googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 5, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    8:00 am
    Executive Advisory Council Breakfast: (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    8:00 am
    SecureWorld Plus - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    Arbor Networks: Is Your Organization Prepared to Stop The Modern Day DDoS Attack?
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Product Marketing, Arbor Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    Gaining Executive Support through Governance, Risk & Compliance
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Cybersecurity & Compliance, Focus on the Family
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 210
    8:30 am
    Recovery From a Targeted Cyber-Attack: Ransomware
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Research Director, Security and Risk Management
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 212
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Cyber Intelligence Exchange: It’s Difficult, Possible, and Absolutely Necessary
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CEO & Co-Founder, TruSTAR Technology
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable: (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Colorado's Multi-Agency Incident Response to Cybersecurity
    • session level icon
    • session level icon
    speaker photo
    Director CIAS, Regis University
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    11:15 am - 12:00 pm
    Location / Room: 208
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 212
    11:15 am
    Venafi: Protecting the Foundation of Security
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Product Marketing, Venafi
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 210
    12:00 pm
    Advisory Council Roundtable: (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Radware - The Current Economics of Cyber Attacks
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: After the Hack
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 am
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Embracing Risk
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: 501
    1:15 pm
    WTF* Convergence of IT/CT/OT (*What the Fusion)
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Founder & CEO, Cybersecurity Risk Management Consulting
    speaker photo
    Consultant, Advisory Services, Ernst & Young
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 am
    3:00 pm
    InfraGard: How Companies Can Work With Federal Law Enforcement When Responding to Cybersecurity Incidents
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief of Special Prosecutions Section and Assistant US Attorney, United States Attorney’s Office, District of Colorado
    speaker photo
    Computer Hacking and Intellectual Property (CHIP) Coordinator, and Assistant United States Attorney, U.s. Attorney’s Office, District of Colorado
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 304
    3:00 pm
    Know What You Don't Know - Balance Between IT Spending and Risk Transfer
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    SVP, Head of Specialty Products E&O, Zurich
    speaker photo
    Senior Vice President, Cyber / E&O Practice
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    SecureWorld Plus - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 am
    Location / Room: 503
    3:00 pm
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: 502
  • Thursday, October 6, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    8:00 am
    SecureWorld Plus - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: 503
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    Data Breach Digest - Scenarios from the Field
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Cybersecurity Technologist, CISO, and Threat Intelligence Professional
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 212
    8:30 am
    ISACA: Preventing Credential Theft in the Enterprise
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 304
    8:30 am
    Prevention: Holy Grail or Pipe Dream?
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Architect, Sungard Availability Services
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 210
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private Partnership
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable: Measuring the Effectiveness of Your Security Program - VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: 206
    11:15 am
    "Some Women Fear the Fire. Some Women Simply Become it." R.H. Sin
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    IT Security Manager, Department of Information Technology, Weld County
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 208
    11:15 am
    ISACA: How To Build a Third Party Risk Management Program (TPRM) That Works?
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, ISACA Board
    speaker photo
    Director of Information Security and Compliance, IQNavigator
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 304
    11:15 am
    Wombat Security Technologies: The Top 8 Security Risks Beyond the Phish
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CTO, Wombat Security Technologies
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 212
    12:00 pm
    Advisory Council Roundtable Lunch: Manage the Damage - Lunch Served VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: 206
    12:15 pm
    LUNCH KEYNOTE: Arbor Networks -The Human Factor in the Age of Cyber Conflict
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    VP Marketing, Advanced Threat, Arbor Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: 501
    1:15 pm
    Panel: Locking Down the Endpoints
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 am
    Location / Room: Keynote Theater
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    An Overview of Popular Application Authentication Frameworks
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Operations, Peaksware
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 208
    3:00 pm
    How Douglas County Plans to Keep Secure Before, During and After the Election?
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CEO and Founder, Cytegic
    speaker photo
    Chief Security Officer, Douglas County Colorado
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 212
    3:00 pm
    The Next Generation of Emergency Ph0nage
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CTO, SecureSet
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 210
Exhibitors
  • ACP
    Booth: TBD

    ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for ACPits members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the “profession”). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.

    Founded in 1983, we are an established community of industry experts, educators, practitioners, leaders, facilitators and advocates. Our members view us as connectors and as a vital networking source.

  • Apricorn
    Booth: 130

    Founded in 1983, Apricorn designs, manufactures, and supports storage innovations with your data’s security as our top priority. Our unique, patented approach is centered on being 100% hardware-encrypted, software-free, and cross-platform compatible. Trusted by numerous state, national, and international governments, as well as small and large corporations alike, Apricorn delivers advanced data security innovations designed to address today’s threats, as well as tomorrow’s.

  • NETSCOUT Arbor
    Booth: 218

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • Binary Defense
    Booth: 344

    Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.

  • BitSight
    Booth: 118

    BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. For more information, please visit www.bitsight.com, read our blog, or follow @BitSight on X.

  • Carbon Black
    Booth: 141

    Carbon Black is Transforming Security Through Big Data and Analytics in the Cloud Growing trends in mobility and cloud have made the endpoint the new perimeter. New and emerging attacks are beating traditional defenses, and security teams are too reactive and held back by their technologies. Carbon Black is leveraging the power of big data and analytics to solve the challenges surrounding endpoint security. With the Cb Predictive Security Cloud platform, we are transforming cybersecurity to deliver a new generation of cloud-delivered security solutions designed to protect against the most advanced threats.

     

  • Centrify
    Booth: 147

    Centrify provides unified identity management across data center, cloud and mobile environments. Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

  • Cloud Security Alliance (CSA)
    Booth: TBD

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Colorado Technology Association
    Booth: TBD

    The Colorado Technology Association leads the network of companies and professionals fueling Colorado’s economy, through technology.

    At the Colorado Technology Association, we:

    – Lead an inclusive network that benefits our member community
    – Advocate for a pro-business and technology-friendly climate
    – Influence the development of a robust talent pipeline
    – Lead initiatives to help companies grow.

  • Cyphort
    Booth: 203

    Cyphort is the next generation APT defense solution for the enterprise. Cyphort provides a single pane of glass across perimeter and laterally moving threats, correlates threat signals before and after an incident while eliminating noise from false alerts and red herrings.

  • Cytegic
    Booth: 124

    Cytegic offers a complete automatic, continuous solution of cybersecurity management and decision support system that enables executives, risk and security experts to monitor, measure and manage cybersecurity risk and defense posture. Cytegic’s technology identifies relevant attackers, attack methods and computes the threat landscape to deliver a proactive response of mitigation plan and action items to protect mission critical infrastructure and business assets. Cytegic end-to-end solution includes friendly dashboards, powerful quantified defense monitoring and threat intelligence. Cytegic’s solution effectively and efficiently manages your cybersecurity operations to ensure that executives and security experts alike have complete visibility into the security controls and threats within and beyond their perimeter.

  • Electronic Crimes Task Force
    Booth: TBD

    The role of the U.S. Secret Service has gradually evolved since the agency’s 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation’s financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service’s mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals – all of whom recognize new opportunities to expand and diversify their criminal portfolio.

  • Electronic Frontier Foundation
    Booth: TBD

    The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows.

  • Fidelis Cybersecurity
    Booth: 115

    Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy.

    By integrating bi-directional network traffic analysis across your cloud and internal networks with email, web, endpoint detection and response, and automated deception technology, the Fidelis Elevate platform captures rich metadata and content that enables real-time and retrospective analysis, giving security teams the platform to effectively hunt for threats in their environment. Fidelis solutions are delivered as standalone products, an integrated platform, or as a 24×7 Managed Detection and Response service that augments existing security operations and incident response capabilities. Fidelis is trusted by Global 1000s and Governments as their last line of defense. Get in the hunt. For more information go to www.fidelissecurity.com.

  • Forcepoint
    Booth: 339

    Forcepoint is transforming cybersecurity by focusing on what matters most: people’s behavior as they interact with critical data and systems. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform, protecting the human point for thousands of enterprise and government customers. Our solutions include Cloud Security, Network Security, Data & Insider Threat Security.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • Intersect Alliance
    Booth: 327
  • ISACA
    Booth: TBD

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • International Information Systems Security Certification Consortium, Inc., (ISC)²®
    Booth: TBD

    Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

  • ISSA Colorado Springs Chapter
    Booth: TBD

    ISSA Colorado Springs Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • ISSA Denver Chapter
    Booth: TBD

    ISSA Denver Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • Malwarebytes
    Booth: 133

    Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations, simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives. Visit us at www.malwarebytes.com/business.

  • NETSCOUT
    Booth: 109

    NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.

  • OpenDNS
    Booth: 347

    OpenDNS is the world’s largest Internet-wide security network, protecting two percent of the Internet’s active users every day. The cloud-based OpenDNS service delivers a secure connection from any device, preventing contact with malware, phishing and botnets regardless of application, protocol or port. OpenDNS is easy to deploy and manage, with no hardware or software to install, no need to reconfigure networks and no new latency.

  • Optiv
    Booth: 212

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • OWASP
    Booth: TBD

    The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

  • Radware
    Booth: 100

    Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.

  • Red Canary
    Booth: 145

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • Rolta AdvizeX
    Booth: 127

    For the past 41 years we have partnered with our customers to “accelerate the adoption of new Information Technologies to create business value.” Our passion for information technology is guided by our vision of: “Customers for Life” Our innovative solutions are designed to meet your individual business needs. Our people bring deep technical expertise and experience to develop a lasting business relationship. Our deep heritage in both Applications and IT Infrastructure are essential elements of our approach to developing new solutions. Today, it is the further integration of Applications and Infrastructure that unleashes the power of Cloud Computing and our Fusion Cloud solutions.

  • Booth: 212
  • Sirius
    Booth: 106

    Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatTrack
    Booth: 139

    ThreatTrack specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by businesses, enterprises and government agencies around the world. ThreatTrack develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats.

  • TrustedSec
    Booth: 344

    TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.

     

  • University of Denver
    Booth: TBD

    The oldest and largest private university in the Rocky Mountain region, DU offers innovative and rigorous undergraduate, graduate and professional programs.

  • Venafi
    Booth: 200

    Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

    With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms;  four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.

    For more information, visit: www.venafi.com.

  • Wombat Security Technologies
    Booth: 127

    Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

  • Zscaler
    Booth: 112

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Tom Bienkowski
    Director, Product Marketing, Arbor Networks

    Tom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he’s a Director of Product Marketing focusing on Arbor’s industry leading DDoS Protection solution.

  • speaker photo
    Rhett Saunders
    Director of Cybersecurity & Compliance, Focus on the Family

    Before coming to Focus on the Family, Rhett served the Federal Reserve, and while there, led regular Enterprise Risk Management discussions between the Federal Reserve and U.S. Treasury with a focus on cybersecurity. He is a former NSA cryptoanalyst and a U.S. Army veteran, having served multiple joint intelligence communities, both foreign and domestic government agencies in international locations.

    Rhett is a public speaker on the topic of privacy and identity theft prevention. He lectures on cybersecurity and cryptography topics at University of Colorado Colorado Springs (UCCS) and Flatiron School. He also serves on the SecureWorld Advisory Council. Rhett earned a Master of Business Administration from LeTourneau University and holds the CISSP credential.

  • speaker photo
    David Monahan
    Research Director, Security and Risk Management

    David has over 20 years of IT security experience and has organized and managed both physical and information security programs, including SOC’s and NOC’s for organizations ranging from Fortune 100 companies and local government to small public and private companies. He has diverse Audit, Compliance, Risk and Privacy experience.

  • speaker photo
    Paul Kurtz
    CEO & Co-Founder, TruSTAR Technology

    Paul Kurtz is an internationally recognized expert on cybersecurity and the current CEO of TruSTAR Technology. Paul began working cyber security issues on the National Security Council at the White House in the late 1990s. He served in senior positions on the White House's National Security and Homeland Security Councils under Presidents Clinton and Bush and advised President Obama on cybersecurity during his transition into office. During his service, Paul was Special Assistant to the President and Senior Director for Critical Infrastructure Protection on the White House’s Homeland Security Council (HSC). He joined the HSC from the National Security Council (NSC) where he was both Senior Director for National Security in the Office of Cyberspace Security and a member of the President’s Critical Infrastructure Protection Board. He served on the NSC as a Director of Counterterrorism from 1999-2001, and helped manage the response to the September 11 terrorist attacks.

    Since leaving government, Paul has held numerous private sector cybersecurity positions and is currently the Co-founder and CEO for TruSTAR Technology. Paul is a regularly sought-after speaker and expert for the media, and served as an on-air consultant for CBS News.

    Paul’s work in counterterrorism has long-influenced his approach to cybersecurity. Specifically, it highlighted the need to improve information sharing and collaboration among those involved in detecting and responding to cyber threats. His remarks will be grounded in the past year’s most critical challenges and what we learned from our response to them, including the cyber attacks on the Ukraine power grid and the onslaught of cyber attacks targeting critical health care facilities.

  • speaker photo
    Daniel M. Likarish
    Director CIAS, Regis University

    Daniel M Likarish is professor Regis University CC&IS and Director of the CIAS. His research interests are in personalized experiential learning. He supports Colorado Cyber Patriot and Cyber Girls. Dan is the academic advocate for ISSA and ISACA. He is on the CISE Board and regional coordinator for the RMCCDC.

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    Gina Osmond
    Product Marketing, Venafi
  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Kelly Fuller
    Founder & CEO, Cybersecurity Risk Management Consulting

    Fuller has broad-based experience as an information security and technology risk management executive, IT audit practice director, and management consultant spanning a variety of industries ranging from banking and insurance to healthcare, energy, and government. Her extensive work in technology risk management, regulatory compliance, IT governance, and aligning controls with COBIT, ITIL, ISO, and NIST standards, as well as her work in business continuity management and cyber security provides a hands-on, innovative approach to difficult tasks. In her various roles, Kelly has proven instrumental in driving strategic initiatives in complex environments through a balance of collaboration and decisive leadership. Fuller earned her Bachelor of Business Administration degree in Computer Information Systems from Oklahoma Panhandle State University in Goodwell, OK, and is currently pursuing a Master’s Degree from SANS Technology Institute.

    Kelly has lived in Denver since 2006 with her three kids and two dogs. She enjoys outdoor adventures, spending time with family and friends and good wine. In keeping with her personal commitment to give back to the community, Kelly has served on the Executive Board for Infragard, IT Committee Member for OWL (Open World Learning Center) and volunteers regularly with organizations close to her heart, such as A Precious Child.

  • speaker photo
    Susan Bond
    Consultant, Advisory Services, Ernst & Young

    As a technical project leader for over 20 years, Susan Bond has delivered solutions across several industries including Energy, Technology, Logistics Real Estate, and Higher Education. Susan was the Technical Lead for the implementation of network, cybersecurity, visualization, SCADA, and analytics infrastructure during construction and transition to operations of the Department of Energy's $100M+ premier energy systems research facility at NREL. Currently, Susan is an Operational Technology (OT) Lead on a large cybersecurity program and the President of InfraGard Denver Members Alliance.

  • speaker photo
    Judy Smith
    Chief of Special Prosecutions Section and Assistant US Attorney, United States Attorney’s Office, District of Colorado
  • speaker photo
    David Tonini
    Computer Hacking and Intellectual Property (CHIP) Coordinator, and Assistant United States Attorney, U.s. Attorney’s Office, District of Colorado
  • speaker photo
    Erica Davis
    SVP, Head of Specialty Products E&O, Zurich

    Erica Davis is Senior Vice President of Specialty Errors & Omissions at Zurich. She has national oversight of the Professional Liability, Security & Privacy and Employed Lawyers lines of business with a specialization and industry thought leadership position in network security and privacy risk transfer solutions.

  • speaker photo
    Florence Levy
    Senior Vice President, Cyber / E&O Practice

    Florence focuses on creating cyber and E&O risk management programs for companies in a wide array of industries. She works with clients to understand their business goals, then assesses and develops programs or alternative risk transfer solutions that match their risk management objectives. Her expertise lies in identifying exposures, program design, contract language, negotiation and claims advocacy to ensure her consultancy reflects her clients’ unique exposures. Florence has spoken at many industrywide events, including RIMS chapter engagements, legal continuing education classes, HB Litigation’s NetDiligence, Advisen and Business Insurance conferences. She has also been interviewed and quoted in a variety of trade publications, including Business Insurance and Property Casualty 360‬° and was selected as one of the Business Insurance 2015 Women to Watch. She was also selected to serve as an Advisory Board member for both Business Insurance’s Cyber Risk summit and Advisen’s Cyber Risk Insights Conference.

    Florence has over fifteen years of experience in the insurance industry as a Cyber and Commercial E&O specialist. Prior to joining JLT, Florence was the Head of the U.S. Global Technology and Privacy Practice for Lockton Companies, as well as the National Practice Leader for Aon’s Professional Risk Solutions Group for two years prior to that. Florence obtained a Bachelor of Arts degree from the University of Michigan in Ann Arbor, a Juris Doctor degree from the University of Denver.

  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Joan Ross
    Cybersecurity Technologist, CISO, and Threat Intelligence Professional

    Joan Ross is a respected industry thought leader who develops advanced security strategies, publishes and speaks on implementing threat intelligence. Joan is a former Chief Security Officer for two technology companies, coming up the security ranks as an encryption engineer and cloud security architect. As an early CISSP holder from back in the 1990’s, she maintains a number security and privacy certifications and earned her Masters of Science degree in design and engineering focusing on incident response with the U.S. Coast Guard.

  • speaker photo
    Greg Sternberg
    Security Architect, Sungard Availability Services

    Greg Sternberg is a Security Architect at Sungard Availability Services, CISO for ISSA, Denver and Affiliate Faculty at Regis University. He works at incorporating security into the SDLC and securing architectures. He has published and blogged on security and architecture topics and presented at SecureWorld, RMISC, ISC(2) and the Open Group Security Conferences. He holds CISSP, CISM and TOGAF certifications, has a Masters in Software Engineering and Management, is a member of ISACA, ISC(2), InfraGard and a board member of the Denver chapter of ISSA.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Jessica Raymond
    IT Security Manager, Department of Information Technology, Weld County

    Jessica Raymond is the IT Security Manager for Weld County Government where she had the opportunity to build the security program from the ground up over the last 5 years. She is responsible for information security in a 360 degree fashion including designing, implementing, and maintaining security infrastructure, compliance and audits, governance, risk management, security awareness, incident response, vulnerability management, threat prevention, budgeting, forecasting, project management, and more.

    Prior to working for Weld County Government, Jessica was a Senior IT Security Analyst for the University of Northern Colorado for 5 years and was part of the IBM Managed Security Services division as a member of the Security Operations Center for 7 years. She worked professionally in the Information Technology field for the past 25 years.

    In addition, Jessica serves on the Product Advisory Board for the MS-ISAC. She holds the CISM, CISSP, and C|CISO certifications.

  • speaker photo
    Manjula Udeshi
    Director, ISACA Board

    Manjula is a seasoned professional with more than 15 years of experience in Governance, Risk and compliance, information technology auditing and business administration. As Director within the Office of CISO at Optiv, she is responsible for designing, building, and executing a robust and business aligned security governance, risk, compliance and threat management program. Optiv is a market-leading provider of end-to-end cyber security solution.

    Before joining Optiv, Manjula was at Governor’s Office of Information Technology (OIT) for State of Colorado. In her role she was accountable for designing and implementing a risk and compliance program that met business, statutory and regulatory requirement for all the customers. She played a major role in creation and implementation of cyber security strategic plan for State of Colorado called "Secure Colorado" which is widely recognized. Prior to OIT, she worked for Office of State auditor and Deloitte.

    Throughout her career she has helped plan, build and run security governance and compliance programs and has helped organizations achieve their audit and compliance objectives. She has an M.B.A from the University of Texas at Dallas and M.Sc. (tech) from Birla Institute of Technology and Science, India. She also has a CISA and CRISC certification.

  • speaker photo
    Julie Chickillo
    Director of Information Security and Compliance, IQNavigator

    Julie is an information security professional with over 15 years of experience in Information Security Governance, Risk and Compliance, IT Audit and Legal. Julie is currently responsible for developing and executing on the IQN information security strategy and compliance assurance program. IQNavigator is the leading independent technology provider of vendor management system (VMS) software for Global 2000 companies. IQN's cloud-based software enables enterprises to intelligently manage and optimize complex contingent workforce programs.

  • speaker photo
    Trevor Hawthorn
    CTO, Wombat Security Technologies

    Trevor joined the Wombat team in October 2015 with the acquisition of ThreatSim , where he was co-founder and CTO. Trevor has a technical and hands-on background, with over eighteen years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the FBI NIPC classes at Quantico, VA, he has held positions at Earthlink, UUNET, and Cybertrust.

  • speaker photo
    Jerry Skurla
    VP Marketing, Advanced Threat, Arbor Networks
  • speaker photo
    Mike Kachline
    Director of Operations, Peaksware

    With over fifteen years across large to small companies, Mike has written and maintained software using multiple languages. In addition to software development, Mike has managed both IT and customer service groups, as well as holding a key role in bringing multiple Point-of-Sale platforms to PA-DSS compliance.

  • speaker photo
    Shay Zandani
    CEO and Founder, Cytegic
  • speaker photo
    Chen Heffer
    Chief Security Officer, Douglas County Colorado
  • speaker photo
    Alex Kreilein
    CTO, SecureSet
secure world app
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes