googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, October 20, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall (Collinwood 1)

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Discussion Topic: Succession Planning
    speaker photo
    VP & CISO, Neiman Marcus
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: Windhaven

    Shamoun Siddiqui will moderate a roundtable discussion on the topic of succession planning for your team/organization.

    For SecureWorld Advisory Council members only.

    9:00 am
    [Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    speaker photo
    Special Agent in Charge, Dallas Field Office District, United States Secret Service
    speaker photo
    Network Intrusion Forensic Analyst (NIFA), United States Secret Service
    speaker photo
    DevOps Revolutionary - Information Security, State Farm
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall (Collinwood 1)

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] Cyber Risk Governance: The Hype, Hope, and Harsh Reality!
    • session level icon
    speaker photo
    VP, Information Security & CISO, Texas Mutual Insurance Company
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Fairview
    Cyber Risk Governance has been an often talked about concept yet remains one of the most elusive and sought-after outcomes by every C-level executive across every line of business in every industry sector and particularly in the Board room. In this session, we are going to jump into the shoes of the C-level executives and Board members as we describe “what they want” and how we achieve the visual representation of cyber risk in a way that is easily consumable in a language that is universally understood.
    10:15 am
    Supply Chain Attacks Evolve. How Will Your Org Keep Up and Protect Itself?
    • session level icon
    speaker photo
    Director, Sales Engineering, SecureLink
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Sunny Slope

    SolarWinds. Colonial Pipeline. Kaseya. Codecov. Log4j. The one thing they all have in common is the fact that they were victims of high-profile supply chain attacks over the past year. That’s because attacks by third parties—including both contracted vendors and unknown outside attackers—are on the rise across industries. And with the Russia-Ukraine crisis rapidly unfolding, these kinds of attacks, many of which have been led by Russian hackers, take on a whole new meaning.

    If the supply chain attacks of 2021 have taught us anything, it’s that successful data security is not just about who you keep out; it’s about who you let in. For organizations to operate successfully, it’s essential they keep sensitive data secure while also being able to access and share it with key vendors, partners and other strategic third parties. However, third-party access is one of the top attack vectors used in recent breaches, and half of organizations have experienced a data breach caused by a third party.  

    Zero Trust has also become one of the biggest buzzwords in cybersecurity. It encourages the implementation of strong controls, methods, and protocols surrounding access to critical systems and data. Now more than ever, Zero Trust is a security must as remote and distributed workforces rely heavily on remote access methods while facing some of the most sophisticated cyber attacks in history. 

    The effectiveness of hackers using third parties to infiltrate internal networks combined with rising cyber threats from Russia continue to threaten critical infrastructure systems. And the only way to mitigate these threats is by regularly assessing and securing all points of access. In this session, Russell Dowdell, discusses how to identify a third-party threat and why critical access management must be a priority for security departments. He’ll also share practical advice for putting protective procedures in place and what organizations must do now to guard against the next supply chain attack. 

    10:15 am
    Back to Interview Basics, Really?
    • session level icon
    speaker photo
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Northbrook 1

    This session is designed to be a unique hands-on experience, engaging the audience in a dialogue of best and worst ideas, practices, and methods of virtual interviewing. With the use of a simulated virtual interview, the audience (in-person/virtual) will have an opportunity to provide live feedback.

    The (ISC)2 Dallas-Ft. Worth Chapter Executive Board has spoken to countless Job Seekers, Hiring Managers, Executive Recruiters. and Hiring Firms, confirming (despite the newly adopted virtual onboarding process) that interviewees and interviewers are using traditional interview techniques. Living in a time where virtual onboarding is now a “thing,” we must arm our cybersecurity community with tools to apply a hybrid approach when interviewing.

    This session is intended for all who have been challenged with virtual interviewing for security careers. The techniques presented in this session will consist of a hybrid of methodologies compiled from skilled job seekers, hiring managers, career trainers, and executive recruiters.

    11:10 am
    Establishing the Core of an Effective Technology Risk Management Program
    • session level icon
    speaker photo
    Director, Security Development & Engineering, Charles Schwab
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Northbrook 1
    A strong core makes risk management easy. Amna will outline an approach to establishing the core of a Technology Risk Management program to reduce overhead on risk management teams as well as control owners and provide ability to demonstrate real time compliance.
    11:10 am
    [Panel] Cloud: Doing More with Less
    • session level icon
    speaker photo
    Co-Founder & CEO, accSenSe
    speaker photo
    Director, Systems Engineering, Code42
    speaker photo
    Sr. Solutions Architect, Expel
    speaker photo
    Sr. Solutions Engineer, North America, Mimecast
    speaker photo
    Information Security Officer, City of Denton, Texas
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 pm
    Location / Room: Keynote Theater

    The cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.

    11:10 am
    Ransomware: The New Cold War
    • session level icon
    speaker photo
    Cyber Security Specialist, Infoblox
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Sunny Slope

    In this session, you will learn the motivations and drivers behind ransomware attacks and gangs. You will walk through a real-world scenario where we will build a ransomware campaign and explore the economic ins and outs of how the industry works. This exploration will cover all aspects of the economics of the ransomware industry from how to build a campaign, who builds the tools, some understanding of why they do it, and what is fueling the entire industry.

    12:00 pm
    [Lunch Keynote Panel] The CISO Perspective
    • session level icon
    speaker photo
    VP & CISO, National Veterinary Associates
    speaker photo
    CISO, Brink's Inc.
    speaker photo
    SVP & CISO, R1 RCM
    speaker photo
    Board Director, Cyber Bytes Foundation
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Our panel of experienced security executives provide their views on what it takes to be a CISO, what they look for in security team members, and what they love about what they do (and what they hate) in this open exchange. They will answer these questions and more:

    • What are some things that you did in your first 90 days as CISO?
    • What framework did you select to base your program on and why?
    • What are some high-level considerations that you believe influenced your strategy?
    • What compliance challenges do you anticipate in the coming year?
    • What resources do you use to find qualified candidates?
    12:00 pm
    Advisory Council Roundtable Lunch – (VIP / Invite Only)
    • session level icon
    Discussion Topic: Reporting to the Board from an InfoSec POV
    speaker photo
    VP, Information Security & CISO, Texas Mutual Insurance Company
    speaker photo
    Sr. Information Systems Auditor, Parkland Health & Hospital System
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Windhaven

    Roundtable discussion moderated by John Sapp and Michael Smith. For SecureWorld Advisory Council members only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall (Collinwood 1)

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Negotiating Data Processing Terms
    • session level icon
    speaker photo
    Managing Partner, Scott & Scott, LLP
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: Northbrook 1

    Given the explosion of state, federal, and international privacy and security regulations, data processing terms have become a priority for those buying and selling IT services. From ransomware attacks to sophisticated business email compromise (BEC) schemes, more attention is being paid to the agreements that clearly define the services that are included and excluded, make clear that providers are not responsible for failure of third-party solutions, or the criminal acts of third parties, and that include the appropriate data processing agreements to comply with applicable regulatory requirements such as GDPR, CCPA, HIPAA, and GLBA. Scott & Scott, LLP has developed a comprehensive new approach to customer contracting. During this presentation you will learn:

    • How to standardize your data processing obligations into one set of Data Processing Agreements
    • How to handle disputes over which regulations apply and which ones don’t at the time of contracting
    • How to prevent data processing terms negotiations from becoming renegotiations of the master terms and conditions
    • How to properly incorporate your Data Processing Agreement by reference into a sales order or statement of work
    1:15 pm
    [Panel] The Current Threat Landscape
    • session level icon
    speaker photo
    CTO, ForgeRock
    speaker photo
    VP, Forensic Investigations, SecurityMetrics
    speaker photo
    Solutions Engineer, Cybereason
    speaker photo
    DFIR Principal Consultant, Avertium
    speaker photo
    Sr. Sales Engineering Manager, Proofpoint
    speaker photo
    Partner, IT Advisory, Weaver
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?

    It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.

    2:30 pm
    Building the Framework for Zero Trust
    • session level icon
    speaker photo
    DevOps Revolutionary - Information Security, State Farm
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: Northbrook 1
    The core of the next-generation security protection process will be continuous, pervasive monitoring and visibility that is constantly analyzed for indications of compromise. Security Monitoring will encompass as many layers of the IT stack as possible including network activity, endpoints, system interactions, application transactions and user activity. This presentation will provide several security-related scenarios where centralized security data analytics and adaptive security architecture are used to respond in a dynamic way to enable this next generation security protection. The design and benefit of joining the foundational elements of intelligence, context, and correlation with an adaptive architecture will be discussed. Go behind the curtain of “marketecture” to the real and aspirational solutions for the SOC that will likely materialize as vendor products mature over the next few years.
    2:30 pm
    Your Critical Data and Information Are Calling. They Want Your Security Back!
    • session level icon
    speaker photo
    Principal Solutions Architect, Thales
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Sunny Slope

    Securing critical data and information was where this industry started a long time ago but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and exposed critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. Thanks to the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protect your most critical data and information.

    2:30 pm
    [Panel] Incident Response!
    • session level icon
    speaker photo
    Chief Operating Officer, Binary Defense
    speaker photo
    Sr. Solution Engineer, Arctic Wolf
    speaker photo
    Director, Sales Engineering North America, Open Systems
    speaker photo
    Technical Director & Security Solutions Architect, Cohesity
    speaker photo
    Americas Engagement Lead - Security, Risk, and Compliance, Hewlett Packard Enterprise (HPE)
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Keynote Theater

    Security teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall (Collinwood 1)

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    Happy Hour
    • session level icon
    Sponsored by Cohesity
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall (Collinwood 1)

    Join your peers for conversation and complimentary beer, wine, and soda. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    Generously sponsored by:

    3:45 pm
    [Panel] Cover Your Cyber Assets
    • session level icon
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    speaker photo
    Director, Cyber Underwriting, Safety National
    speaker photo
    Consultant, Cyber Risk Solutions Team, WTW
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Keynote Theater
    What will drive the next big wave of information security improvements at U.S. organizations? Instead of regulation, it may be insurance. A two-pronged evolution is underway. Insurance policies are suddenly becoming more prescriptive for organizations, often requiring companies meet certain cybersecurity benchmarks before a policy can be written. At the same time, “InsureTech” is emerging on the scene. This involves a new breed of insurance company that provides cyber coverage and also scans the insured’s environment to constantly monitor for IT and cyber risk. Join this keynote panel as we discuss this evolution and look at future impacts of cyber insurance on security leaders and their teams.
Exhibitors
  • Association of Continuity Professionals (ACP) North Texas
    Booth: 470

    ACP is a non-profit professional organization, which provides a forum for the exchange of experiences and information, for business continuity professionals, throughout a network of local chapters.

    Founded in March of 1986, the North Texas Chapter is one of the oldest continuously meeting chapters, and among the largest by membership, serving the Dallas/Fort Worth metroplex. Meetings are held on the first Tuesday of every month, unless the first Tuesday coincides with a holiday week.  We invite you to attend our next meeting.

  • accSenSe
    Booth: 410

    Digital Identity Resilience is crucial to bouncing back from cyber-attacks quickly, fixing a human error, and managing change. accSenSe will provide strategic value for your IT.
    Diagnose and remediate posture changes within your IAM system.
    Get back to business as usual within hours and ensure business loss is kept to a minimum.
    Low RPO and high granularity, Keeping data retention to a maximum.
    Handle change and growth safely and securely, avoid misconfiguration.

  • Arctic Wolf Networks
    Booth: 350

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Avertium
    Booth: 340

    Avertium was born from 4 award-winning cybersecurity firms in 2019. Today, helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.

  • Beyond Identity
    Booth: 185

    The most secure, passwordless authentication platform for tech forward-thinking organizations, globally. Breaking down the barriers between identity, security, and device management, Beyond Identity fundamentally changes the way the world logs in–eliminating passwords and providing users with a frictionless multi-factor login experience.

  • Binary Defense
    Booth: 330

    Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.

  • BlackBerry Corporation
    Booth: 120

    BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.

  • BlackCloak, Inc
    Booth: 420

    BlackCloak provides digital protection for corporate executives, Board Members, and high-profile and high-net-worth individuals and their families. Its award-winning Concierge Cybersecurity & Privacy™ Platform combines proprietary software with white-glove client service to prevent cyberattacks originating in an enterprise leader’s personal life from moving laterally into the organization. The Platform also protects individuals and their families from financial fraud, identity theft, targeted cyberattacks, reputational damage and other threats to privacy and security. Thousands of CISOs, CIOs, CFOs, and General Counsels trust BlackCloak to protect the personal privacy, devices, and homes of their most important personnel so they can continue to focus exclusively on what they do best: protecting the enterprise from cyberattack.

  • CardinalOps
    Booth: 110

    CardinalOps delivers AI-powered detection content and metrics to ensure your SOC is protected from the MITRE ATT&CK techniques most relevant to your organization’s adversaries, infrastructure, and business priorities.

    Leveraging proprietary analytics and API-driven automation, the platform continuously delivers new use cases enabling your SOC team to stay ahead of constant change in the attack surface and threat landscape – plus continuously identify and remediate broken rules and misconfigured log sources – so you can close the riskiest detection gaps that leave your organization exposed.

    Founded in early 2020, CardinalOps is led by serial entrepreneurs whose previous companies were acquired by Palo Alto Networks, HP, Microsoft Security, IBM Security, and others. The company’s advisory board includes Dr. Anton Chuvakin, recognized SIEM expert and Head of Security Solution Strategy at Google (formerly Gartner Research VP); Dan Burns, former Optiv CEO and founder of Accuvant; and Randy Watkins, CTO of Critical Start.

  • Centripetal
    Booth: 430

    Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.

  • Claro Enterprise Solutions
    Booth: 165

    Claro Enterprise Solutions, an América Móvil subsidiary, is a leading source provider of Network Connectivity and Communication, Cloud, IoT, and IT Managed Services delivering scalable solutions with layers of security, global expertise, and dependable customer support.

    By empowering a people-first culture, our diverse teams closely collaborate with clients, enabling businesses to thrive with our integrated secure-by-design and expertly curated portfolio of technology solutions customized and designed to help optimize business operations.

  • Code42
    Booth: 480

    Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

  • Cohesity, Inc
    Booth: 135

    We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. The company develops software that allows IT professionals to backup, manage, and gain insights from their data across multiple systems or cloud providers.

  • Cyber Fraud Task Force – U.S. Secret Service
    Booth: 400

    Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • Cybereason
    Booth: 460

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • Expel
    Booth: 240

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • Fastly
    Booth: 440

    Expectations for websites and apps are at an all-time high. If they aren’t fast, secure, and highly personalized, users take their business elsewhere. But today’s most innovative companies are thriving by meeting this challenge head on: they’re choosing Fastly and an investment in their developers.

    With Fastly’s powerful edge cloud platform, developers get the tools they need to build the most groundbreaking apps — all optimized for speed, security, and scale — so businesses can effectively transform to compete in today’s markets. Together, we’re building the future of the web.

  • ForgeRock / Ping Identity
    Booth: 200

    ForgeRock is a global leader in digital identity that delivers modern and comprehensive identity and access management solutions for consumers, employees, and things to simply and safely access the connected world. Using ForgeRock, more than 1,300 global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data—consumable in any cloud or hybrid environment. The company is headquartered in San Francisco, California, with offices around the world.

    For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media.

  • Infoblox
    Booth: 150

    Infoblox delivers modern, cloud-first networking and security experiences that are simple, automated, scalable and reliable. The company is the market leader with over 12,000 customers worldwide, including over 70 percent of the Fortune 500. The company’s portfolio of SaaS, data center, and hybrid offerings for DHCP, DNS, IPAM and security solutions enable organizations to leverage the advantages of on-premises and cloud-first architectures. The combination of NIOS, BloxOne DDI, BloxOne Threat Defense and threat intelligence services provide a robust foundation for connecting and securing the modern enterprise.

  • InfraGard North Texas
    Booth: N/A

    The primary purpose of the InfraGard North Texas Members Alliance is to assist in increasing the security of the United States national infrastructures through ongoing exchanges of information relevant to infrastructure protection and through education, outreach, and similar efforts. In addition to the benefits offered by the national InfraGard organization, there are several ways our local chapter accomplishes these objectives, including:

    • Local quarterly membership meetings focused on infrastructure protection
    • Sector-specific meetings and information exchanges (see Sector Chief Program).
    • Partnerships and discounts to training offerings with other organizations such as ISSA and SecureWorld
    • Networking opportunities with peers within and across all sectors
  • ISC2 Dallas-Fort Worth
    Booth: 320

    The Dallas-Fort Worth Chapter of ISC2 is based in the DFW area and serves the counties of the Dallas-Fort Worth Metroplex. Members include those with security certifications from ISC2 as well as other professionals practicing or interested in information, software and communications security. Our mission is to advance information security in the DFW area by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. Our chapter programs provide members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resources and educational programs to keep them up to date with the latest advances in technology as well as information assurance.

  • North Texas ISSA
    Booth: 300

    The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.

  • Keysight
    Booth: 260

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Mimecast
    Booth: 140

    Mimecast empowers our customers to help mitigate risk and manage complexities across a threat landscape driven by cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.

  • Netsurion
    Booth: 100

    Netsurion® delivers an adaptive managed security solution that integrates our XDR platform with your existing security investments and technology stack, easily scaling to fit your business needs. Netsurion’s managed offering includes our 24×7 SOC that operates as your trusted cybersecurity partner, working closely with your IT team to strengthen your cybersecurity posture. Our solution delivers managed threat protection so you can confidently focus on your core business.

    Headquartered in Ft. Lauderdale, FL, with a global team of security analysts and engineers, Netsurion is a leader in Managed Extended Detection & Response (MXDR). Learn more at www.netsurion.com.

  • Okta
    Booth: 360

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Open Systems
    Booth: 170

    The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. We are deeply passionate about protecting organizations from that storm.

    We provide a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection. And Mission Control, our integrated NOC and SOC, is staffed by experts, not only in threat hunting and cyber hygiene, but also in the proper configuration and maintenance of the Microsoft security stack. So we can leverage what you already own.

    The combination is changing the lives of our customers, giving them security traditionally reserved for only the largest organizations. We give them “shelter from the storm”. That is our passion.

  • Proofpoint
    Booth: 250

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Qush Security
    Booth: 180

    Founded in 2016 to create a better, smarter way to deliver security. Innovative companies worldwide use Qush for human-centric data loss protection.

  • Recorded Future
    Booth: 210

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • RiskRecon
    Booth: 130

    RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
    easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
    solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
    enabling organizations to efficiently operate scalable, third-party risk management programs for
    dramatically better risk outcomes. Request a demo to learn more about our solution.

  • SecureLink
    Booth: 450

    SecureLink is a leader in managing secure third-party access and remote support for both enterprise companies and technology providers. SecureLink serves over 400 customers and 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming and retail rely on SecureLink’s secure, purpose-built platform.

  • SecureWorld Media
    Booth: 145

    Learn more about SecureWorld News and our digital content channels.

  • SecurityMetrics
    Booth: 220

    Today, headquartered in Orem, Utah, we continue to provide expert services to small and large businesses around the world. We are most interested in helping businesses who view cybersecurity as a mindset rather than a checklist because we want to ensure the protection and success of our customers to the best of our ability.

  • Sonatype
    Booth: 160

    Every day, developers rely on millions of third party and open source building blocks – known as components – to build the software that runs our world. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations don’t have to make the tradeoff between going fast and being secure. More than 120,000 organizations use Sonatype’s Nexus solutions to support agile, Continuous Delivery, and DevOps practices globally

  • Thales
    Booth: 230

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • TechTarget
    Booth: N/A

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • UpGuard
    Booth: 310

    UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Moderator Shamoun Siddiqui, PhD
    VP & CISO, Neiman Marcus

    Dr. Shamoun Siddiqui is currently the Vice president and Chief Information Security Officer at the Neiman Marcus Group of companies located in Dallas, Texas. has been a leader in the information security space for over 15 years. He possesses a Bachelor’s and a Master’s degree in Mechanical Engineering and a Doctorate in Aerospace Engineering from the University of Texas at Austin. His recent employments include well-known companies like Nationstar/Mr. Cooper Mortgage, Sabre, CVS and Hitachi.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    William Smarr
    Special Agent in Charge, Dallas Field Office District, United States Secret Service
  • speaker photo
    Stefan Hare
    Network Intrusion Forensic Analyst (NIFA), United States Secret Service
  • speaker photo
    Moderator--Bill White
    DevOps Revolutionary - Information Security, State Farm

    Bill is an Information Security professional with 30 years’ experience in IT, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for Information Security architectural at a Fortune 50 company. He started as a bench technician while learning his way up to Information Security Management. Bill is a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Certified in Risk and Information Systems Controls (CRISC) and a GIAC Certified Python Coder. (GPYC).

  • speaker photo
    John B. Sapp Jr.
    VP, Information Security & CISO, Texas Mutual Insurance Company

    John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations He is a frequent speaker at some of the largest technology and healthcare industry events.

  • speaker photo
    Russell Dowdell
    Director, Sales Engineering, SecureLink

    For nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations identify the SecureLink products and product features that can be leveraged to both improve security and streamline workflows.

  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Amna Awan
    Director, Security Development & Engineering, Charles Schwab

    Amna Awan is Director, Security Development and Engineering, within the Technology Risk Management function of a major financial institution in the Dallas-Fort Worth area. She has an extensive technology background, including in development, and has held cybersecurity roles in the past with program ownership of multiple domains.

    Amna is a periodic speaker and panelist at industry events and is on the Advisory Council of SecureWorld Dallas. She is a co-author of the book, "The CISO Mentor: Pragmatic Advice for Emerging Risk Management Leaders." She has a business degree from the University of Texas at Austin, with specialization in Management Information Systems. She holds multiple certifications, including CISSP, CRISC, CCSP, and ITILv4.

  • speaker photo
    Muli Motola
    Co-Founder & CEO, accSenSe
  • speaker photo
    Austin Smith
    Director, Systems Engineering, Code42

    Austin has been in security focused sales roles for the past 15 years with over 30 years of combined experience between IT and Sales. In that time, he has been fortunate to work with organizations of all sizes to help them reduce their risk, whether those efforts were focused on external threats or internal risks to their organization.

    Early in his career, he ran a practice and was also fortunate enough to teach technology certifications to others during the evening. He has always seen himself as a coach/teacher, helping enable others to achieve their goals. Those goals may be those of the individual progressing through their career or the customer who is working to help mature their organization.

  • speaker photo
    Jacob Brown
    Sr. Solutions Architect, Expel

    Jacob Brown is a Senior Solutions Architect with five+ years of experience in the security space working with clients ranging from from small startups to Fortune 50 corporations. With a background in data center, network, and cloud security, he is motivated by helping organizations implement security right where they are and streamlining that experience for both internal teams and individual users alike.

  • speaker photo
    T.J. Adamowicz
    Sr. Solutions Engineer, North America, Mimecast

    An IT professional for over 15 years with more than half of that time dedicated to email, T.J. has worked in the university and financial sectors before coming to Mimecast, where he engages with many organizations in protecting against email-borne threats.

  • speaker photo
    Moderator Eric Yancy
    Information Security Officer, City of Denton, Texas

    Eric Yancy is the Information Security Officer for the City of Denton. Eric's contribution combines the experience of securing the broad range of risk profiles and regulatory considerations within the public sector with over 20 years supporting multiple verticals in the private sector. Eric retains multiple information security credential,s including Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified Cloud Security Knowledge (CCSK), Certified Information Systems Auditor (CISA) and two National Security Agency certifications on Information Security Assessments. Eric has also been recognized in the International "Who's Who of Information Technology."

  • speaker photo
    Jamison Utter
    Cyber Security Specialist, Infoblox

    Jamison brings 25+ years of IT/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer’s internal and external problem set make him an empathic speaker and his experience in many roles spanning sales, channel, BD, and evangelism make him a capable and competent industry visionary. With hundreds of public speaking engagements including the EU congress at the Hague and a special briefing for Homeland Security and select members of the US Senate, he has addressed CISOs and legislators alike.

  • speaker photo
    Sonja Hammond
    VP & CISO, National Veterinary Associates

    Sonja Hammond is the Vice President, Chief Information Security Officer at National Veterinary Associates. As an information and cyber security leader, Sonja brings experience from the financial, healthcare, manufacturing, and computing industries. An additional benefit that Sonja possesses is an information technology (IT) background with hands-on infrastructure knowledge and deep experience in large global corporate environments. She has had direct interaction with external regulators, worked in compliance and coordinated IT audit preparation and remediation. Sonja has done extensive information security work in vendor and supplier negotiations, mergers and acquisitions (MADO), risk and compliance, and provided lawsuit support as a forensic subject matter expert.

  • speaker photo
    Patrick Benoit, Moderator
    CISO, Brink's Inc.

    Patrick was previosuly the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a highly effective Business Leader with a mastery of Technology and Security. He is also a Writer, Speaker, and a continuous Mentor/Advisor and Learner. He has demonstrated repeated success guiding business strategy to achieve maximum positive business impacts with minimum resource expenditures. Talented at building and launching global technology and security programs, grooming high-performing teams across all domains, plus guiding the digital transformation, enhancing the digital customer experience, driving and enhancing revenue using technology and reducing risk to the business. A skilled executive leader, presenter, negotiator, and businessperson, able to forge solid relationships with strategic partners and build consensus across multiple organizational levels.

    He is certified as C/CISO, CISM, CISSP, CRISC, PMP, ITIL Expert, and Lean Six Sigma Black Belt. He is a pilot and flight instructor. He studies and teaches Aikido, rides motorcycles, and his favorite teaching is “From Chaos Comes Greatness,” a loose translation from the “I Ching."

  • speaker photo
    Cecil Pineda
    SVP & CISO, R1 RCM

    Cecil Pineda is Senior Vice President and CISO for R1 RCM, Inc. He was previously the Senior Director and Program Leader for the VCISO and Consulting Practice at Critical Start. He also served as the CISO of DFW International Airport and also held leadership positions at GameStop, TXU Energy, Boeing and CVS Health.

    He is an active member of the DFW CISO community, various cybersecurity professional organizations (ISC2, ISACA, IAPP and others). In 2018, Cecil keynoted the Evanta CISO Dallas Summit and spoke at Aviation Cyber Security Summit in 2018, ICS Security Conference in Atlanta in 2019, CDM, Argyle, ISSA, Data Connectors, SecureWorld, ASIS, Executive Alliance and many others,

    He is currently serving as advisory board members for various institutions such as Tarrant Country College and Collin College. He also assists Salvation Army for their cyber security efforts (pro bono).

  • speaker photo
    Elvis Moreland
    Board Director, Cyber Bytes Foundation

    Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security Professional (CISSP), the Information Systems Security Engineering Professional (ISSEP), and the Certified in the Governance of Enterprise IT (CGEIT) and Certified Information Security Manager (CISM) from ISACA.

    Elvis is a subject matter expert in cyber risk management and cybersecurity laws that impact the private, public, and nonprofit sectors. He has coached mid-sized organizations, Fortune 500 companies, federal government agencies, and institutions of higher education to leverage industry standards while complying with complex legal mandates and regulatory requirements. He has been recognized and honored as a Computerworld Premier 100 IT Leader and a Distinguished Expert in Information Security Governance, Risk Management, and Compliance.

  • speaker photo
    Moderator David Belanger
    CSO, Bestow

    Dave Belanger has over 25 years of experience in Security and Technology Leadership roles. Dave is the Chief Security Officer for Bestow. In his prior roles, he served as Information Security Officer for a Technology Company operating in the corrections and public safety industry and as CISO for Maxor National Pharmacy Services. He was also the Data Center Manager for a large telecom company, providing Operational and Physical Security for nearly a decade. He holds security industry certifications including CISSP, CCISO and CEH. Dave is on the Board of Directors for the North Texas chapter of ISSA. He is on several advisory boards and is actively engaged in the cybersecurity community as a volunteer, mentor, and speaker.

  • speaker photo
    John B. Sapp Jr.
    VP, Information Security & CISO, Texas Mutual Insurance Company

    John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations He is a frequent speaker at some of the largest technology and healthcare industry events.

  • speaker photo
    Michael R. Smith
    Sr. Information Systems Auditor, Parkland Health & Hospital System

    Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.

    Industry Certifications, Licensure, & Training
    Certified Information Security Specialist (CISSP)
    Certified Internal Auditor (CIA)
    Project Management Professional (PMP)
    Certified Fraud Examiner (CFE)
    Certified Information Systems Auditor (CISA)
    Information Library Information Technology (ITIL)

  • speaker photo
    Robert Scott
    Managing Partner, Scott & Scott, LLP

    Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s largest corporations, such as Schlumberger, PepsiCo, Iron Mountain and American Express, on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing.

  • speaker photo
    Eve Maler
    CTO, ForgeRock

    Eve Maler is ForgeRock's CTO. She is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and has also served as a Forrester Research security and risk analyst. She leads the ForgeRock Labs team investigating and prototyping innovative approaches to solving customers' identity challenges, along with driving ForgeRock's industry standards leadership.

  • speaker photo
    David Ellis
    VP, Forensic Investigations, SecurityMetrics
  • speaker photo
    Larci Robertson
    Solutions Engineer, Cybereason

    Larci Robertson is a Sales Engineer in the TOLA region at Cybereason. She began her cyber career in the United States Navy as a Signals Intelligence Analyst. She had many different opportunities in the intelligence community at sea and shore. She is a proud plank owner of the Navy Cyber Defense Operations Command (NCDOC) where she was one of the first Cyber Threat Intelligence (CTI) analysts as we know them today. After leaving the Navy she worked as a defense contractor for GDIT, Booz Allen Hamilton, and Raytheon in various roles in the intelligence and technology fields. She eventually found her way back to Cyber Threat Intelligence roles in the corporate world working for PepsiCo, Epsilon/Publicis and then finally providing security services in project management at McKesson before becoming a Sales Engineer at Cybereason. She also is the Board President of Women of Security and Dallas Chapter leader.

  • speaker photo
    Patterson Cake
    DFIR Principal Consultant, Avertium

    Patterson has worked in information-technology for more than two decades, focusing on information-security for the past several years, specializing in the development of incident-response teams, programs and processes. Before joining Avertium, he was a Senior Security Consultant for Haven Information Security, a Senior Security Engineer for AWS Managed Services, and has extensive experience in information-security across multiple verticals, from non-profit healthcare to cloud-service providers to financial-service providers. He also teaches for SANS, is a member of the GIAC GPEN advisory board, and is actively involved in the information-security community.

  • speaker photo
    James Stroud
    Sr. Sales Engineering Manager, Proofpoint

    James Stroud is the Sr. Sales Engineering Manager for Proofpoint’s South and East Mid Market teams. He has 25+ years of experience in cybersecurity, providing leadership and expertise for companies in various sectors, including Federal, State and Local Government, Healthcare, and Education. James joined Proofpoint this year after serving as the Global category lead for security at AWS. James holds several industry certifications from AWS, Cisco, and Microsoft.

  • speaker photo
    Moderator Brittany George
    Partner, IT Advisory, Weaver
  • speaker photo
    Bill White
    DevOps Revolutionary - Information Security, State Farm

    Bill is an Information Security professional with 30 years’ experience in IT, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for Information Security architectural at a Fortune 50 company. He started as a bench technician while learning his way up to Information Security Management. Bill is a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Certified in Risk and Information Systems Controls (CRISC) and a GIAC Certified Python Coder. (GPYC).

  • speaker photo
    Victor Mendoza
    Principal Solutions Architect, Thales

    Victor Mendoza, Principal Solutions Architect for Thales, is a member of the Cloud Protection and Licensing Solutions teams with 15+ years of experience in IT and cybersecurity. Today he works with companies in finance, healthcare, and oil & gas to streamline data security operations, accelerate growth and reduce risk to their most critical data or information from being disclosed, alter or denied access to. Previously, he work for a managed web hosting company before delivering strategic consulting services and leading an encryption services team for an organization with global presence.

  • speaker photo
    Dan Adcock
    Chief Operating Officer, Binary Defense

    As Binary Defense Chief Operating Officer, Dan Adcock leads all client service delivery organizations, ensuring the company evolves and maintains industry-leading cybersecurity capabilities to defend clients. He is responsible for top and bottom-line performance of the company while ensuring that clients’ business objectives in partnering with Binary Defense are achieved.

    Prior to Binary Defense, Dan was the Chief of Staff and Strategy Lead for the CEO of the Americas at Capgemini, a Global IT services firm, during a period when the company capitalized on economic recovery conditions to grow at more than double the IT services market in the Americas. He also served as the Vice President and Chief Operating Officer of the Capgemini Americas Cybersecurity Practice from 2019 – 2021, overseeing a period of significant growth in revenue and profitability.

    He has 20 years of experience in corporate strategy, business development and client service delivery that began at Lockheed Martin, led to the formation of Lockheed Martin Commercial Cyber in 2014 and then the leadership of that organization through hyper growth and a series of mergers and acquisitions to become Leidos Cyber, which was acquired by Capgemini in 2019. As a leader in the cyber industry since 2014, he has led global teams that have delivered cybersecurity consulting and operational transformation for leading global enterprises and over one-quarter of the Fortune 500.

    A graduate of Texas A&M with a Bachelor of Science in Industrial Engineering and Georgetown University with an MBA, Dan lives in North Texas with his wife and four children. When not watching his kids’ sporting activities, he enjoys playing soccer, golf, and traveling.

  • speaker photo
    Cameron Joyce
    Sr. Solution Engineer, Arctic Wolf

    Cameron Joyce is a self proclaimed "full stack" engineer. Having spent close to a decade in Managed Services Cameron Joyce has implemented or managed just about every enterprise technology on the market. With a background in security, messaging, and datacenter architecture, Cameron Joyce now helps businesses select emerging technology solutions to drive business outcomes and stay ahead of their competition. Working with healthcare and financial services customers and their challenges with both compliance and uptime are a specialty for Cameron as the majority of his career is working for / with these kinds of businesses.

  • speaker photo
    Matthew Berg
    Director, Sales Engineering North America, Open Systems
  • speaker photo
    Jonathon Mayor
    Technical Director & Security Solutions Architect, Cohesity

    Jonathon Mayor leads the Security Solutions Architecture program for Cohesity. His 20+ years of experience in the IT industry have involved both offensive and defensive security activities. He also has a BS in IT with a focus on computer forensics, and he is a locksport hobbyist. This blend of skills and background is valuable in bringing customer needs and product capabilities together.

  • speaker photo
    Moderator David A. Wallace
    Americas Engagement Lead - Security, Risk, and Compliance, Hewlett Packard Enterprise (HPE)

    MBA, CISA, CISM, CISSP

    With four decades of experience in Information Technology and 25 years of Information Security and Compliance leadership experience, David Wallace serves as the Engagement Lead for the Americas in Hewlett Packard Enterprise Pointnext Security, Risk, and Compliance practice. In his role, Wallace is the responsible for aligning HPE solutions with client needs, developing new solutions, and advising customers on legacy security matters as well as emerging themes such as IT and Security Transformation, Cyber Resilience, and Zero Trust.

    Wallace comes to HPE from Plano, TX-based Alorica, a USD $2 billion business process outsourcing firm serving clients in the financial services, healthcare, retail, and telecommunications industries, where he served as Chief Information Security Officer. Prior to joining EGS, Wallace ran JP Morgan Chase Paymentech’s Global Merchant Compliance And Compromise Investigation programs, and gained valuable experience serving in Information Security leadership roles with companies such as Perot Systems, Sabre Holdings/Travelocity, and NationsBank.

    In addition to his professional experience, Wallace has earned multiple industry certifications, including Certified Information Systems Security Professional in 1999, Certified Information Security Manager in 2004, and Certified Information Security Auditor in 2008.

    Wallace has also served on multiple industry advisory boards including the Payment Card Industry Security Standards Council (PCI SSC) Board of Advisors, the Financial Services Information Sharing and Analysis Center (FS-ISAC), and the Payment Processors Information Sharing Council (PPISC), where he chaired the Acquirer’s Working Group. He is a frequent speaker at regional, national, and international information security conferences including the RSA Conference.

    Wallace attended Louisiana State University, where he studied Business Administration and Management Information Systems. He earned a Master’s Degree in Business Administration from Southern Methodist University in Dallas, Texas in 2003.

  • speaker photo
    Happy Hour
  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Steven H. Anderson
    Director, Cyber Underwriting, Safety National

    Steve is a cyber liability product leader and underwriter with almost 30 years of experience in both the insurance and technology sectors. In his current role Steve helps drive premium growth through leading operations, product development and underwriting at Safety National. Steve previously served as Chief Underwriting Officer at Measured Insurance and Vice President – Product Leader at QBE North America.

    Steve is a subject matter expert and national speaker on the topic of cyber liability.

  • speaker photo
    Sean Scranton
    Consultant, Cyber Risk Solutions Team, WTW

    Cyber Liability National Practice Leader (current). IT Security / IT Auditor at RLI for eight years. Network / security consulting / auditor for financial institutions, government for nine years. Network / firewall administrator in healthcare for seven years. Designations: CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes