googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, November 1, 2017
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    Advisory Council Breakfast: (VIP / INVITE ONLY)
    • session level icon
    Coffee / Breakfast Served
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: Windstar A
    8:00 am
    SecureWorld PLUS Part 1 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures Success
    • session level icon
    Earn 16 CPEs With This in-Depth 3-Part Course
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Bristlecone

    Every organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.

    You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.

    Part 1: Information Security Awareness Fundamentals and War Stories
    What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?

    Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
    After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.

    Part 3: Reinventing Your Information Security Awareness Program
    So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing?  Small group discussions, break-out Q/A as well as several successful toolkits are covered.

    8:00 am
    SecureWorld PLUS Part 1 - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    Earn 16 CPEs With This in-Depth 3-Part Course
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Highlands Amphitheater

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating, and validating your security approach. This course is perfect for attendees that are just starting a security program, looking to mature their current program, or just looking to learn more about the Framework.

    8:30 am
    InfraGard Meeting: Light Breakfast and Guest Presentation - Open to all Attendees
    • session level icon
    Presentation: Enhancing DDoS Protection
    speaker photo
    IT Risk and Compliance Manager/SANS Instructor, University of Colorado Denver/SANS Institute
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Mesa Verde B

    Interested in your local associations? Join InfraGard for a chapter meeting, light breakfast and guest presentation. This session is open to all attendees.
    Guest Presentation:
    What is a DDoS attack? What are the most common types of DDoS attacks? How are DDoS attacks executed? How can I minimize the impact of DDoS attacks to my network? What are some newer types of DDoS attacks? What are some new technologies that are being used in the fight against DDoS? If you have been the victim of a DDoS attack or are curious about these questions then this talk is for you.

    8:30 am
    Using Block Chain to Establish Distributed Trust for IOT
    • session level icon
    speaker photo
    CTO, BlockFrame Inc
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Mesa Verde A

    This session will examine some systematic problems which exist within the cyber security industry. We will digest several of these identified systematic problems in the Cyber Security Industry and give a first look at next generation Block-Chain-enabled-solutions which may provide revolutionary solutions to these issues. We will outline the path to solutions for these problem which will enabling a framework to securing the Internet of Things (IOT) worldwide. We will discuss how efforts under way in partnership with the Colorado Springs based National Cybersecurity Center (NCC) may providing the governance support to implement these IOT Security frameworks globally.

    8:30 am
    Making SIEM Useful Again
    • session level icon
    speaker photo
    Chief Cyber Security Officer, Bremer Bank
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Windstar B

    SIEMs haven’t failed us we have failed SIEMs; companies have not invested enough in making them actually functional and vital to their security operations and business. SIEM platforms can also be used way beyond traditional methods moving into automation and log analytics giving value to the entire business.

    9:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:30 am
    OPENING KEYNOTE: The Evolving Role of CISOs and Their Importance to the Business
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    What is a CISO and what do they do? As the leader of cyber defense for an organization, the CISO is rapidly becoming indispensable for an organization’s survival. This presentation is based on interviews with senior level IT professionals at 184 companies in seven countries. The goal of the research is to better understand how CISOs work, what their concerns are, and how they are improving their effectiveness in managing risks to the enterprise.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable - (VIP / Invite Only)
    • session level icon
    Topic: 3rd Party Risk - Creating & Managing a Program that Works
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Windstar A

    This session is for Advisory Council members only.

    11:15 am
    Trend Micro: Security Automation in the Cloud
    • session level icon
    speaker photo
    Principal Engineer, Trend Micro, Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Mesa Verde B

    How do you properly apply security in a Cloud Computing environment without creating complexity. Automation is key. In this session we will discuss the drivers for security automation and how this can be achieved through not only API-based security automation but also through what is normally considered detection controls.

    11:15 am
    Sustaining Your Security Program in an Ever Changing World
    • session level icon
    Balancing Security Risks, Business Needs and Financial Pressures
    speaker photo
    Chief Information Security Officer, Catholic Health Initiatives
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Mesa Verde A

    How does a security organization retain a strong, risk based security posture amid evolving threats? Security teams spend years building strong foundational programs, but are they ever complete? Amid evolving security threats running them operationally and ensuring compliance is just as important as the initial implementation. This will be an interactive discussion on how Security leaders/professionals balance the security risks, business needs and financial pressures that may present themselves. Discussion around how key risk indicators and other factors help communicate the security posture as well as justify the need for additional capabilities/funding.

    11:15 am
    The Impact of Homomorphic Encryption on Machine Learning, Deep Learning, Artificial Intelligence, Natural Language Processing in Healthcare
    • session level icon
    speaker photo
    Professor, St. John's University, Distinguished Engineer, United Healthcare Group / Optum
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Mesa Verde C

    Homomorphic encryption is a bleeding edge cryptographic technology to secure query and search capabilities in machine learning, deep learning and artificial intelligence/natural language processing. This advanced session shall explore the architecture and application of this technology. A focus will include a current US patent providing a risk management architecture and assessment methodology to protect applications with sensitive data in cloud environments. We will briefly examine this technologies impact on health care, financial services and the insurance verticals.

    12:00 pm
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Windstar A
    12:15 pm
    LUNCH KEYNOTE: Business Email Compromise
    • session level icon
    speaker photo
    Assistant to the Special Agent in Charge, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    Hacking has changed. You no longer need to be a hacker to target a system or deploy malware. With little or no experience, you can learn on the Internet how to obtain malware, embed it in a document, and send it to thousands of people. What are the current trends in business email compromise schemes and what can you do.

    1:15 pm
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Highlands Amphitheater
    1:15 pm
    Panel: Hazards on the Horizon - Emerging Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    Just as in the days of yore, you must have watch guards in the tower scanning the horizon for enemy banners. If you follow cyber threats, then you know that the landscape is constantly changing. From the bring your own device (BYOD) workplace to mobile-malware, social engineering, and everything in between, information security has transformed. In order stay ahead of the ever-changing threats, it is imperative to constantly improve and change security policies. Join industry experts as they discuss the importance of rolling with the changes, and how your company can stop the threat before it gets to the castle gate.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    3:00 pm
    What Happens When You Can’t Stop the Attack?
    • session level icon
    A model response and recovery framework
    speaker photo
    Director, Colorado Division of Homeland Security and Emergency Management
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Mesa Verde A

    Cybersecurity threats continue to damage critical infrastructure and are costly to remediate. If you can’t prevent a disaster from happening, be ready to respond and recover when it does. When preventative plans fail, how will you respond? In this session, we will look at a framework for response.

    3:00 pm
    GDPR Compliance – 10 Key Takeaways for Businesses
    • session level icon
    speaker photo
    Shareholder and Head of Cybersecurity, Privacy & Technology Transactions Practice and Adjunct Professor of Law
    speaker photo
    Associate in Cybersecurity, Privacy and Technology Transactions Practice
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Windstar B

    Companies that do not maintain a physical presence in the EU may still face liability under the new EU General Data Protection Regulation which becomes effective on May 25, 2018. This presentation will provide attendees with a high level overview of significant provisions and compliance requirements.

    3:00 pm
    Internet of Bio-Nano Things: Using the In Vivo Biochemical & Connecting to the Electrical of the Human Internet
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Mesa Verde C

    The Internet of Things has become a topic of concern over the past few years: the interconnection of devices have brought to life the Internet in a manner seldom conceived in science and is looking to broaden its expansive nature. Enter nano-robotics with an extension of IoT called the Internet of Bio-NanoRobotic Things: linking human physiology and human vulnerability to the internet. How do we secure what we do not understand?

    3:00 pm
    SecureWorld PLUS Part 2 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures Success
    • session level icon
    SecureWorld PLUS Registrants ONLY
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: Bristlecone

    Every organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.

    You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.

    Part 1: Information Security Awareness Fundamentals and War Stories
    What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?

    Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
    After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.

    Part 3: Reinventing Your Information Security Awareness Program
    So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing?  Small group discussions, break-out Q/A as well as several successful toolkits are covered.

    3:00 pm
    SecureWorld PLUS Part 2 - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    SecureWorld PLUS Registrants ONLY
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: Highlands Amphitheater

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating, and validating your security approach. This course is perfect for attendees that are just starting a security program, looking to mature their current program, or just looking to learn more about the Framework.

    4:00 pm
    Happy Hour Reception
    • session level icon
    Join OverWatchID for Open Bar
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 6:30 pm
    Location / Room: Root25 Taphouse & Kitchen - Hyatt Regency DTC

    OverWatchID is pleased to invite you to an exclusive open bar happy hour at SecureWorld for all identity security professionals. Relax after the conference over a craft beer, signature cocktail or glass of wine with your peers.
    RSVP Here: http://bit.ly/2xr4uFn

  • Thursday, November 2, 2017
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    SecureWorld PLUS Part 3 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures Success
    • session level icon
    SecureWorld PLUS Registrants ONLY
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Bristlecone

    Every organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.

    You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.

    Part 1: Information Security Awareness Fundamentals and War Stories
    What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?

    Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
    After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.

    Part 3: Reinventing Your Information Security Awareness Program
    So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing?  Small group discussions, break-out Q/A as well as several successful toolkits are covered.

    8:00 am
    SecureWorld PLUS Part 3 - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    SecureWorld PLUS Registrants ONLY
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Highlands Amphitheater

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating, and validating your security approach. This course is perfect for attendees that are just starting a security program, looking to mature their current program, or just looking to learn more about the Framework.

    8:30 am
    Privacy Considerations for the Information Security Professional
    • session level icon
    speaker photo
    Security GRC Manager, Rightway Healthcare
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Windstar B

    Privacy can be a confusing topic, particularly in the U.S. From his experience building a federally compliant privacy program, Michael will cover basic components of a privacy program, opportunities to incorporate privacy into existing security work, and practical examples of privacy tools. Challenges you may encounter will also be discussed.

    8:30 am
    The A-Z of Phishing -Defining Phishing and Actions to Take Against It
    • session level icon
    speaker photo
    Director of Security Architecture and Engineering, Instructor, OWASP Board Member, Red Rocks Community College
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Mesa Verde C

    In this presentation we will start with the basics of phishing, defining the types to how to identify them, techniques to validate the phishing and incident responses.

    8:30 am
    WannaCry All Night Long: Cybersecurity Legal Issues 2017
    • session level icon
    speaker photo
    Attorney, Hall, Render, Killian, Heath & Lyman
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Mesa Verde A

    Emerging threats result in changing legal issues and evolving legal obligations and liabilities. This
    session will look at the legal implications of cybersecurity trends.

    9:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:30 am
    LUNCH KEYNOTE: Cybersecurity 2.0 - Controls, Governance, and Business Reimagined
    • session level icon
    speaker photo
    Founder & CEO, BlackCloak
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    Our backs are up against a wall of never ending breaches, blame, and ineffective controls. Hear from not only a thought leader, but someone with operation experience as a CISO, General Counsel, and Chief Privacy Officer today as we will discuss new controls, how to lead and govern along side the Board, and how to enable business through better cybersecurity.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Windstar A
    11:15 am
    Maturity in Third-Party Risk Management
    • session level icon
    speaker photo
    CISO, Denver Health
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Windstar B

    We all manage IT risk with our vendors, but this process is often immature. As we continually outsource to external parties, we must evolve to ensure we are protecting our organization from those often unseen, critical risks. This presentation will help us understand how to take Third-Party Risk Management to the next level.

    11:15 am
    Panel: Women in Security
    • session level icon
    speaker photo
    VP, Network Security Operations, Charter Communications
    speaker photo
    IT Security and Compliance Manager, Antero Resources
    speaker photo
    Chief Information Security Officer, Catholic Health Initiatives
    speaker photo
    CISO, Polycom
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Highlands Amphitheater

    Diversity in teams has been proven to produce better results. In the Information Security field only 11% of these positions are filled with women. Women bring a unique skill set to the industry and we need to continue to increase the number in the Information Security field.

    During the “Women In Security” panel, you will hear from women who have been successful in navigating a career in Information Security. These executives will speak about how they got into the field, how they were able to break through the glass firewall and what they are doing to promote getting more women into security.

    11:15 am
    Darktrace: The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
    • session level icon
    speaker photo
    Account Executive, Darktrace
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Mesa Verde A

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.

    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

    Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.

    11:15 am
    Tackle IT Governance and Quality to Dramatically Improve Security – a Case Study From AT&T Wireless
    • session level icon
    speaker photo
    CEO & Founder, W Risk Group LLC
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Mesa Verde C

    In 2003, an epic software failure led to the sale of AT&T Wireless.  What followed was an incredible lesson in how governance and internal control focus on IT systems dramatically improved cybersecurity.

    12:00 pm
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Windstar A
    12:15 pm
    LUNCH KEYNOTE: The Legal Case for Cybersecurity
    • session level icon
    speaker photo
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    Shawn Tuma will explain why cybersecurity is a legal issue and overall business risk issue that companies must manage. He will address why federal, state, and international law (including the GDPR and NY Cyber Regs) requires companies to have a cyber risk management program and key components to include.

    1:15 pm
    Panel: Extortion as-a-Service? - Ransomware and Beyond
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    Remember when ransomware just seized up your computer and wanted you to send Bitcoin to unlock it? With the advances in cybercrime, the thieves are not only locking and encrypting your files, but they are also finding your dirty little secrets. You may not pay for the run of the mill files you have backed up, but you might be more inclined to pay even more to make sure no one finds out about you and a certain someone in accounting you are messaging. Or, what about all the credit card numbers you aren’t storing correctly? It would be a shame if your boss knew you were sending out resumes… Will these attacks also be available for purchase on the dark web?Join the discussion with our experts and come up with a plan to mitigate this problem.
    Panelists:
    Scott Giordano, Spirion
    Eric Wong, Comodo
    Christian Espinosa, Alpine Security
    Clint Harris, Cisco
    Moderator: Sam Masiello

    1:15 pm
    It's Time for IoT to Grow Up!
    • session level icon
    How to balance the scales between convenience and security with IoT devices.
    speaker photo
    Adjunct Professor of Computer Foresnics and Ethical Hacking, University of Denver
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: Highlands Amphitheater

    IoT devices are hacked and added to malicious botnets every day. Since much of the IoT industry began with disconnected devices, IoT developers and owners were not aware of the care needed to prevent attacks. This presentation will address the challenges and architectures that balance the convenience and security of IoT.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibitor Floor

    Be sure to have exhibitors scan your badge for a chance to win prizes. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win

    3:00 pm
    Two Companies Walk Into a Bar… Cyber Risk for the C-Suite
    • session level icon
    speaker photo
    Principal Cybersecurity Engineer (The MITRE Corporation), CEO (Synthus, Inc.), The MITRE Corporation
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Mesa Verde A

    It’s become a truism among cybersecurity professionals that there are two types of companies: those that have been hacked and those that will be. If cyber incidents are inevitable, what can organizations do to pro-actively minimize the impact on their operations? This session addresses considerations for organizations addressing cyber-risk at the strategic level.

    3:00 pm
    Rationalizing Irrational (Unsecure) Behavior
    • session level icon
    speaker photo
    CISO | Executive Advisor, EVOTEK
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Windstar B

    Every day, our user communities are faced with secure and unsecure choices, and every day security practitioners struggle to understand why users make poor choices despite frequent security training. Understanding the science behind those choices has furthered our ability to predict future (potentially unsecure) behavior.

    3:00 pm
    Turning Horses Into Unicorns
    • session level icon
    The jobs gap is real, but expectations for hiring new talent is unrealistic.
    speaker photo
    Cybersecurity Writer, Cybersecurity Ventures
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Mesa Verde B

    Finding the talent you need to fill the jobs gap is easier than you think. The solution is as easy as managing expectations. Instead of looking for unicorns, look around you at all the skilled horses that can be trained to be your next unicorn.

Exhibitors
  • Absio
    Booth: 650

    Absio’s software-defined, Serverless Encryption™ technology is an easy-to-implement, cross-platform encryption solution that protects any form of data throughout its life cycle—from creation to deletion, everywhere it exists—without requiring organizations to manage keys or certificates, add hardware, or rely on a third-party service. Developers implement Absio technology through multi-language software development kits. No cryptography experience is necessary. A simple API enables developers to integrate powerful data security features into new and legacy rich-client, mobile, IoT, cloud-native, server and client-side web applications with a few lines of code.

  • ACP
    Booth: TBD

    ACP is the premier organization for business continuity professionals providing a powerful networking and learning environment for ACPits members. Known for its progressive programs, workshops and symposiums, the organization has become a unifying force in defining and leading the continuously evolving fields of business continuity, disaster recovery, and emergency response (the “profession”). The Organization is strategically aligned with business partners such as DRI International, and BC Management, as well as our corporate sponsors. With a strong presence in North America, ACP has 42 chapters and over 2,300 members. We welcome all individuals, regardless of experience or certification, with an interest in the Profession.

    Founded in 1983, we are an established community of industry experts, educators, practitioners, leaders, facilitators and advocates. Our members view us as connectors and as a vital networking source.

  • NETSCOUT Arbor
    Booth: 302

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • Bay Pay Forum
    Booth: TBD

    The BayPay Forum, a Silicon Valley-based international network composed of over 14,000 payment and commerce executives, entrepreneurs and investors from thousands of different companies, serves as a forum to connect members in identifying and understanding the emerging trends and innovations in the industry.

  • Binary Defense
    Booth: 222

    Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.

  • Bitdefender
    Booth: 405

    Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.

    From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.

  • CIOReview
    Booth: TBD

    CIOReview is a technology magazine that talks about the enterprise solutions that can redefine the business goals of enterprises tomorrow. It is the leading source that shares innovative enterprise solutions developed by established solutions providers, upcoming hot enterprises and is a neutral source for technology decision makers. Published from Fremont, California, CIOReview is an excellent platform for the enterprise to showcase their innovative solutions.

  • Cloud Security Alliance (CSA)
    Booth: TBD

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Colorado ECTF
    Booth: TBD

    As a result of the amalgamation of advanced technology and the Internet, both the quantity and sophistication of cybercrimes targeting U.S. financial institutions and critical infrastructure have increased. Today, criminal trends show an increased use of phishing emails, account takeovers, malicious software, hacking attacks and network intrusions resulting in significant data breaches. To protect the nation’s financial infrastructure from cyber and financial criminals, the Secret Service has adopted a multi-pronged approach.

  • Colorado Technology Association
    Booth: TBD

    The Colorado Technology Association leads the network of companies and professionals fueling Colorado’s economy, through technology.

    At the Colorado Technology Association, we:

    – Lead an inclusive network that benefits our member community
    – Advocate for a pro-business and technology-friendly climate
    – Influence the development of a robust talent pipeline
    – Lead initiatives to help companies grow.

  • Darktrace
    Booth: 300

    Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,500 organizations to protect against threats to the cloud, email, IoT, networks, and industrial systems.

    The company has over 1,200 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • ExtraHop
    Booth: 305

    ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com

  • FireMon
    Booth: 416

    FireMon is the only agile network security policy platform for hybrid cloud enterprises. FireMon delivers persistent network security for multi-cloud environments through a powerful fusion of real-time asset visibility, compliance and automation. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world. For more information, visit www.firemon.com.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA Denver Chapter
    Booth: TBD

    The Denver Chapter of ISACA® (formerly EDPAA) was founded in June 1976 with just a handful of members. Today, the Denver chapter with over 1,040 members, is one of the largest chapters within the Southwestern Region. The Denver Chapter contributes to the international organization with financial support and periodic hosting of the International Conference.

    The Denver Chapter of ISACA® is a non-profit organization dedicated to the continued development and enhancement of the information systems audit and control profession by providing benefits to its members and to the professional community-at-large.

  • ISC2
    Booth: TBD

    ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, ISC2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation, The Center for Cyber Safety and Education™.

  • ISSA Colorado Springs Chapter
    Booth: TBD

    ISSA Colorado Springs Chapter: Developing and Connecting Cybersecurity Leaders Globally. ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • Ixia, a Keysight Business
    Booth: 221

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • Juniper
    Booth: 109

    Our customers don’t set out to build networks. They build on ideas that reinvent, reimagine, and improve the world around them. It makes sense that we should begin there, too.

    Through our passion for creating high-performing networks, Juniper extends knowledge, collaboration, and human advancement in industries around the world—such as energy, healthcare, education, and many others.

    While our innovative product and services portfolio evolves continuously, we need to reach farther to secure our customers’ long-term success. We’re looking beyond the horizons of today’s business challenges, and the technology future we see is built on real-time service integration. That means everything we develop must align with our vision.

  • Kaspersky
    Booth: 102

    We’re an independent global cybersecurity company that empowers people to make the most of technology and the endless opportunities it brings. Backed by our deep threat intelligence, security and training expertise, we give businesses the power to stay safe—and the confidence to accelerate their own success. With insights gained from our unique international reach, we secure consumers, governments and more than 270,000 organizations. We’re proud to be the world’s most tested and awarded cybersecurity, and we look forward to keeping your business safe. Bring on the future.

  • OneWorld InfoTech
    Booth: 421

    OneWorld InfoTech provides advanced cyber security solutions and services that help clients define cyber security strategy, identify and remediate threats and risks, and achieve operational readiness to reduce the risk of targeted attacks and breaches.

    Our diverse management and advisory team draws upon experience gained globally in working with the world leading software and telecommunication giants as well as military communities.

  • OverWatch.ID
    Booth: 550

    Globalization, a remote user work force, and partner collaboration requirements have opened up immense threat vectors for bad actors and hackers to attack your company. Privileged users are an obvious point of attack and their identity and credentials are under constant threat. There are multiple point solutions in the market — PAM, IAM, CASB, MFA — each solves certain threat points but there is nothing in the market today providing a holistic all-in-one solution. Until now. OverWatchID is a cybersecurity company that solves identity-defined security issues with a complete and cost-effective software solution that’s fast to deploy and easy to manage.

  • OWASP Denver
    Booth: TBD
  • Ping Identity
    Booth: 340

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

  • Proofpoint
    Booth: 321

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Qualys, Inc.
    Booth: 200

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.

  • Rapid7
    Booth: 121

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Red Canary
    Booth: 240

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • Red Sky Solutions
    Booth: 418

    Red Sky Solutions is a next-generation cybersecurity company, providing security services and solutions across the entire IT stack. With a strong culture of research and development, Red Sky delivers rich cybersecurity services, managed services and integrated solutions. This is achieved by complete alignment of our three core groups; Applied Research, Red Sky Labs, and Engineering. Red Sky’s cybersecurity risk management practice binds these groups into a unified, holistic, cybersecurity company. As part of our R&D culture, Red Sky has developed and hosts the Mountain Regions largest cybersecurity conference. It features renowned security speakers, expert education, emerging technology reviews, and peer interactions across all industries.

  • Rook
    Booth: 431

    Rook Security provides 24/7 Managed Detection and Response to prevent incidents from impacting business operations. We unite the brightest minds in digital defense with the most advanced, rapid-to-deploy technology to protect your organization. As a managed service, there is no need to worry about configuring, monitoring, or managing technology – our team does the hard part for you.

  • RSA a Dell Technologies Company
    Booth: 100

    RSA Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions.  With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change.

  • SANS Institute
    Booth: 450

    The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world. A range of individuals from auditors and network administrators, to chief information security officers are sharing the lessons they learn and are jointly finding solutions to the challenges they face. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community.

    SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet’s early warning system – the Internet Storm Center.

  • Swimlane
    Booth: TBD

    Swimlane is at the forefront of the security orchestration, automation and response (SOAR) solution market and was founded to deliver scalable security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages.

  • Synopsys
    Booth: 333

    Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Trend Micro
    Booth: 105

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • TrustedSec
    Booth: 222

    TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.

     

  • Vade Secure
    Booth: 421

    Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 400 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.

    At Vade Secure, we also consider that the messaging system should be easy and convenient to use. After elimination all threats, we eliminate the nuisance of low priority emails with the Graymail Management. Ads, social networks notification and newsletters are automatically sent to the graymail folder while the Safe Unsubscribe button eliminate them forever. Users have now a clutter free inbox for more productivity.

  • VirtualArmour
    Booth: 109

    VirtualArmour is an international cybersecurity and Managed Services provider that delivers customized solutions to help businesses build, monitor, maintain and secure their networks.

    The Company maintains 24/7 client monitoring and service management with specialist teams located in its US and UK-based security operation centers (“SOC”). Through partnerships with best-in-class technology providers, VirtualArmour delivers only leading hardware and software solutions for customers that are both sophisticated and scalable, and backed by industry-leading customer service and experience. VirtualArmour’s proprietary CloudCastr client portal and prevention platform provides clients with unparalleled access to real-time reporting on threat levels, breach prevention and overall network security.

    VirtualArmour services a wide range of clients – which include those listed on the Fortune 500 – within several industry sectors, in over 30 countries, across five continents. Further information about the Company is available under its profile on the SEDAR website, www.sedar.com, on the CSE website, www.thecse.com, and on its website www.virtualarmour.com

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Doc Blackburn
    IT Risk and Compliance Manager/SANS Instructor, University of Colorado Denver/SANS Institute

    Doc Blackburn has over 30 years of experience in system and software design, server and network administration, and programming. Doc ran a successful consulting firm until he found his passion was in cybersecurity. He has vast experience at various levels of information technology from technical support to security leadership roles.

  • speaker photo
    Christopher Gorog
    CTO, BlockFrame Inc

    Christopher Gorog, CTO of BlockFrame Inc., Lead Faculty for Cyber Security at Colorado Technical University, and the host of the New Cyber Frontier Podcast, He is a published author, is an advisors to the Cyber Institute of the National Cybersecurity Center, and member of the BODs for Cyber Resilience Institute.

  • speaker photo
    Jeremiah Cruit
    Chief Cyber Security Officer, Bremer Bank

    Jeremiah Cruit has been working in security for the past 20 plus years coving all aspects of security including penetration testing, incident response, infrastructure security and security management. Currently working as Chief Cyber Security Officer at Bremer Bank where he manages the teams that run all aspects of IT security.

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Jim Montgomery
    Principal Engineer, Trend Micro, Inc.

    Jim Montgomery has been securing Enterprise infrastructure for over 25 years. Jim has worked in all facets of the IT industry and holds several OS and security related certifications. Jim has spoken at numerous events across the country including, VMUG, ISSA, RMSIC and ISACA. As a Sales Engineer for Trend Micro, He currently assists Enterprise customers by determining application of technologies to resolve complex security and compliance challenges.

  • speaker photo
    Sheryl Rose
    Chief Information Security Officer, Catholic Health Initiatives

    Sheryl Rose, an experienced IT security and audit professional, has been Chief Information Security Officer since 2010 at Catholic Health Initiatives, a nonprofit, faith-based health system that is the nation's third largest, comprised of 103 hospitals and a variety of other health-based facilities spanning the inpatient and outpatient continuum of care in 17 states. She has worked in the audit and security fields for more than 20 years, gaining most of her experience in the financial services sector. Before coming to CHI, she spent 12 years at First Data as the Vice President of Global Security Operations. She has also worked at Wells Fargo and Price Waterhouse Coopers. Sheryl earned a master's degree in computer information systems from Regis University and an undergraduate degree in accounting. She holds several professional certifications: CISA (certified information systems auditor), CISM (certified information security manager), and CRISC (certified in risk and information systems control).

  • speaker photo
    Phil Lerner
    Professor, St. John's University, Distinguished Engineer, United Healthcare Group / Optum

    Phil Lerner has been a professor at St. John’s University for the past 10 years. He is the first Distinguished Engineer at United Healthcare Group. He has 26 years of progressive cyber, network and systems security experience in vast enterprises as a customer side senior technology leader. Phil provides consultative guidance and programmatic advisory services to this Fortune 6 company and higher education institution on critical programs that contain highly sensitive data requiring advanced technology protections. Phil is still heavily credentialed and working through a PhD in quantum cryptography.

  • speaker photo
    Ike Barnes
    Assistant to the Special Agent in Charge, U.S. Secret Service

    Assistant to the Special Agent in Charge (ATSAIC) Ike Barnes is a graduate of the United States Military Academy at West Point. After serving in the US Army, ATSAIC Barnes became a Special Agent with the Secret Service in 2000 and was assigned to the New York Field Office. While there, ATSAIC Barnes was a member of the New York Electronic Crimes Task Force and other criminal investigative squads. After his assignment to the New York Field Office, ATSAIC Barnes was assigned to the Presidential Protective Division. After the Presidential Protective Division, ATSAIC Barnes was assigned to Secret Service Headquarters. ATSAIC Barnes is currently assigned to the Denver Field Office and is in charge of the Colorado Electronic Crimes Task Force.

  • speaker photo
    Kevin R. Klein
    Director, Colorado Division of Homeland Security and Emergency Management

    Kevin R. Klein is the Director of the Colorado Division of Homeland Security and Emergency Management, and Governor Hickenlooper’s Homeland Security Advisor. Kevin has been involved in public safety for over 30 years, and is well versed in the homeland security and emergency management issues facing the nation.

  • speaker photo
    Tracy Lechner
    Shareholder and Head of Cybersecurity, Privacy & Technology Transactions Practice and Adjunct Professor of Law

    Tracy L. Lechner leads Brownstein’s Cybersecurity and Technology Transactions, Licensing, Advanced Media and Privacy practice groups. With more than a decade of in-house experience in the media industry, Tracy has a unique, inside understanding of the complexities that organizations face in monetizing their data and protecting their assets. She has provided strategic legal advice across corporate sales, marketing, real estate, finance, digital, information technology and human resources departments. At Brownstein, Tracy assists clients with technology and media-related transactions, advising on a broad range of matters, including privacy, data security, online behavioral marketing, children's privacy, geolocation privacy and mobile marketing. She also provides clients with strategic legal advice in connection with developing and implementing data monetization strategies, privacy and data security policies, information security policies and acceptable use policies. She also assists clients with developing and activating incident response plans and responding to data security breach incidents.

    Prior to Brownstein, Tracy served as chief privacy officer, vice president and assistant general counsel for Outfront Media, Inc. where she interfaced with business teams, senior management and internal and external counsel to identify and mitigate risk, ensure awareness of “best practices” on data privacy and data security issues and to develop strategic plans for the collection, use and sharing of information in a manner that maximized value while complying with applicable privacy policies, industry self-regulatory guidelines and legal obligations. Prior to joining Outfront Media, Tracy worked as a consultant for 24/7 Real Media, Inc., a WPP company, where she provided guidance and support to various internal departments in connection with the company's online advertising, privacy and data collection practices. There, Tracy was actively involved in industry self-regulation efforts through the NAI, IAB and DAA, including implementation of the industry icon and enhanced consumer notice. Tracy also previously served in positions as associate general counsel and director of business development for Titan Outdoor LLC (n/k/a Intersection Media LLC); and as staff attorney for Contract Services in the Office of the Mayor (Michael Bloomberg administration), City of New York.

  • speaker photo
    Esteban Morin
    Associate in Cybersecurity, Privacy and Technology Transactions Practice

    Esteban Morin is an attorney in Brownstein’s Cybersecurity and Technology Transactions, Licensing, Advanced Media and Privacy practice group. Drawing on years of experience in the private sector counseling large consumer-facing companies and in the public sector advising federal agencies, he provides clients with a unique perspective on privacy and cybersecurity issues. Esteban’s expertise is broad, and includes the full spectrum of state, federal, and international privacy regulations. In addition to providing regulatory compliance advice, he assists clients with structuring privacy programs, minimizing risks posed by vendors, and managing every step of the information life cycle.

    Prior to Brownstein, Esteban served as counselor to the Chairman of the Privacy and Civil Liberties Oversight Board, an independent federal agency in Washington, DC. In this role, he advised numerous federal agencies on practices that implicated Americans’ privacy rights. Esteban also analyzed emerging technology issues, drafted congressional testimony, devised several foundational agency policies, and was designated as the agency’s liaison to the Federal Privacy Council. Before joining the Board, Esteban served as a core member of Jenner & Block’s Privacy and Information Governance practice group, where he counseled high-profile companies. At the firm, he advised clients on a variety of issues including website design, compliance with international frameworks, mobile application functionality, and data breach response.

  • speaker photo
    DrPH Gregory "Junkbond" Carpenter
    Owner, GCE, LLC

    Former NSA/CSS & retired military, owner: GCE, National & Cyber Security contributer - newsl.org, BOD ATNA Systems, International Board of Advisors MacKenzie Institute; radio host, author: Reverse
    Deception translated into 4 languages. Frequently on Fox, ABD & SiriusXM; International Keynote Speaker. Recipient of NSA Military Performer of the Year Award.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Michael Stephen
    Security GRC Manager, Rightway Healthcare

    Michael Stephen is a 20+ year Cybersecurity and Privacy professional who has worked in multiple industries including telecommunications, healthcare, state and local government, finance and restaurant. His experience includes designing, building and supporting security solutions, and successfully implementing compliance and privacy programs to support business goals. He holds active certifications CISSP, SABSA, prior multiple Cisco network and security, and his last position was Privacy & Security Officer at Connect for Health Colorado.

  • speaker photo
    Frank Vianzon
    Director of Security Architecture and Engineering, Instructor, OWASP Board Member, Red Rocks Community College

    Frank Vianzon works for a large corporation as the Director of Security Architecture and Engineering. He also writes and teaches courses for Red Rocks Cybersecurity Program, including Vulnerability Assessment. Frank has also served on the Board for the Denver Chapter of OWASP.

  • speaker photo
    Melissa Markey
    Attorney, Hall, Render, Killian, Heath & Lyman

    Melissa Markey is a shareholder with Hall, Render, Killian, Heath & Lyman, and is licensed in Michigan, Utah, Colorado and Texas. Melissa's practice focuses on technology and life sciences, especially cybersecurity, data privacy, and legal issues at the developing edges of technology. Ms. Markey is a paramedic, and a nationally recognized author and presenter. She is a candidate for a Masters of Professional Studies in Cyber Policy and Risk Analysis.

  • speaker photo
    Dr. Christopher Pierson
    Founder & CEO, BlackCloak

    Dr. Chris Pierson is the Founder & CEO of BlackCloak, a pioneer of personal digital protection for corporate executives, high-profile and high-net-worth individuals and their families. Chris has been on the front lines of cybersecurity, privacy protection, and fighting cybercrime in both the public and private sectors over 20 years. At the Department of Homeland Security, Chris served as a special government employee on their Cybersecurity and Privacy Committees. He’s also spent time as the Chief Privacy Officer for Royal Bank of Scotland, the world’s 3rd largest bank, as the Chief Information Security Officer for two prominent FinTechs, and as President of the Federal Bureau of Investigation’s Arizona InfraGard. Chris is also a Distinguished Fellow of the Ponemon Institute, a globally recognized keynote speaker & cybersecurity thought leader, and is frequently quoted by the media on cybersecurity & privacy topics.

  • speaker photo
    Randall Frietzsche
    CISO, Denver Health

    Randall’s career started as a Law Enforcement Officer. With the technical aptitude, he moved into technology, starting as an MCSE on Windows NT 4.0. Over the next 22 or so years, he evolved to become the Enterprise Chief Information Security Officer for Denver Health and Hospital Authority. He also teaches cybersecurity courses for Harvard and Regis Universities. As an ISSA Distinguished Fellow, Randall’s mission is to give back to our profession, to mentor, teach, speak, and write. Security is his vocation, avocation and passion. Randall has presented at many security conferences, including Rocky Mountain Information Security Conference, Denver Evanta CISO Summit, SecureWorld, and the Louisville Metro Information Security Conference.

  • speaker photo
    Mary Haynes
    VP, Network Security Operations, Charter Communications

    Mary Haynes is the Vice President of Network Security Operations at Charter Communications. Mary currently leads the network security program for Charter’s core networks and Spectrum services, including High Speed Internet, Telephony, and Video products. Mary is also responsible for Charter’s Customer Security Operations, Law Enforcement Response Team, Abuse management and botnet remediation programs.
    Mary actively participates in a leadership role in numerous security organizations and associations, including the National Communications and Telecommunications Association (NCTA), Communications Information Sharing Analysis Center (ISAC), Communications Sector Reliability and Interoperability Council Working Groups and Infragard. Mary is currently serving as the Communications Deputy Sector Chief for Denver Infragard. As the founding member of Women In Security – Denver, the largest ISSA Special Interest Group.
    Mary has been in the information security field since 1996 and has served in security leadership positions for Evergy, CenturyLink, Sprint, Birch Telecom and AT&T. She graduated Summa Cum Laude from Baker University with a degree in Business Administration.

  • speaker photo
    Deon Mahaffie
    IT Security and Compliance Manager, Antero Resources
  • speaker photo
    Sheryl Rose
    Chief Information Security Officer, Catholic Health Initiatives

    Sheryl Rose, an experienced IT security and audit professional, has been Chief Information Security Officer since 2010 at Catholic Health Initiatives, a nonprofit, faith-based health system that is the nation's third largest, comprised of 103 hospitals and a variety of other health-based facilities spanning the inpatient and outpatient continuum of care in 17 states. She has worked in the audit and security fields for more than 20 years, gaining most of her experience in the financial services sector. Before coming to CHI, she spent 12 years at First Data as the Vice President of Global Security Operations. She has also worked at Wells Fargo and Price Waterhouse Coopers. Sheryl earned a master's degree in computer information systems from Regis University and an undergraduate degree in accounting. She holds several professional certifications: CISA (certified information systems auditor), CISM (certified information security manager), and CRISC (certified in risk and information systems control).

  • speaker photo
    Lucia Milica Turpin
    CISO, Polycom
  • speaker photo
    Evan Glaser
    Account Executive, Darktrace
  • speaker photo
    Karen Worstell
    CEO & Founder, W Risk Group LLC

    Karen Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.

    She has provided cybersecurity support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, developed the first computer security manual for the Boeing Company, and led research in secure distributed computing for Boeing’s Research and Technology Division in the 1980s and 90s. From there she had senior and C-level roles in security and IT Risk Management for companies like Union Carbide, SRI Consulting, Bank of America, AT&T Wireless, Microsoft and Russell Investments. She was the CEO for AtomicTangerine, the SRI International spinoff focused on security that served international Fortune 100 companies in security strategy and major technology implementations. She co-chaired major security events for SRI International, Forbes.com, and Georgetown University Law Center.

    She held positions at NIST for OSI security architecture, the security subcommittee of the Aerospace Industries Association, US Department of Commerce Security and Privacy Advisory Board, and the security subcommittee of NSTAC and has been a featured speaker at events for SecureWorld, IIA, ISSA, ISACA, AusCERT, Security Conference Israel, and RSA.

    She is the author of “Governance and Internal Controls for Cutting Edge IT” published by ITG, the chapter "The Role of the CISO" in the Computer Security Handbook 5th and 6th editions (Wiley) and co-author of "Evaluating the E-Discovery Capabilities of Outside Law Firms” by Pike & Fisher.

    Her technical expertise spans Identity and Access Management, Intrusion Detection and Response, and integration of security into IT and business processes for “seamless security.” She is a huge fan of "not putting steel doors on grass shacks.” Today she focuses on changing perceptions about security to reduce the growing gap between emerging technology and security and pursues her passion for matching cyber talent in leadership roles for enterprises who are serious about cyber security.

    Karen tweets at https://twitter.com/karenworstell and blogs at karenworstell.com.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Chuck Davis
    Adjunct Professor of Computer Foresnics and Ethical Hacking, University of Denver

    Chuck Davis teaches ethical hacking and computer forensics graduate courses in the University of Denver's computer science program. Mr. Davis holds the CISSP-ISSAP, he has co-authored two books, has 8 patents, 3 patents-pending and 9 invention disclosures. Mr. Davis is frequently interviewed by various media on the subject of cybersecurity.

  • speaker photo
    Cynthia Wright
    Principal Cybersecurity Engineer (The MITRE Corporation), CEO (Synthus, Inc.), The MITRE Corporation

    Cynthia Wright is a retired military officer with over 20 years’ experience in national security and cyber strategy. She also co-developed a methodology to assess the cyber needs of developing nations, and assisted DHS in drafting the National Cyber Incident Response Plan and incentivizing market-driven approaches to cyber risk management.

  • speaker photo
    Dr. Jacob Rubin
    CISO | Executive Advisor, EVOTEK

    Jacob Rubin is a successful security and risk executive with broad Fortune-class experience in technology, manufacturing, hospitality, healthcare, and consulting. Academically, Jacob holds a Doctorate of Philosophy and double Master’s degrees with a primary field of study in Behavioral Cyber Security. Jacob focused his dissertation work on the application of Economics Rational Choice Theory to analyze employee decisions when committing non-malicious security violations. Jacob also holds a series of security certifications, including CISSP, CISM, and CISA.

  • speaker photo
    Kacy Zurkus
    Cybersecurity Writer, Cybersecurity Ventures

    Zurkus is an influential cybersecurity writer, covering a variety of topics on security and risk for Cybersecurity Ventures and CyberDB. She’s contributed to a variety of publications including K12 Tech Decisions, CSO Online, CIO, and The Parallax. She authored a regular blog, Security Newb, for CSO Online. In addition, Zurkus has created content for a variety of clients in the security industry.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
DON'T MISS OUT

Join us for high-quality, affordable cybersecurity training and networking. Sign up today!