Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 5, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    8:00 am
    Executive Advisory Council Breakfast: (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    8:00 am
    SecureWorld Plus - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    Arbor Networks: Is Your Organization Prepared to Stop The Modern Day DDoS Attack?
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Product Marketing, Arbor Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    Gaining Executive Support through Governance, Risk & Compliance
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Asia Region (Cybersecurity) Risk Lead, Compassion International
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 210
    8:30 am
    Recovery From a Targeted Cyber-Attack: Ransomware
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Research Director, Security and Risk Management
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 212
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Cyber Intelligence Exchange: It’s Difficult, Possible, and Absolutely Necessary
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CEO & Co-Founder, TruSTAR Technology
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable: (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Colorado's Multi-Agency Incident Response to Cybersecurity
    • session level icon
    • session level icon
    speaker photo
    Director CIAS, Regis University
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    11:15 am - 12:00 pm
    Location / Room: 208
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 212
    11:15 am
    Venafi: Protecting the Foundation of Security
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Product Marketing, Venafi
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 210
    12:00 pm
    Advisory Council Roundtable: (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Radware - The Current Economics of Cyber Attacks
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: After the Hack
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 am
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Embracing Risk
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: 501
    1:15 pm
    WTF* Convergence of IT/CT/OT (*What the Fusion)
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Founder & CEO, Cybersecurity Risk Management Consulting
    speaker photo
    Infrastructure Architect / Sr. Program Manager – Consultant, Prologis
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 am
    3:00 pm
    InfraGard: How Companies Can Work With Federal Law Enforcement When Responding to Cybersecurity Incidents
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief of Special Prosecutions Section and Assistant US Attorney, United States Attorney’s Office, District of Colorado
    speaker photo
    Computer Hacking and Intellectual Property (CHIP) Coordinator, and Assistant United States Attorney, U.s. Attorney’s Office, District of Colorado
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 304
    3:00 pm
    Know What You Don't Know - Balance Between IT Spending and Risk Transfer
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    SVP, Head of Specialty Products E&O, Zurich
    speaker photo
    Senior Vice President, Cyber / E&O Practice
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    SecureWorld Plus - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 am
    Location / Room: 503
    3:00 pm
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: 502
  • Thursday, October 6, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    8:00 am
    SecureWorld Plus - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: 503
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    Data Breach Digest - Scenarios from the Field
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Managing Principal, Cybersecurity
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 212
    8:30 am
    ISACA: Preventing Credential Theft in the Enterprise
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief Cybersecurity Advisor and Strategy Officer, Microsoft
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 304
    8:30 am
    Prevention: Holy Grail or Pipe Dream?
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Architect, Sungard Availability Services
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 210
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private Partnership
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CNN Military Analyst; USAF (Ret.), CEO, Cedric Leighton Associates
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable: Measuring the Effectiveness of Your Security Program - VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: 206
    11:15 am
    "Some Women Fear the Fire. Some Women Simply Become it." R.H. Sin
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    IT Security Manager, Weld County Government
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 208
    11:15 am
    ISACA: How To Build a Third Party Risk Management Program (TPRM) That Works?
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, ISACA Board
    speaker photo
    Director of Information Security and Compliance, IQNavigator
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 304
    11:15 am
    Wombat Security Technologies: The Top 8 Security Risks Beyond the Phish
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CTO, Wombat Security Technologies
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 212
    12:00 pm
    Advisory Council Roundtable Lunch: Manage the Damage - Lunch Served VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 206
    12:15 pm
    LUNCH KEYNOTE: Arbor Networks -The Human Factor in the Age of Cyber Conflict
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    VP Marketing, Advanced Threat, Arbor Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: 501
    1:15 pm
    Panel: Locking Down the Endpoints
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 am
    Location / Room: Keynote Theater
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    An Overview of Popular Application Authentication Frameworks
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Operations, Peaksware
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 208
    3:00 pm
    How Douglas County Plans to Keep Secure Before, During and After the Election?
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CEO and Founder, Cytegic
    speaker photo
    Chief Security Officer, Douglas County Colorado
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 212
    3:00 pm
    The Next Generation of Emergency Ph0nage
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CTO, SecureSet
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 210
Exhibitors
  • ACP
    Booth: TBD

    ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for ACPits members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the “profession”). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.

    Founded in 1983, we are an established community of industry experts, educators, practitioners, leaders, facilitators and advocates. Our members view us as connectors and as a vital networking source.

  • Apricorn
    Booth: 130

    Founded in 1983, Apricorn designs, manufactures, and supports storage innovations with your data’s security as our top priority. Our unique, patented approach is centered on being 100% hardware-encrypted, software-free, and cross-platform compatible. Trusted by numerous state, national, and international governments, as well as small and large corporations alike, Apricorn delivers advanced data security innovations designed to address today’s threats, as well as tomorrow’s.

  • NETSCOUT Arbor
    Booth: 218

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • Binary Defense Systems
    Booth: 344

    BDS is a company that works with you to understand your environment, what you have and building defenses to combat what we face today and for the attacks of tomorrow. Technology is continuously changing, businesses change every day – in order to keep up with the changes, BDS has created an extensively flexible yet highly accurate way of detecting attackers. We are attackers, and we know the best ways in detecting how attackers breach your network. An added bonus with BDS – continual penetration tests are performed regularly to enhance and develop additional safeguards. We are here to defend, protect and secure your company.

  • BitSight Technologies
    Booth: 118

    BitSight Technologies is transforming how companies manage information security risk with objective, evidence-based security ratings. The company’s Security Rating Platform continuously analyzes vast amounts of external data on security behaviors in order to help organizations manage third party risk, benchmark performance, and assess and negotiate cyber insurance premiums.For more information, please visit www.bitsighttech.com or follow us on Twitter (@BitSight)

  • Carbon Black
    Booth: 141

    Carbon Black is Transforming Security Through Big Data and Analytics in the Cloud Growing trends in mobility and cloud have made the endpoint the new perimeter. New and emerging attacks are beating traditional defenses, and security teams are too reactive and held back by their technologies. Carbon Black is leveraging the power of big data and analytics to solve the challenges surrounding endpoint security. With the Cb Predictive Security Cloud platform, we are transforming cybersecurity to deliver a new generation of cloud-delivered security solutions designed to protect against the most advanced threats.

     

  • Centrify
    Booth: 147

    Centrify provides unified identity management across data center, cloud and mobile environments. Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

  • Cloud Security Alliance (CSA)
    Booth: TBD

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Colorado Technology Association
    Booth: TBD

    The Colorado Technology Association leads the network of companies and professionals fueling Colorado’s economy, through technology.

    At the Colorado Technology Association, we:

    – Lead an inclusive network that benefits our member community
    – Advocate for a pro-business and technology-friendly climate
    – Influence the development of a robust talent pipeline
    – Lead initiatives to help companies grow.

  • Cyphort
    Booth: 203

    Cyphort is the next generation APT defense solution for the enterprise. Cyphort provides a single pane of glass across perimeter and laterally moving threats, correlates threat signals before and after an incident while eliminating noise from false alerts and red herrings.

  • Cytegic
    Booth: 124

    Cytegic offers a complete automatic, continuous solution of cybersecurity management and decision support system that enables executives, risk and security experts to monitor, measure and manage cybersecurity risk and defense posture. Cytegic’s technology identifies relevant attackers, attack methods and computes the threat landscape to deliver a proactive response of mitigation plan and action items to protect mission critical infrastructure and business assets. Cytegic end-to-end solution includes friendly dashboards, powerful quantified defense monitoring and threat intelligence. Cytegic’s solution effectively and efficiently manages your cybersecurity operations to ensure that executives and security experts alike have complete visibility into the security controls and threats within and beyond their perimeter.

  • Electronic Crimes Task Force
    Booth: TBD

    The role of the U.S. Secret Service has gradually evolved since the agency’s 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation’s financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service’s mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals – all of whom recognize new opportunities to expand and diversify their criminal portfolio.

  • Electronic Frontier Foundation
    Booth: TBD

    The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows.

  • Fidelis Cybersecurity
    Booth: 115

    Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy. For more information, go to www.fidelissecurity.com.

  • Forcepoint
    Booth: 339

    Forcepoint safeguards users, data and networks against the most determined adversaries, from insider threats to outside attackers, across the threat lifecycle – in the cloud, on the road, in the office. It simplifies compliance and enables better decision-making for more efficient remediation, empowering organizations to focus on what’s most important to them.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • Intersect Alliance
    Booth: 327
  • ISACA
    Booth: TBD

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • International Information Systems Security Certification Consortium, Inc., (ISC)²®
    Booth: TBD

    Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

  • ISSA Colorado Springs Chapter
    Booth: TBD

    ISSA Colorado Springs Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • ISSA Denver Chapter
    Booth: TBD

    ISSA Denver Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • Malwarebytes
    Booth: 133

    Malwarebytes provides anti-malware and anti-exploit software designed to protect users against zero-day threats that consistently escape detection by traditional endpoint security solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That’s why large Enterprise businesses worldwide, including Disney, Dole, and Samsung, trust Malwarebytes to protect their mission-critical data. For more information visit www.malwarebytes.com/business

  • NETSCOUT
    Booth: 109

    NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.

  • OpenDNS
    Booth: 347

    OpenDNS is the world’s largest Internet-wide security network, protecting two percent of the Internet’s active users every day. The cloud-based OpenDNS service delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. OpenDNS is easy to deploy and manage, with no hardware or software to install, no need to reconfigure networks and no new latency.

  • Optiv
    Booth: 212

    Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

  • OWASP
    Booth: TBD

    The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

  • Radware
    Booth: 100

    Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

  • Red Canary
    Booth: 145

    Red Canary brings Fortune 100 security to every business with its managed endpoint threat detection and response service. We detect opportunistic and targeted attacks from initial intrusion through data exfiltration. Once a threat is confirmed by our analysts, customers are alerted and use our automated response tooling to remediate the attack.

  • Rolta AdvizeX
    Booth: 127

    For the past 41 years we have partnered with our customers to “accelerate the adoption of new Information Technologies to create business value.” Our passion for information technology is guided by our vision of: “Customers for Life” Our innovative solutions are designed to meet your individual business needs. Our people bring deep technical expertise and experience to develop a lasting business relationship. Our deep heritage in both Applications and IT Infrastructure are essential elements of our approach to developing new solutions. Today, it is the further integration of Applications and Infrastructure that unleashes the power of Cloud Computing and our Fusion Cloud solutions.

  • Booth: 212
  • Sirius
    Booth: 106

    Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatTrack
    Booth: 139

    ThreatTrack specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by businesses, enterprises and government agencies around the world. ThreatTrack develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats.

  • TrustedSec
    Booth: 344

    TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.

     

  • University of Denver
    Booth: TBD

    The oldest and largest private university in the Rocky Mountain region, DU offers innovative and rigorous undergraduate, graduate and professional programs.

  • Venafi
    Booth: 200

    Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice. As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility. Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

  • Wombat Security Technologies
    Booth: 127

    Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

  • Zscaler
    Booth: 112

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Dan Lohrmann
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform

    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.

    Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.

    Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.

    He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.

  • speaker photo
    Tom Bienkowski
    Director, Product Marketing, Arbor Networks

    Tom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he’s a Director of Product Marketing focusing on Arbor’s industry leading DDoS Protection solution.

  • speaker photo
    Rhett Saunders
    Asia Region (Cybersecurity) Risk Lead, Compassion International

    Rhett Saunders is a seasoned cybersecurity professional and risk leader for Compassion International's Asia Region. His work now focuses on identifying risks to achieving goals and objectives for Asia in order to move faster and reach more children living in poverty. Before coming to Compassion International, Rhett served the Federal Reserve, and while there, led regular Enterprise Risk Management discussions between the Federal Reserve and U.S. Treasury with a focus on cybersecurity. Rhett is also a U.S. Army military veteran who served as an intelligence non-commissioned officer. Rhett earned a Master of Business Administration from LeTourneau University and holds the CISSP credential.

  • speaker photo
    David Monahan
    Research Director, Security and Risk Management

    David has over 20 years of IT security experience and has organized and managed both physical and information security programs, including SOC’s and NOC’s for organizations ranging from Fortune 100 companies and local government to small public and private companies. He has diverse Audit, Compliance, Risk and Privacy experience.

  • speaker photo
    Paul Kurtz
    CEO & Co-Founder, TruSTAR Technology

    Paul Kurtz is an internationally recognized expert on cybersecurity and the current CEO of TruSTAR Technology. Paul began working cyber security issues on the National Security Council at the White House in the late 1990s. He served in senior positions on the White House's National Security and Homeland Security Councils under Presidents Clinton and Bush and advised President Obama on cybersecurity during his transition into office. During his service, Paul was Special Assistant to the President and Senior Director for Critical Infrastructure Protection on the White House’s Homeland Security Council (HSC). He joined the HSC from the National Security Council (NSC) where he was both Senior Director for National Security in the Office of Cyberspace Security and a member of the President’s Critical Infrastructure Protection Board. He served on the NSC as a Director of Counterterrorism from 1999-2001, and helped manage the response to the September 11 terrorist attacks.

    Since leaving government, Paul has held numerous private sector cybersecurity positions and is currently the Co-founder and CEO for TruSTAR Technology. Paul is a regularly sought-after speaker and expert for the media, and served as an on-air consultant for CBS News.

    Paul’s work in counterterrorism has long-influenced his approach to cybersecurity. Specifically, it highlighted the need to improve information sharing and collaboration among those involved in detecting and responding to cyber threats. His remarks will be grounded in the past year’s most critical challenges and what we learned from our response to them, including the cyber attacks on the Ukraine power grid and the onslaught of cyber attacks targeting critical health care facilities.

  • speaker photo
    Daniel M. Likarish
    Director CIAS, Regis University

    Daniel M Likarish is professor Regis University CC&IS and Director of the CIAS. His research interests are in personalized experiential learning. He supports Colorado Cyber Patriot and Cyber Girls. Dan is the academic advocate for ISSA and ISACA. He is on the CISE Board and regional coordinator for the RMCCDC.

  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    Gina Osmond
    Product Marketing, Venafi
  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Kelly Fuller
    Founder & CEO, Cybersecurity Risk Management Consulting

    Fuller has broad-based experience as an information security and technology risk management executive, IT audit practice director, and management consultant spanning a variety of industries ranging from banking and insurance to healthcare, energy, and government. Her extensive work in technology risk management, regulatory compliance, IT governance, and aligning controls with COBIT, ITIL, ISO, and NIST standards, as well as her work in business continuity management and cyber security provides a hands-on, innovative approach to difficult tasks. In her various roles, Kelly has proven instrumental in driving strategic initiatives in complex environments through a balance of collaboration and decisive leadership. Fuller earned her Bachelor of Business Administration degree in Computer Information Systems from Oklahoma Panhandle State University in Goodwell, OK, and is currently pursuing a Master’s Degree from SANS Technology Institute.

    Kelly has lived in Denver since 2006 with her three kids and two dogs. She enjoys outdoor adventures, spending time with family and friends and good wine. In keeping with her personal commitment to give back to the community, Kelly has served on the Executive Board for Infragard, IT Committee Member for OWL (Open World Learning Center) and volunteers regularly with organizations close to her heart, such as A Precious Child.

  • speaker photo
    Susan Bond
    Infrastructure Architect / Sr. Program Manager – Consultant, Prologis
  • speaker photo
    Judy Smith
    Chief of Special Prosecutions Section and Assistant US Attorney, United States Attorney’s Office, District of Colorado
  • speaker photo
    David Tonini
    Computer Hacking and Intellectual Property (CHIP) Coordinator, and Assistant United States Attorney, U.s. Attorney’s Office, District of Colorado
  • speaker photo
    Erica Davis
    SVP, Head of Specialty Products E&O, Zurich

    Erica Davis is Senior Vice President of Specialty Errors & Omissions at Zurich. She has national oversight of the Professional Liability, Security & Privacy and Employed Lawyers lines of business with a specialization and industry thought leadership position in network security and privacy risk transfer solutions.

  • speaker photo
    Florence Levy
    Senior Vice President, Cyber / E&O Practice

    Florence focuses on creating cyber and E&O risk management programs for companies in a wide array of industries. She works with clients to understand their business goals, then assesses and develops programs or alternative risk transfer solutions that match their risk management objectives. Her expertise lies in identifying exposures, program design, contract language, negotiation and claims advocacy to ensure her consultancy reflects her clients’ unique exposures. Florence has spoken at many industrywide events, including RIMS chapter engagements, legal continuing education classes, HB Litigation’s NetDiligence, Advisen and Business Insurance conferences. She has also been interviewed and quoted in a variety of trade publications, including Business Insurance and Property Casualty 360‬° and was selected as one of the Business Insurance 2015 Women to Watch. She was also selected to serve as an Advisory Board member for both Business Insurance’s Cyber Risk summit and Advisen’s Cyber Risk Insights Conference.

    Florence has over fifteen years of experience in the insurance industry as a Cyber and Commercial E&O specialist. Prior to joining JLT, Florence was the Head of the U.S. Global Technology and Privacy Practice for Lockton Companies, as well as the National Practice Leader for Aon’s Professional Risk Solutions Group for two years prior to that. Florence obtained a Bachelor of Arts degree from the University of Michigan in Ann Arbor, a Juris Doctor degree from the University of Denver.

  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Dan Lohrmann
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform

    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.

    Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.

    Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.

    He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.

  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Dan Lohrmann
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform

    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.

    Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.

    Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.

    He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.

  • speaker photo
    Joan Ross
    Managing Principal, Cybersecurity

    Joan Ross is Managing Principal, Cybersecurity for Verizon’s CTO of Global Security Services, and a respected industry thought leader. Joan develops advanced security strategies, publishes and speaks on implementing threat intelligence, and contributes to Verizon’s annual Data Breach Investigation Report (DBIR) and Data Breach Digest (DBD). Joan is a former chief security officer for two technology companies, coming up the security ranks as an encryption engineer and cloud security architect. As an early CISSP holder from back in the 1990’s, she maintains a number security and privacy certifications and earned her Masters of Science degree in design and engineering focusing on incident response with the U.S. Coast Guard.

  • speaker photo
    Jonathan C. Trull
    Chief Cybersecurity Advisor and Strategy Officer, Microsoft

    Jonathan C. Trull Global Chief Cybersecurity Advisor Enterprise Cybersecurity Group Microsoft Enterprise & Partner Group As Global Chief Security Advisor for the Microsoft Enterprise Cybersecurity Group, Jonathan leads Microsoft’s team of worldwide Chief Security Advisors to provide thought leadership, strategic direction on the development of Microsoft security products and services, and deep customer and partner engagement around the globe.

    Jonathan joined Microsoft in 2016 as an experienced information security executive bringing more than 15 years of public and private sector experience. Trull was Vice President and CISO with Optiv, where he was responsible for developing and executing the company's information security strategy and program. Prior to his role at Optiv, Trull was the Chief Information Security Officer (CISO) for Qualys where he was responsible for securing infrastructure and products, bringing security best practices to customers, providing strategic direction on the development of the QualysGuard Security Platform, researching real world threats and providing guidance on how to address them.

    In his previous role as the CISO for the State of Colorado, Trull significantly reduced the state's risk by developing and executing a successful security program, known as Secure Colorado. The program secured 17 executive branch agencies encompassing 26,000 employees and 150,000 systems. Trull serves as a Lieutenant Commander for the U.S. Navy Reserves focusing on computer network defense, attack and intelligence. Trull is dedicated to teaching and mentoring the next generation of cyber security professionals and serves on the faculty at Regis University in the information assurance graduate program. Here he develops and teaches courses on network forensics, security architecture and design, malware analysis and legal concepts in information security. Trull is a longtime advocate of public-private partnerships and technological innovations to solve complex problems and make the Internet a safer place for all.

    In cooperation with Qualys, SANS Institute, Council on Cyber Security and the State of Colorado, he spearheaded the development of the Qualys Top 4 Controls tool that allows anyone to assess the security of their Windows computer for free. He also worked in cooperation with Federal, State and private sector partners to form the Colorado Joint Cyber Crime Task Force. This is one of the nation's first cybercrime information sharing centers, with a primary focus of increasing cyber resiliency within Colorado.

    Trull has established himself as an innovative security leader and was recently named by the SANS Institute as one of the "People Who Made a Difference in Cybersecurity." He serves as an advisor to several security startups and venture capital firms, and has spoken at major security events such as RSA, Black Hat, Gartner, CSO50 and SANS. Trull is a Certified Information Systems Auditor (CISA) and an Offensive Security Certified Professional (OSCP). He earned a master's degree from the University of North Texas and a bachelor's degree from Metropolitan State University of Denver.

  • speaker photo
    Greg Sternberg
    Security Architect, Sungard Availability Services

    Greg Sternberg is a Security Architect at Sungard Availability Services, CISO for ISSA, Denver and Affiliate Faculty at Regis University. He works at incorporating security into the SDLC and securing architectures. He has published and blogged on security and architecture topics and presented at SecureWorld, RMISC, ISC(2) and the Open Group Security Conferences. He holds CISSP, CISM and TOGAF certifications, has a Masters in Software Engineering and Management, is a member of ISACA, ISC(2), InfraGard and a board member of the Denver chapter of ISSA.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; USAF (Ret.), CEO, Cedric Leighton Associates

    Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.

    Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

  • speaker photo
    Jessica Raymond
    IT Security Manager, Weld County Government

    IT Security Manager for Weld County Government with over 20 years of professional experience in both the public and private sectors. CISSP, CISM, CCISO and PCIP certified.

  • speaker photo
    Manjula Udeshi
    Director, ISACA Board

    Manjula is a seasoned professional with more than 15 years of experience in Governance, Risk and compliance, information technology auditing and business administration. As Director within the Office of CISO at Optiv, she is responsible for designing, building, and executing a robust and business aligned security governance, risk, compliance and threat management program. Optiv is a market-leading provider of end-to-end cyber security solution.

    Before joining Optiv, Manjula was at Governor’s Office of Information Technology (OIT) for State of Colorado. In her role she was accountable for designing and implementing a risk and compliance program that met business, statutory and regulatory requirement for all the customers. She played a major role in creation and implementation of cyber security strategic plan for State of Colorado called "Secure Colorado" which is widely recognized. Prior to OIT, she worked for Office of State auditor and Deloitte.

    Throughout her career she has helped plan, build and run security governance and compliance programs and has helped organizations achieve their audit and compliance objectives. She has an M.B.A from the University of Texas at Dallas and M.Sc. (tech) from Birla Institute of Technology and Science, India. She also has a CISA and CRISC certification.

  • speaker photo
    Julie Chickillo
    Director of Information Security and Compliance, IQNavigator

    Julie is an information security professional with over 15 years of experience in Information Security Governance, Risk and Compliance, IT Audit and Legal. Julie is currently responsible for developing and executing on the IQN information security strategy and compliance assurance program. IQNavigator is the leading independent technology provider of vendor management system (VMS) software for Global 2000 companies. IQN's cloud-based software enables enterprises to intelligently manage and optimize complex contingent workforce programs.

  • speaker photo
    Trevor Hawthorn
    CTO, Wombat Security Technologies

    Trevor joined the Wombat team in October 2015 with the acquisition of ThreatSim , where he was co-founder and CTO. Trevor has a technical and hands-on background, with over eighteen years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the FBI NIPC classes at Quantico, VA, he has held positions at Earthlink, UUNET, and Cybertrust.

  • speaker photo
    Jerry Skurla
    VP Marketing, Advanced Threat, Arbor Networks
  • speaker photo
    Mike Kachline
    Director of Operations, Peaksware

    With over fifteen years across large to small companies, Mike has written and maintained software using multiple languages. In addition to software development, Mike has managed both IT and customer service groups, as well as holding a key role in bringing multiple Point-of-Sale platforms to PA-DSS compliance.

  • speaker photo
    Shay Zandani
    CEO and Founder, Cytegic
  • speaker photo
    Chen Heffer
    Chief Security Officer, Douglas County Colorado
  • speaker photo
    Alex Kreilein
    CTO, SecureSet
secure world app
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store