googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, September 27, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Advisory Council Kickoff Breakfast - Best Practices Mega Trends Arena - VIP / Invite Only
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    Location / Room: Spring Glade
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Shady Grove
    8:00 am
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Windhaven
    8:30 am
    Advancing Your Career in a Dynamic Security Environment
    • session level icon
    speaker photo
    Senior Client Partner, Korn Ferry
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Sunny Slope
    8:30 am
    Privacy & Security Issues in Cloud Contracts
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Managing Partner, Scott & Scott, LLP
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Northbrook I
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: The Cost and Consequences of the Insider Threat: What the Latest Ponemon Institute Research Reveals
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable - Attracting & Retaining Talent, Selling Security Needs to Upper Management - VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Spring Glade
    11:15 am
    Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief Security Officer, Southern Methodist University
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Northbrook I
    11:15 am
    Cybersecurity Legal Issues Business Leaders & IT Should Know
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Northbrook II
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Systems Engineer, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Fairview
    11:15 am
    Trend Micro: Ransomware Jiu Jitsu: Attribution of Ransomware Actors for Fun and Intelligence
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Sunnyslope
    12:00 pm
    Advisory Council Roundtable - Cyberthreats, Data Analytics and Staying Current with Future Trends - VIP / Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Spring Glade
    12:15 pm
    LUNCH KEYNOTE: Radware The Current Economics of Cyber Attacks
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Locking Down the Endpoints
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Windhaven
    1:15 pm
    Panel: The Current Threat Landscape
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    2:15 pm
    Conference Dessert & Coffee Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    Keynote: Forsythe - Why Modern Approaches To Protecting Data Are Mission Critical
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director - Security Solutions, Forsythe Technology
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater
    3:00 pm
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: Shady Grove
    3:00 pm
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: Windhaven
    3:45 pm
    SecureWorld Casino After-Party
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:45 pm - 6:00 pm
    Location / Room: SecureWorld Exhibit Floor
  • Wednesday, September 28, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Shady Grove
    8:00 am
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Windhaven
    8:30 am
    Business Email Compromise – FBI Current Threat Briefing
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Special Agent, Federal Bureau of Investigation
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Keynote Theater
    8:30 am
    Cyber Risk Valuation: Show Me The Money!
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    VP, Information Security & CISO, Texas Mutual Insurance Company
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Fairview
    8:30 am
    Forsythe: Anatomy of a Breach: Why Encryption is Your Last Line of Defense
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director - Security Solutions, Forsythe Technology
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Sunnyslope
    8:30 am
    You Have Implemented Information Security Controls; Now What?
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Sr. Information Systems Auditor, Parkland Health & Hospital System
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Northbrook I
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    9:30 am
    OPENING KEYNOTE: Cyber Intelligence Exchange: It’s Difficult, Possible, and Absolutely Necessary
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CEO & Co-Founder, TruSTAR Technology
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable - Risk Based Approach to Information Security - VIP / Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Spring Glade
    11:15 am
    Analyzing Digital Evidence
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Computer Scientist, Northcentral University
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Northbrook II
    11:15 am
    OpenDNS, Part of Cisco: How to Block Threats Before, During & After an Attack
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    OpenDNS/Cisco
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Fairview
    11:15 am
    Understanding the Healthcare Sector Cybersecurity Framework Implementation Guide
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    VP Standards & Analytics, HITRUST
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Northbrook I
    12:00 pm
    Advisory Council Roundtable - Using Frameworks Effectively - VIP / Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Spring Glade
    12:15 pm
    LUNCH KEYNOTE: Trend Micro - The State of SCADA on the Internet
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: After the Hack
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 am
    Location / Room: Windhaven
    1:15 pm
    Panel: Emerging Threats
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    Data Breach Digest - Scenarios from the Field
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Digital Forensics Investigator , Verizon RISK Team
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: Sunnyslope
    3:00 pm
    Improving Security Processes Through Lean Thinking
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Security Management, Financial Investment Management Company
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: Northbrook I
    3:00 pm
    Security Awareness 2.0 (The Human Element)
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Sr. Security Architect, CDW
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
Exhibitors
  • Alert Logic
    Booth: 120

    Whether your company is transitioning infrastructure to the cloud, taking advantage of managed hosting services, or continuing to rely on owned data centers, Alert Logic offers intrusion detection, vulnerability assessment and log management solutions that are coupled with 24/7 monitoring and expert guidance services from our security operations center. More than 1,500 enterprise customers trust Alert Logic to secure and protect their digital information, and rely on us for keeping in step with increasingly complex regulatory issues. In addition to our team of GIAC analysts dedicated to careful observation and assessment of threats to your data, our research team stays on top of emerging developments so we can stop potential security breaches before they strike. We also have a dedicated support team ready to answer any questions you have about our products and services.

  • NETSCOUT Arbor
    Booth: 550

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • Blue Coat
    Booth: 640

    Blue Coat is a leader in advanced enterprise security, protecting 15,000 organizations every day. Through the Blue Coat Security Platform, Blue Coat unites network, security and cloud, providing customers with maximum protection against advanced threats, while minimizing impact on network performance and enabling cloud applications and services.

  • BMC
    Booth: 410

    BMC provides leading solutions for vulnerability and compliance remediation, infrastructure automation and public, private and hybrid cloud management solutions. BMC BladeLogic Threat Director prioritizes risks and reduces your overall attack surface by providing Operations teams with prescriptive and actionable data to address vulnerabilities based on perceived impact and policy. It also offers security teams a transparent view into operational plans by providing visibility into planned actions, predictive SLAs, and burndown views. As a result, both teams can actively assess and control the security levels within their organizations. Save time and respond to known threats quicker by auto-importing scan exports from Qualys, Nessus and Rapid7.

    BMC BladeLogic Server Automation is the industry-leading solution for automated management, control, and enforcement of server configuration changes in the data center and in the cloud. BMC BladeLogic Server Automation provides a policy-based approach for IT administrators to manage their data centers with greater speed, quality, and consistency. Broad support for all major operating systems on physical servers and leading virtualization and cloud platforms lets IT install and configure server changes with ease. Rich out-of-the-box content helps IT automate continuous compliance checks and remediation for regulatory requirements (Pre-configured policies for CIS, DISA, HIPAA, PCI, SOX, NIST, and SCAP, integrated documentation, and remediation through repair, rollback, or configuration updates). Out of the Box Support for Operating systems such as Windows®, Linux®, UNIX® and virtualization such as VMware®, Microsoft® Windows®, Linux®, UNIX® and virtualization such as VMware®, Microsoft®, Red Hat®, Citrix®, IBM®, and Oracle®. Leverage content from open source vendors like Chef® as well as deploy and scan Docker containers.

    Please stop by to learn how BMC Software can help your organization support digital transformation and do more with less while increasing security and compliance of your datacenters.

  • Carbon Black
    Booth: 150

    Carbon Black is Transforming Security Through Big Data and Analytics in the Cloud Growing trends in mobility and cloud have made the endpoint the new perimeter. New and emerging attacks are beating traditional defenses, and security teams are too reactive and held back by their technologies. Carbon Black is leveraging the power of big data and analytics to solve the challenges surrounding endpoint security. With the Cb Predictive Security Cloud platform, we are transforming cybersecurity to deliver a new generation of cloud-delivered security solutions designed to protect against the most advanced threats.

     

  • Carousel Industries
    Booth: 100

    Carousel Industries is a recognized leader in helping organizations evolve the way they communicate and orchestrate the flow of information throughout their networks. Carousel enables clients to connect and collaborate the way modern IT users demand and advance from their current network infrastructure to meet tomorrow’s standards. With deep expertise across a vast portfolio of communication, network, and security technologies, Carousel is able to design, implement, and support solutions tailored to meet the unique needs of each customer. By offering professional and managed services with flexible deployments in the cloud, Carousel ensures clients achieve agility and utilize technologies in the way most effective for their business.

  • Cloud Security Alliance (CSA)
    Booth: 402

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Critical Start
    Booth: 440

    Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.

  • Crowe Horwath LLP
    Booth: 450

    Crowe Horwath LLP is one of the largest public accounting and consulting firms in the United States. Our experienced professionals have deep subject-matter expertise in security and privacy, risk management, internal audit, fraud and ethics, and regulatory compliance to keep you advised of emerging trends, industry benchmarks, and best practices.

  • Secureworks
    Booth: 210

    Dell Secureworks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Dell SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.

  • F5
    Booth: 200

    F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

  • Fidelis Cybersecurity
    Booth: 130

    Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy.

    By integrating bi-directional network traffic analysis across your cloud and internal networks with email, web, endpoint detection and response, and automated deception technology, the Fidelis Elevate platform captures rich metadata and content that enables real-time and retrospective analysis, giving security teams the platform to effectively hunt for threats in their environment. Fidelis solutions are delivered as standalone products, an integrated platform, or as a 24×7 Managed Detection and Response service that augments existing security operations and incident response capabilities. Fidelis is trusted by Global 1000s and Governments as their last line of defense. Get in the hunt. For more information go to www.fidelissecurity.com.

  • Forsythe
    Booth: 420

    Forsythe is a leading enterprise IT company, providing advisory services, security, hosting and technology solutions for Fortune 1000 organizations. Forsythe helps clients become more agile, secure, digital businesses as they optimize, modernize and innovate their enterprise IT. We do this by using both new and traditional IT effectively to meet their business needs. Founded in 1971, Forsythe is privately held and 100-percent employee-owned, with nearly 1,000 employees in 40 locations, and more than $1 billion in annual revenues. Whether we are helping a company secure its data or envision a large data center transformation, we will do whatever it takes to help make it happen.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • Intel Security
    Booth: 420

    With its Security Connected strategy, innovative approach to hardware-enhanced security, and unique Global Threat Intelligence, Intel Security is intensely focused on developing proactive, proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world. Intel Security combines the experience and expertise of McAfee with the innovation and proven performance of Intel to make security an essential ingredient in every architecture and on every computing platform. Intel Security’s mission is to give everyone the confidence to live and work safely and securely in the digital world.

  • ISACA
    Booth: TBD

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • International Information Systems Security Certification Consortium, Inc., (ISC)²®
    Booth: TBD

    Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

  • North Texas ISSA
    Booth: TBD

    The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.

  • Kaspersky
    Booth: 240

    We’re an independent global cybersecurity company that empowers people to make the most of technology and the endless opportunities it brings. Backed by our deep threat intelligence, security and training expertise, we give businesses the power to stay safe—and the confidence to accelerate their own success. With insights gained from our unique international reach, we secure consumers, governments and more than 270,000 organizations. We’re proud to be the world’s most tested and awarded cybersecurity, and we look forward to keeping your business safe. Bring on the future.

  • Lastline
    Booth: 660

    Lastline delivers innovative AI-powered network security that detects and defeats advanced threats entering or operating within a network. We protect network, email, cloud, and web infrastructures, minimizing the risk of damaging and costly data breaches with fewer resources and at lower cost.

  • Lookout
    Booth: 100

    Lookout is a cybersecurity company that makes it possible for individuals and enterprises to be both mobile and secure. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseen—predicting and stopping mobile attacks before they do harm.

  • NETSCOUT
    Booth: 230

    NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.

  • Nuix
    Booth: 540

    Nuix protects, informs, and empowers society in the knowledge age. Leading organizations around the world turn to Nuix when they need fast, accurate answers for investigation, cybersecurity incident response, insider threats, litigation, regulation, privacy, risk management, and other essential challenges.

  • OpenDNS
    Booth: 320

    OpenDNS is the world’s largest Internet-wide security network, protecting two percent of the Internet’s active users every day. The cloud-based OpenDNS service delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. OpenDNS is easy to deploy and manage, with no hardware or software to install, no need to reconfigure networks and no new latency.

  • PivotPoint Risk Analytics
    Booth: 410

    PivotPoint Risk Analytics, the leading provider of cyber risk analytics software, enables organizations to understand their financial exposure from cyber-attacks. By equipping Information Security professionals to present cyber risk in established financial terms, their organizations can make cyber related investment decisions based on ROI, and purchase appropriate cyber insurance coverage.

  • Proofpoint
    Booth: 440

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Radware
    Booth: 460

    Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.

  • SAINT Corporation
    Booth: 310

    SAINT Corporation offers integrated vulnerability assessment, penetration testing, and security checklist compliance. Examine your network with the SAINT® vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with the SAINTexploit® penetration testing tool and exploit the vulnerability to prove its existence.

  • Set Solutions, Inc.
    Booth: 150

    For over 20 years, Set Solutions, Inc.—a full service provider of network security, secure remote access and bandwidth management solutions—has been in the business of increasing business profitability and growth. If you have network security challenges or just want to improve the health of your network, we can help.

  • Sirius
    Booth: 400

    Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.

  • Tavve’s ZoneRanger
    Booth: 340

    Tavve’s ZoneRanger is an application-layer proxy firewall for management protocols. This edge solution eliminates the need for open firewall ports and their corresponding firewall rules. The ZoneRanger is vendor independent supporting SNMP, ICMP, Syslog, Netflow, TACACS+, and numerous other management protocols. Current ZoneRanger environments support an extensive list of management applications, including Splunk, ArcSight, Solarwinds, HPNA, CA Unicenter. The ZoneRanger is installed at two of the top 10 banks in the US, as well as numerous financial institutions and credit card companies around the world

  • Tech Titans
    Booth: 170

    Tech Titans includes a diverse group of technology leaders from start-ups to fortune 500 companies from North Texas who collaborate, share and inspire creative thinking that fuels tomorrow’s innovations. As part of its goals, Tech Titans is active in:

    • Cultivating a technology community of companies, entrepreneurs, investors and students
    • Growing future tech leaders with its talent and workforce development initiative
    • Advocating technology’s advancement in governmental arenas
    • Connecting people and inspiring innovative ideas through its special interest forums and annual Awards Gala

    Tech Titans is the largest technology trade association in Texas, representing individuals and more than a quarter million employees through 300 member companies.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales
    Booth: 530

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • Trend Micro
    Booth: 650

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • Venafi
    Booth: 620

    Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

    With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms;  four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.

    For more information, visit: www.venafi.com.

  • Zscaler
    Booth: 300

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Jamey Cummings
    Senior Client Partner, Korn Ferry

    Jamey Cummings co-leads Korn Ferry’s Global Cybersecurity Practice, where he advises organizations on the recruitment, assessment, development, and retention of security & risk management leaders. Prior to his career in executive search, he was a consultant with The Boston Consulting Group and served as a US Navy SEAL officer.

  • speaker photo
    Robert Scott
    Managing Partner, Scott & Scott, LLP

    Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s largest corporations, such as Schlumberger, PepsiCo, Iron Mountain and American Express, on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing.

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    George Finney
    Chief Security Officer, Southern Methodist University

    George Finney is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges. He is the CEO and founder of Well Aware Security and the CSO for Southern Methodist University In Dallas, Texas. George has worked in Cybersecurity for nearly 20 years and has helped startups, global telecommunications firms, and nonprofits improve their security posture. As a part of his passion for education, George has taught cybersecurity at SMU and is the author of several cybersecurity books, including "Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future" and "No More Magic Wands: Transformative Cybersecurity Change for Everyone." George has been recognized by Security Magazine as one of their top cybersecurity leaders in 2018 and is a part of the Texas CISO Council, is a member of the Board of Directors for the Palo Alto Networks FUEL User Group, and is an Advisory Board member for SecureWorld. George holds a Juris Doctorate from SMU and a Bachelor of Arts from St. John's College, as well as multiple cybersecurity certifications including the CISSP, CISM, and CIPP.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Jing Nghik
    Systems Engineer, Radware

    Jing is a systems engineer at Radware, a leader in application delivery and security solutions that assures the availability, performance, and resilience of business-critical applications for over 10,000 enterprises and carriers worldwide. Jing is a seasoned security professional with over a decade of networking/security experience covering a wide array of related technologies including DDoS, WAF, DLP, IDS/IPS, cyber warfare, compliance, managed services, disaster recovery, and high availability.

  • speaker photo
    Kyle Wilhoit
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks

    Kyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of world-renowned threat researchers that identify, track and unearth technical intelligence related to actor groups present in hack tools, attack frameworks, targeted attack campaigns, and malware families.

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    John Pirc
    Director - Security Solutions, Forsythe Technology

    John’s current role is that of Director- Security Solutions for the West area at Forsythe Technology. John brings over 19 years outstanding security industry accomplishments and credibility. John was most recently the Co-Founder and CSO of Bricata, LLC and prior to that was the CTO at NSS Labs. Previously, John had responsibility for all Security products at Hewlett Packard/TippingPoint/HP Security Research as well as Director of product management with both IBM Security and Cisco running billion-dollar product portfolios. John is a published author and frequently takes the stage to speak at Security industry functions. John’s greatest professional achievements include working for the Central Intelligence Agency, authoring three books, being published in Time Magazine, speaking at RSA SF & Asia and being featured on live TV with CNBC, giving his expert opinion on Syria’s cyber capabilities.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kathryn Sherman
    Special Agent, Federal Bureau of Investigation
  • speaker photo
    John B. Sapp Jr.
    VP, Information Security & CISO, Texas Mutual Insurance Company

    John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations He is a frequent speaker at some of the largest technology and healthcare industry events.

  • speaker photo
    John Pirc
    Director - Security Solutions, Forsythe Technology

    John’s current role is that of Director- Security Solutions for the West area at Forsythe Technology. John brings over 19 years outstanding security industry accomplishments and credibility. John was most recently the Co-Founder and CSO of Bricata, LLC and prior to that was the CTO at NSS Labs. Previously, John had responsibility for all Security products at Hewlett Packard/TippingPoint/HP Security Research as well as Director of product management with both IBM Security and Cisco running billion-dollar product portfolios. John is a published author and frequently takes the stage to speak at Security industry functions. John’s greatest professional achievements include working for the Central Intelligence Agency, authoring three books, being published in Time Magazine, speaking at RSA SF & Asia and being featured on live TV with CNBC, giving his expert opinion on Syria’s cyber capabilities.

  • speaker photo
    Michael R. Smith
    Sr. Information Systems Auditor, Parkland Health & Hospital System

    Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.

    Industry Certifications, Licensure, & Training
    Certified Information Security Specialist (CISSP)
    Certified Internal Auditor (CIA)
    Project Management Professional (PMP)
    Certified Fraud Examiner (CFE)
    Certified Information Systems Auditor (CISA)
    Information Library Information Technology (ITIL)

  • speaker photo
    Paul Kurtz
    CEO & Co-Founder, TruSTAR Technology

    Paul Kurtz is an internationally recognized expert on cybersecurity and the current CEO of TruSTAR Technology. Paul began working cyber security issues on the National Security Council at the White House in the late 1990s. He served in senior positions on the White House's National Security and Homeland Security Councils under Presidents Clinton and Bush and advised President Obama on cybersecurity during his transition into office. During his service, Paul was Special Assistant to the President and Senior Director for Critical Infrastructure Protection on the White House’s Homeland Security Council (HSC). He joined the HSC from the National Security Council (NSC) where he was both Senior Director for National Security in the Office of Cyberspace Security and a member of the President’s Critical Infrastructure Protection Board. He served on the NSC as a Director of Counterterrorism from 1999-2001, and helped manage the response to the September 11 terrorist attacks.

    Since leaving government, Paul has held numerous private sector cybersecurity positions and is currently the Co-founder and CEO for TruSTAR Technology. Paul is a regularly sought-after speaker and expert for the media, and served as an on-air consultant for CBS News.

    Paul’s work in counterterrorism has long-influenced his approach to cybersecurity. Specifically, it highlighted the need to improve information sharing and collaboration among those involved in detecting and responding to cyber threats. His remarks will be grounded in the past year’s most critical challenges and what we learned from our response to them, including the cyber attacks on the Ukraine power grid and the onslaught of cyber attacks targeting critical health care facilities.

  • speaker photo
    Chuck Easttom
    Computer Scientist, Northcentral University

    Dr. Easttom is the author of 26 computer science books and over 40 research papers, as well as an inventor with 14 patents. He is a frequent speaker at computer science and security conferences, and is a Distinguished Speaker of the ACM (Association of Computing Machinery). He holds a Doctor of Science in cyber security and three masters degrees.

  • speaker photo
    Atheana Fulgencio
    OpenDNS/Cisco
  • speaker photo
    Dr. Bryan S. Cline
    VP Standards & Analytics, HITRUST

    As the VP of Standards and Analytics at HITRUST, Dr. Bryan S. Cline provides thought leadership for the continuing development of the HITRUST CSF and related methodologies—healthcare’s de facto information protection standard and basis for NIST Cybersecurity Framework implementation in the industry—and the ‘Father’ of (ISC)2’s HCISPP credential.

  • speaker photo
    Kyle Wilhoit
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks

    Kyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of world-renowned threat researchers that identify, track and unearth technical intelligence related to actor groups present in hack tools, attack frameworks, targeted attack campaigns, and malware families.

  • speaker photo
    Darren Windham
    Digital Forensics Investigator , Verizon RISK Team

    Darren is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Darren responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures.

  • speaker photo
    Amna Siddiqui
    Director, Security Management, Financial Investment Management Company

    Amna Siddiqui is Director, Security Management, with a broad-based technology background and current experience in Cybersecurity and Technology Risk Management in the financial sector. She is knowledgeable in industry and regulatory frameworks and holds multiple certifications with most recent related to AWS.

  • speaker photo
    Pedro Serrano, Moderator
    Sr. Security Architect, CDW

    Pedro Serrano has over 35 years of experience managing and installing technical controls in networks around the world, 20 of those in military systems. Previously Pedro was a former CISO, Network Security for an integrated healthcare system as well as Security Architect for major Oil and Gas Exploration company, today he is CDW’s Senior Security Architect. He holds two postgraduates’ degrees one in Telecommunications Management and Computer Science and serves in the Board of Directors of The Information System Security Association (ISSA) chapter in Tulsa, and BSides Oklahoma. He also serves as an advisor to the Latino Leadership Institute and is a graduate from the Leadership Oklahoma program. Pedro holds the CISSP certification from ISC2.

secure world app
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes