platform that unifies with DevOps and provides static and interactive application security testing, SCA and developer AppSec training to reduce and remediate risk from software vulnerabilities. www.checkmarx.com

  • Cincinnati Tri-State ASIS
    Booth:

    The Cincinnati Tri-State Chapter and its members are committed to not only their own professional careers, but the security industry as a whole. The chapter promotes networking, education, and friendship with those in the fields of security and law enforcement. Our membership is comprised of professionals that work in different aspects of security and law enforcement.

    If you are interested in joining ASIS, the Cincinnati Chapter, or attending a meeting to see what we are all about please contact us to find out more information. We look forward to hearing from you and growing with you professionally!

  • Cincinnati Networking Professionals Association
    Booth:

    Established in 1991, the non-profit Network Professional Association (NPA) is a professional association for computer network professionals. Members adhere to a code-of ethics, demonstrate continual professional development and knowledge, adhere to the latest best practice standards, and strive for continual growth. International awards for professionalism honor individuals for outstanding achievements and meeting the values of professionalism.

    The NPA offers a Certified Network Professional CNP credential and provides advocacy for workers in the field. Members receive a certificate of membership, quarterly journal publications, chapters and programs, and opportunities to volunteer and publish.

  • Corelight
    Booth:

    Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com 

  • EC-Council
    Booth:

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • ECTF
    Booth:

    As a result of the amalgamation of advanced technology and the Internet, both the quantity and sophistication of cybercrimes targeting U.S. financial institutions and critical infrastructure have increased. Today, criminal trends show an increased use of phishing emails, account takeovers, malicious software, hacking attacks and network intrusions resulting in significant data breaches. To protect the nation’s financial infrastructure from cyber and financial criminals, the Secret Service has adopted a multipronged approach.

  • Fortinet
    Booth:

    Fortinet secures the largest enterprise, service provider, and government organizations around the world. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 300,000 customers trust Fortinet to protect their businesses.

  • Gradient Cyber
    Booth:

    We uniquely visualize an organization’s cybersecurity risks, reduce logs and alert noise to actionable insights and establish a cyber health roadmap for immediate value and long term improvements to its security posture.

  • InfraGard Cincinnati
    Booth:

    The mission of the InfraGard Cincinnati Members Alliance is to increase the security of the United States’ national infrastructure through information exchange, education, outreach, and similar efforts. To accomplish our goal, we strive to maintain a close working relationship between federal agencies such as the Federal Bureau of Investigation and the Department of Homeland Security, law enforcement agencies, subject matter experts such as cybersecurity and physical security professionals, industry-specific experts, and numerous other professionals.

  • Insight’s Cloud + Data Center
    Booth:

    Insight’s Cloud + Data Center Transformation is a complete IT services and solution provider that helps organizations transform technology, operations, and service delivery to meet challenges and future-proof the business. As a client-focused integrator, we’re free to recommend the most appropriate solutions — across cloud, IT transformation, next-generation technology, and security.

  • ISACA Cincinnati
    Booth:

    The Greater Cincinnati ISACA® Chapter is a not-for-profit professional association serving the information technology audit, security, and control community. We support the areas of Cincinnati & Dayton, Ohio and Northern Kentucky. The chapter consists of over 450 professionals that represent a cross-section of the public, private, and not-for-profit business sectors at all levels within those industries.

    Purpose: To promote the education of individuals for the improvement and development of their capabilities relating to the auditing of and/or management consulting in the field of Information Technology audit and control.

  • (ISC)2 Cincinnati Tri-State Chapter
    Booth:

    Follow us on Twitter: https://twitter.com/Cinci_Tri_ISC2

  • ISSA Greater Cincinnati Chapter
    Booth:

    The Greater Cincinnati Information Systems Security Association is a non-profit group dedicated to providing educational and networking opportunities to promote the exchange of ideas, knowledge, and member’s growth within the information security profession. The Greater Cincinnati Chapter will host monthly meetings with a variety of security professionals. Please check our events page for further information on upcoming events.

  • Mimecast
    Booth: .

    Mimecast Is Making Email Safer For Business.

    Mimecast’s security, archiving and continuity cloud services protect business email and deliver comprehensive email risk management in one fully-integrated subscription service. Mimecast reduces the risk, complexity and cost traditionally associated with protecting email. You no longer have to manage an array of disjointed point solutions from multiple vendors. And you mitigate single vendor exposure if you have moved your primary email server to the cloud with services like Microsoft Office 365.
    Our best-of-breed services protect the email of over 24,900 customers and millions of users worldwide against targeted attacks, data leaks, malware and spam. We give employees fast and secure access to sensitive business information, and ensure email keeps running in the event of a primary service outage.

  • Okta
    Booth:

    Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

  • OWASP Cincinnati
    Booth:

    OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas.

    The Cincinnati chapter leads are Andy Willingham and Allison Shubert. Chapter meetings are free and open to anyone interested in information security, risk management, data protection and application security.

  • RedSeal
    Booth:

    At RedSeal, our vision is to become the essential analytics and decision-making platform for building digitally resilient organizations people can trust. We do this by becoming the measure by which every organization can quantify its digital resilience. As thought leaders on resilience, we envision every organization starting the security discussion with the question “What’s our Digital Resilience Score?” Founded in 2004, RedSeal is headquartered in Sunnyvale, California.

  • SailPoint
    Booth:

    SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint’s customers are among the world’s largest companies in a wide range of industries.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tenable
    Booth: .

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • The Circuit
    Booth:

    Our goal is to deliver education and informational programs; enable members to connect and foster collaboration between IT solution and service providers, corporate IT departments, the individuals within these organizations and the businesses that support them.

  • ThreatConnect
    Booth:

    Designed by analysts but built for the team, ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. To learn more about our TIP and SOAR solutions, visit www.ThreatConnect.com

  • Women in CyberSecurity (WiCyS)
    Booth:

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Chris Turley
    Leader, RISC Education & Awareness, FIS

    I lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previous to moving into my current role and my certifications are focused in those spaces, including: CISA, CRISC, and Security+, however, I’m happy to be a certified SANS Security Awareness Professional (SSAP) as of this past fall!

  • speaker photo
    Samara Williams
    Threat Intel Engineer, Cardinal Health

    Samara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about mentorship, giving back to the community, and encouraging kids, women and minorities in the technology and cybersecurity fields. Samara is very involved in the Columbus Community as Treasurer of the International Consortium of Minority Cybersecurity Professionals - Columbus Chapter, Treasurer of EmpoWE-R, and Vice President of the Ohio Cyber Women (OCW) organization.

  • speaker photo
    Alexandra Panaretos
    Americas Lead for Secure Culture Activation , Ernst & Young LLP

    Alexandra Panaretos, CSAP is the Americas Cyber Practice Lead for Security Awareness and Training for Ernst & Young LLP. She specializes in information security awareness and education, personal and physical security, and the psychology of social engineering. Alex has experience developing and implementing security awareness and education strategies in government, military family services, and global companies. She is Operations Security Program Manager certified by the Joint Information Operations Warfare Center and the U.S. Army. Her primary focus in awareness program design is the individual, which she showcases in materials that are relevant for multiple generational, cultural, and learning styles in an enterprise.

  • speaker photo
    Nick Ritter
    VP, Product & Industrial Security, GE

    Nick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost 20 years enterprise and industrial security experience.
    Prior to joining GE, Nick spent 2 years at a large financial institution as head of cyber defense and security operations. Immediately prior to that he spent 14 years at a global industrial conglomerate, culminating as one of the 3 global CISOs. There, Nick originated the centralized cyber defense program, built the technical security organization and helped establish the commercial OT security practice.
    While living in Germany, Nick was frequent lecturer at the George C. Marshall European Center for Strategic Studies. There he taught classes on Securing Critical Infrastructure, Cyber Security Policy, and Strategic Cyber Defense. Nick also served as an advisor to NATO in the development of their cyber command training curriculum.
    Nick attended Purdue University and University of Kentucky for undergrad and graduate studies. He resides in Ft. Mitchell, Kentucky, a suburb of Cincinnati, with his wife and two daughters.

  • speaker photo
    Mary Chaney
    Attorney, The Cyber Security Law Firm of Texas

    Mary N. Chaney, Esq., CISSP, has over 20 years of progressive experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law.
    Ms. Chaney spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve her country by becoming a Special Agent for the Federal Bureau of Investigation (FBI) where she investigated cybercrime and served as their Information Systems Security Officer.
    Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. In her corporate career, she has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital.
    Voluntarily, Ms. Chaney is the Chairman and CEO of Minorities in Cybersecurity, Inc. which focuses on leadership and career development for minorities and women. Ms. Chaney also holds advisory board roles for the Cyber Law Consortium, Post University and ChickTECH. In each of her volunteer endeavors Ms. Chaney strives to improve the cyber security and privacy community by ensuring both students and professionals have the resources they need to excel in their careers.
    Academically, Ms. Chaney is an adjunct professor with the University of Cincinnati where she teaches courses to assist with the development of the next generation of cybersecurity professionals.
    Professionally, Ms. Chaney owns her own cyber security law practice, The Law Offices of Mary N. Chaney, P.L.L.C., The Cyber Security Law Firm of Texas, where she specializes in helping, the Board of Directors, CIO, CISO and General Counsel of any company, understand each other and to legally protect the enterprise from cyber security risk.

  • speaker photo
    Daniel Shoemaker
    Professor & Sr. Research Scientist, University of Detroit Mercy

    Dan Shoemaker is Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy. He has written eleven books and hundreds of articles in the field. He has been the Principal Investigator for the National Security Agency Center of Excellence at UDM, as well as the Chair of Workforce Training and Education for the Software Assurance Initiative at the Department of Homeland Security. He was a subject matter expert (SME) for the NIST National Initiative for Cybersecurity Education (NICE) Workforce Framework (NICE v1.0 and v2.0) and also the ACM/IEEE CSEC2017 Standard.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store