- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, September 13, 20177:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amAdvisory Council Breakfast - (VIP / INVITE ONLY)Topic: How to Build Your Personal BrandFormer Special Counsel , Director of the Federal Bureau of InvestigationRegistration Level:- VIP / Exclusive
8:00 am - 9:15 amLocation / Room: LookoutThis session is for Advisory Council members only.
8:00 amSecureWorld PLUS Part 1 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures SuccessEarn 16 CPEs With This in-Depth 3-Part CourseCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:- SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 203AEvery organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.
You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.
Part 1: Information Security Awareness Fundamentals and War Stories
What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.Part 3: Reinventing Your Information Security Awareness Program
So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing? Small group discussions, break-out Q/A as well as several successful toolkits are covered.8:00 am[SecureWorld PLUS] Part 1 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkEarn 16 CPEs With This in-Depth 3-Part CourseSr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 106The University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
8:00 amSecureWorld PLUS Part 1 - Threat Hunting and AnalysisSecureWorld PLUS Registrants ONLYTechnology Editor and author of "Threat Hunter" blog, SC MagazineRegistration Level:- SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 203BThreat intelligence has become the coin of the realm in fighting cybercrime. However, simply knowing who the bad guys are and what they do is not enough. You must be able to dig for actionable intelligence and apply that explicitly to your environment. Broadly speaking, we call that threat hunting. Once you have determined the nature and details of threats to your enterprise, you must be able to disseminate them in a manner that is understandable by both humans and machines.
This full-day, hands-on workshop will introduce you to threat hunting techniques and tools—both free and commercial—that you can use and how to translate your findings to Stix for dissemination to a variety of audiences, as well as consumption by an increasing number of security devices such as IPSs and firewalls. You will work in a virtual lab environment using tools and techniques to discover threats, research them in depth, and create Stix profiles. By the end of the workshop you will have compiled a list of tools that you can use, evaluated those tools in a lab environment, created a Stix profile of an actual cyber campaign, and presented your profile to the rest of the class.
Visit the Center for Digital Forensic Studies’ Training Portal to read the syllabus and other course related materials.
For this workshop you will need to bring your own Windows laptop and have the current version of the Chrome browser pre-installed. All other tools will be available on a virtual lab machine you will connect to remotely.
8:30 amTrend Micro: Securing Business Cloud TransformationSecurity shouldn’t stand in the way of business agility, continuity, and flexibility provided by the cloud.Enterprise Account Engineer, Trend MicroRegistration Level:- Open Sessions
8:30 am - 9:15 amLocation / Room: Room 103Cloud projects today are as commonplace as backyard barbecues. Security should be part of a recipe to successfully meet cloud business adoption metrics, such as Time to Service, Time to Value, and Customer Attainment. This presentation will present a high-level understanding of current challenges, regulations, and business objectives, providing business unit owners the knowledge and tools to securely and effectively deliver products and services to their customers.
8:30 amPanel: Michigan CyberPatriot Partners With MEDC to Support 80 Teams For Season 10!Learn about the national Cyber Security competition that will increase the number of students pursuing STEM Degrees.ATAG-Installations, DMVA Deputy Director, Commander 46th Military Police Command, Michigan Army National Guard and DMVACIS - Cybersecurity Program Lead, CyberPatriot Mentor, Henry Ford CollegeRegistration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: Suite 3A Panel presentation about the Michigan CyberPatriot Program and the partnership with MEDC to provide 80 teams with support. Joining the discussion will be Coaches from across Michigan to help us understand the ins and outs of this National Cyber Competition for Middle and High School students, going into it’s 10 season!
8:30 amOff-Shoring Shakeup – How GDPR Impacts Your Outsourcing StrategyDirector of Information Security & Regulatory Compliance, ETSRegistration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: 10538% of US firms outsource to off-shore firms. Per Forbes.com, 86% of these service providers are concerned they will not comply with the new regime. While innovative efforts continue to address the challenge, customers wait in the wings. This session discusses how customer can respond to GDPR’s impact on offshoring.
8:30 amMedjacking: Not Just a TheoryCybersecurity Lab Engineer, Thomas Edison State UniversityRegistration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: TheaterMedical devices have become more prevalent as the population has aged. The hardware application has changed from being externally affixed to internal and connected via IoT. Although these are exceptionally useful, they are also problematic as InfoSec has not been applied to the application and hardware.
9:00 amExhibitor Hall openRegistration Level:- Open Sessions
9:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:30 amOPENING KEYNOTE: Prevent Medical Device Nightmares in The IoMTThe Privacy Professor; CEO, Privacy & Security BrainiacsRegistration Level:- Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote TheaterMedical devices can dramatically improve patients’ lives. However, if the devices do not have security built in, they will become a security and privacy nightmare in the Internet of Medical Things. Rebecca will describe the risks of using medical devices in the IoMT, detail real-life incidents, provide five actions to secure the devices (applicable to other types of IoT devices as well), and describe her work with the IEEE Par 1912 Standards working group.
10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:- Open Sessions
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council Roundtable: (VIP / Invite Only)Topic: Vendor Risk ManagementThe Privacy Professor; CEO, Privacy & Security BrainiacsRegistration Level:- VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: BoardroomThis session is for Advisory Council members only.
11:15 amCyber Resilience: Rethinking Cybersecurity StrategyProfessor and Director, Graduate Program, University of Detroit MercyRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: 101A decade of data indicates that conventional cybersecurity approaches don’t work. This presentation offers a completely new paradigm for corporate cyber-protection; one that is a potentially much more effective means of securing critical assets.
11:15 amCheck Point Software: Protecting Your Enterprise From the Next Security Breach: Mobile DevicesMobility Expert, Check Point Software TechnologiesRegistration Level:- Open Sessions
11:15 am - 12:00 pmLocation / Room: 103BYOD is a reality. Learn how SandBlast Mobile takes an innovative approach to detecting and stopping mobile threats before they start. Whether your data is at rest on a device or in flight through the cloud, SandBlast Mobile helps protect you from vulnerabilities and attacks that put data at risk.
11:15 amCentrify: It’s Time To Rethink SecuritySenior Technical Marketing Manager, CentrifyRegistration Level:- Open Sessions
11:15 am - 12:00 pmLocation / Room: 105Last year, over $80 billion was spent on cybersecurity (Gartner), yet 2/3rds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default or stolen passwords (Verizon). Join us to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organization against the most common cyber attacks.
We’ll examine:
The current (broken) state of security and the role identity plays in cyber attacks
The massive rethink underway that redefines security to follow identity
How identity services reduce th erisk of breaches by over 50%11:15 am[Radware] Cybersecurity Pushed to the LimitSecurity Evangelist, North America, RadwareRegistration Level:- Open Sessions
11:15 am - 12:00 pmLocation / Room: TheaterThroughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the U.S. presidential election, worldwide malware outbreaks and the Equifax data breach. These and other high-profile events spurred greater cyber-defense investment by everyone from nation states and global corporations to individuals purchasing anti-malware solutions for personal devices. Yet even as investments increase so do threats, hacks and vulnerabilities. This session will help you understand these complex and challenging dynamics. Based on findings from Radware’s research and a global industry survey, the session will show real attack data and customer stories to paint a picture of where we are and what security professionals can do.
Join the session to learn more about:
• The threat landscape deep dive—the who, what and why of attacks
• Potential impact on your business, including associated costs of different cyber-attacks
• Critical attacks in the midst: DNS, IoT and risks lurking in the cloud
• Emerging threats and how to protect against them
• A look ahead – predictions and what to prepare for11:15 amIdentity Theft Through OSINT/Social EngineeringAdvisory Manager / Security Researcher, DeloitteRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: Suite 3This talk will demonstrate how easy identity theft has become because of OSINT and the ability to easily social engineer and grab meta data. It will cover how an attacker uses OSINT to build targeted attacks; how an attacker builds a profile using software to represent their data about you; and how an attacker uses data points to pivot from one source to another online. The target was a randomly selected target. Not only does it cover his current activity but his cached activity, which enables attackers to target him. The story will show how an initial search to a complete PWNAGE was done on the individual because of a random blog that was discovered. This talk also shows how easily I was able to find his company’s email format and private IP addresses, which could have completely allowed me to own his company’s network because his company allowed BYOD. It will cover how you can better prepare and protect yourself.
To learn more about this topic, read SecureWorld’s interview of Zee here:
https://www.secureworld.io/industry-news/dangers-identity-theft-open-source-intelligence12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Topic: Vulnerability and Patch ManagementSr. Cybersecurity Consultant, Wilson CyberRegistration Level:- VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: BoardroomThis session is for Advisory Council members only.
12:15 pmLUNCH KEYNOTE: Optiv - Cloud Security is Application Security – Securing the Cloud as a TeamSenior Director, Cloud Security, OptivRegistration Level:- Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote Theater“Infrastructure” is software in the era of Cloud; you should consider the software design choices as they impact not only the application structure, but also security in the Cloud. The convergence of the AppDev team and the security team allows for securing the cloud throughout the process without impacting agility. Bringing security in at the eleventh hour after applications have been built is not likely to be ideal either for development or production based workloads in the Cloud. This session offers:
• Factors to consider when making software design choices
• Tips on weaving security best practices into the SDLC without impeding the velocity of AppDev
• Benefits of architecting applications hand in hand between AppDev and Security teams.1:15 pmPanel: What Will They Think of Next? (Emerging Threats)Registration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: Suite 3It would seem the more we “build a better mousetrap” the better the threats become. Will machine learning and AI be used against us in the future? Will these and other innovations be hacked and used for gain? Will the Crime as a Business platform take off where business competitors are utilizing these attacks for the upper hand? Perhaps the cars that are being hacked will evolve into driverless vehicles that are hacking companies from inside there own parking lots. What about drones? So many questions, let’s see what our experts say on this panel.
Panelists:
Patrick Vowles, IBM
Leigh Frederick, Darktrace
Matt Rose, Checkmarx
Ron Winward, Radware
John Fahey, Comodo1:15 pmPanel: Extortion-as-a-Service? (Ransomware and Beyond)Registration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterRemember when ransomware just seized up your computer and wanted you to send Bitcoin to unlock it? With the advances in cybercrime, the thieves are not only locking and encrypting your files, but they are also finding your dirty little secrets. You may not pay for the run of the mill files you have backed up, but you might be more inclined to pay even more to make sure no one finds out about you and a certain someone in accounting you are messaging. Or, what about all the credit card numbers you aren’t storing correctly? It would be a shame if your boss knew you were sending out resumes… Will these attacks also be available for purchase on the dark web?Join the discussion with our experts and come up with a plan to mitigate this problem.
Panelists:
Chris Olive, Thales
Wolfgang Goerlich, cbi Secure
Kierk Sanderlin, Check Point Security
Mike Drummond, Carbon Black
Rob Walk, Tenable1:15 pmRSA: Business-Driven Security: A New Plan for ChaosPrincipal Solution Engineer, SentinelOneRegistration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: 103We will discuss how and why key-business drivers shape your security operations. We go beyond the guidance provided by NIST, and take a look at Risk Management, Threat Intelligence, Incident Workflow & Classification, Staffing Models, Use Cases & Prioritization, Escalation Plans, Security Controls, and Key Performance Indicators.
2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:- Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
3:00 pmHow to Perform a Data Privacy Impact AssessmentNow I know how to do a DPIA!Chief Information Security & Privacy Officer, WorkForce SoftwareRegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: 105A practical guide to performing a Data Privacy Impact Assessment, including a fully completed DPIA example and a template you can use.
3:00 pmThe Enterprise IT Security PortfolioVice President and Chief Information Officer, Schoolcraft CollegeRegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: 103This presentation seeks to offer a high-level customer perspective overview of the security tool landscape with an eye toward the virtualized environment. The idea is not to go in-depth into any one topic but to discuss how the pieces fit together and the risk versus reward proposition.
3:00 pmSecuring Cyber Physical SystemsChair, Undergraduate Information Technology, Capella UniversityRegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: TheaterWe are facing new cybersecurity challenges as a result of the growth of cyber physical systems. These systems form the core of the Internet of Things (IoT) which is expected to grow to 50 billion interconnected devices within the next few years. Traditional cybersecurity defense measures and technologies do not apply to the real time interaction, sub-second, minimum memory world of cyber physical sensors and components. This session will discuss the challenge of securing cyber physical systems.
3:00 pmAnd the Clouds Break: Continuity in the 21st CenturyCISO, Oakland County, Michigan GovernmentRegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: 101The promise of cloud computing was a utility; always up, always on. But we’ve seen many outages. Time to dust off the continuity handbook, and revisit recovery for the twenty-first century. This session covers business impact analysis, business continuity, disaster recovery in utility computing and Cloud services. After all, the clouds break.
3:00 pmInternet of Things Security and YouAutomotive Solutions Director, Sec eDGERegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: Suite 3IoT is older than you may imagine and each new advance came with a set of security issues. Learn from history, incidents and controls. Modern IoT is complex; architectures have many common emergent issues but it is possible to make good decisions if you understand the trade-offs.
3:00 pmSecureWorld PLUS Part 2 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures SuccessSecureWorld PLUS Registrants ONLYCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:- SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: 203AEvery organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.
You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.
Part 1: Information Security Awareness Fundamentals and War Stories
What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.Part 3: Reinventing Your Information Security Awareness Program
So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing? Small group discussions, break-out Q/A as well as several successful toolkits are covered.3:00 pm[SecureWorld PLUS] Part 2 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkSecureWorld PLUS Registrants ONLYSr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: 106The University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
3:00 pmSecureWorld PLUS Part 2 - Threat Hunting and AnalysisSecureWorld PLUS Registrants ONLYTechnology Editor and author of "Threat Hunter" blog, SC MagazineRegistration Level:- SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: 203BThreat intelligence has become the coin of the realm in fighting cybercrime. However, simply knowing who the bad guys are and what they do is not enough. You must be able to dig for actionable intelligence and apply that explicitly to your environment. Broadly speaking, we call that threat hunting. Once you have determined the nature and details of threats to your enterprise, you must be able to disseminate them in a manner that is understandable by both humans and machines.
This full-day, hands-on workshop will introduce you to threat hunting techniques and tools—both free and commercial—that you can use and how to translate your findings to Stix for dissemination to a variety of audiences, as well as consumption by an increasing number of security devices such as IPSs and firewalls. You will work in a virtual lab environment using tools and techniques to discover threats, research them in depth, and create Stix profiles. By the end of the workshop you will have compiled a list of tools that you can use, evaluated those tools in a lab environment, created a Stix profile of an actual cyber campaign, and presented your profile to the rest of the class.
Visit the Center for Digital Forensic Studies’ Training Portal to read the syllabus and other course related materials.
For this workshop you will need to bring your own Windows laptop and have the current version of the Chrome browser pre-installed. All other tools will be available on a virtual lab machine you will connect to remotely.
3:45 pmOptiv ReceptionJoin Optiv and Partners for Happy Hour!Registration Level:- Open Sessions
3:45 pm - 6:00 pmLocation / Room: The Look Out Room at Ford Motor Conference & Event CenterJoin your peers for complimentary hors d’oeuvres and cocktails following the first day of SecureWorld. This is a great opportunity to network with other security professionals from the Detroit area and to discuss the hot topics from the day. Register here: https://live.optiv.com/profile/form/index.cfm?PKformID=0x312562cd1
The Look Out Room at Ford Motor Conference & Event Center
1151 Village Road
Dearborn, MI 41124 - Thursday, September 14, 20177:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amSecureWorld PLUS Part 3 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures SuccessSecureWorld PLUS Registrants ONLYCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:- SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 203AEvery organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.
You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.
Part 1: Information Security Awareness Fundamentals and War Stories
What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.Part 3: Reinventing Your Information Security Awareness Program
So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing? Small group discussions, break-out Q/A as well as several successful toolkits are covered.8:00 am[SecureWorld PLUS] Part 3 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkSecureWorld PLUS Registrants ONLYSr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 106The University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
8:00 amSecureWorld PLUS Part 3 - Threat Hunting and AnalysisSecureWorld PLUS Registrants ONLYTechnology Editor and author of "Threat Hunter" blog, SC MagazineRegistration Level:- SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 203BThreat intelligence has become the coin of the realm in fighting cybercrime. However, simply knowing who the bad guys are and what they do is not enough. You must be able to dig for actionable intelligence and apply that explicitly to your environment. Broadly speaking, we call that threat hunting. Once you have determined the nature and details of threats to your enterprise, you must be able to disseminate them in a manner that is understandable by both humans and machines.
This full-day, hands-on workshop will introduce you to threat hunting techniques and tools—both free and commercial—that you can use and how to translate your findings to Stix for dissemination to a variety of audiences, as well as consumption by an increasing number of security devices such as IPSs and firewalls. You will work in a virtual lab environment using tools and techniques to discover threats, research them in depth, and create Stix profiles. By the end of the workshop you will have compiled a list of tools that you can use, evaluated those tools in a lab environment, created a Stix profile of an actual cyber campaign, and presented your profile to the rest of the class.
Visit the Center for Digital Forensic Studies’ Training Portal to read the syllabus and other course related materials.
For this workshop you will need to bring your own Windows laptop and have the current version of the Chrome browser pre-installed. All other tools will be available on a virtual lab machine you will connect to remotely.
8:00 amInfraGard Michigan Chapter MeetingInfraGard Members OnlySenior Manager, Mandiant Global Consulting ServicesRegistration Level:- Open Sessions
8:00 am - 9:15 amLocation / Room: Keynote TheaterJoin InfraGard for their chapter meeting.
This session is for InfraGard members only.8:30 amEmergence of the Chief Digital Risk OfficerVP & CSO, Diebold NixdorfRegistration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: 103Digital technologies will increase organizations competitiveness, agility and reaction time. While increasing the speed of business, these digital technologies and processes will introduce greater security threats and evolution of digital risk management. Join Martin Bally as he discusses the Emergence of the Chief Digital Risk Officer.
8:30 amHow to Phish in Your Own PondLearn how to conduct a phishing exercise as a part of a training and awareness program.Information Security Control Assurance Manager , ExperianRegistration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: 105Information Security is the focus of nearly every organization. However, most programs consist of disjointed activities that are based on a compliance checklist, instead of a strategically planned IS Awareness program. In this session, we will focus on phishing as a part of a repeatable evolving robust security awareness program.
8:30 amAnatomy of a Cyber-Heist: Examples of Advanced Cyber RisksManaging Director, UHY ConsultingRegistration Level:- Open Sessions
8:30 am - 9:15 amLocation / Room: TheaterOne click is all it takes. Bring your A-game! This presentation will take you through how cyber crooks are getting away with some big pay days. We will explore techniques in use demonstrating an increasingly high level of sophistication, patience, and planning, so you can better plan your defenses.
8:30 amCybercrime & You...What Can You Do?Resources for Cybercrime in MIPrivacy Engineer, IT Security and Compliance , Steelcase Inc.Registration Level:- Conference Pass
8:30 am - 9:15 amLocation / Room: Suite 3Have you been a victim of Cybercrime? In 2016 MI reported over $24M in losses. Most Victims do not
know where to go for help. Many communities lack the resources to support the volume of crimes.
Come learn how the Cybercrime Support Network is working towards a solution.9:00 amExhibitor Hall openRegistration Level:- Open Sessions
9:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:30 amOPENING KEYNOTE: Defending the Nation in Cyber SpaceFormer Director of Operations at U.S. Cyber CommandMajor General, U.S. Air Force (Retired)Registration Level:- Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote TheaterThe Russians hacked the election, the Chinese are stealing our trade secrets, the Iranians and North Koreans see cyber as the ultimate asymmetric attack vector against the United States. Every day, the country’s critical infrastructure is under attack—financial services, the electric grid, oil and gas, telecommunications, transportation. As the former Director of Operations at U.S. Cyber Command, Maj Gen (Ret) Brett Williams is one of the few speakers available who can talk with the credibility that comes from being on the front lines of defending the Nation in cyberspace. General Williams unique combination of both military and private sector experience, provides a clear understanding of the nation-state cyber threat and how it could impact business interests in every sector.
10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:- Open Sessions
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council Roundtable - (VIP / Invite Only)Topic: Converging all Aspects of the Cybersecurity Operation (Electronic, Physical and Personnel) Under One RoofDirector, IT Security & Compliance, Martinrea Inc.Registration Level:- VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: BoardroomThis session is for Advisory Council members only.
11:15 amCloud Provider Security – The Evolution ContinuesGRC Consultant, Comp-West, LLCRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: Room 105Cloud providers have always stated that they secure the data residing in their cloud. As I have presented at a few Cloud Security Alliance conferences in the past, the security that is provided is dependent on the Service Level Agreement (SLA) verbiage. The same is still true, but some of the providers actually have essentially a menu of security tools. This presentation will explore these tools.
11:15 amGDPR: Tick Tock, Time Is Running Out to Be in ComplianceInformation Security Governance Specialist, Perrigo Company plcRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: Suite 3Practitioner’s view of the process to evaluate your global company’s European Union GDPR (General Data Protection Regulation) compliance approach. Insight into the process of working through the GDPR requirements, how to prepare for complying with these requirements by May 25, 2018, and the role of IT, information security, and compliance.
11:15 amIBM: CyberSecurity InnovationsProgram Director, Security Client Initiatives, IBMRegistration Level:- Open Sessions
11:15 am - 12:00 pmLocation / Room: 103IBM Security helps organizations outthink threats and outpace their competition with innovation strengthened by COGNITIVE systems that understand, reason, and learn to help analysts resolve incidents quickly. CLOUD security to help organizations plan, deploy, and manage security as workloads and data are moved across hybrid cloud environments. And COLLABORATE in real-time with threat intelligence crowdsourced from X-Force and a community of 14K+ users, as well as a security app marketplace to help analysts stay ahead of the threats.
11:15 amCybersecurity Regulatory Environment: The shift Towards More Stringent Requirements and the Need for Companies to Develop Risk-Based Cybersecurity ProgramsIT Audit Specialist, Meadowbrook Insurance GroupRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: 101We will discuss the current and the foreseeable future of cybersecurity regulations. We will also discuss why companies should take a risk-driven approach vs a compliance-driven approach to security.
11:15 amFrom Boots to Suits - How Vets Are Taking Over TechPresident & CEO of SAP National Security Services (NS2), President of NS2 ServesRegistration Level:- Conference Pass
11:15 am - 12:00 pmLocation / Room: TheaterJoin Mark Testoni, President of NS2 Serves, to learn about an innovative program that focuses on training and employing veterans in high-tech careers. The three-month residential course offers training and certifications in world-class software solutions that support U.S. national security needs and commercial enterprises. The program has graduated over 130 veterans to date and placed them in high-tech careers at major corporations.
12:00 pmJoint ISSA Motor City and (ISC)2 Greater Detroit Chapter LuncheonMembers ONLY - Lunch ServedDirector of Security and Network Transformation, ZscalerRegistration Level:- VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: LookoutThis is intended for members only.
Luncheon sponsored by CBI and Varonis
Speaker provided by CBI and Varonis12:00 pmAdvisory Council Lunch Roundtable - (VIP / Invite Only)Topic: Protecting Your Company Data While Traveling Abroad-China?AVP, Information Security, Amerisure InsuranceRegistration Level:- VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: BoardroomThis session is for Advisory Council members only.
12:15 pm[LUNCH KEYNOTE] Radware: The 10 Immutable Security Facts for 2020Security Evangelist, North America, RadwareRegistration Level:- Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote TheaterA presentation of top 10 security facts that will disrupt established application and infrastructure security practices. A discussion centered around questions everyone is or should be asking in 2020:
- What is the attack surface of the public cloud?
- Why are NIDs, HIDs, and flow collectors not adapted for cloud based infrastructure and applications?
- How to protect APIs and cloud native applications running in dynamic, end-to-end encrypted service meshes?
- What is Next Gen WAF and when should I consider it?
- What are automated threats and how to protect against the 4th generation bots?
- Is deep learning an inexorable technology as attackers get automated and attacks more sophisticated?
- What will be the impact of 5G on application security and availability?
Presentation outline
A top 10 is subjective in nature, but it wasn’t just pulled out of thin air. The 10 facts are based on trends in recent threats, my own security research, and discussions with CISOs and security leaders.The Top 10 security facts for 2019/2020:
- The Attack Surface of the Public Cloud is defined by Permissions
- The Insider thread of the Public Cloud is the Outsider
- HIDs, NIDs, and Flow Collectors are pointless for Securing Cloud-based Applications
- WAF does not keep up with Cloud Native Applications
- East-West Traffic is getting Encrypted
- Attackers are getting Automated
- Attacks are getting more Sophisticated
- APIs are the new Front-end
- Machine and Deep Learning become essential for Threat Detection
- 5G will fuel the next IoT Explosion
Starting the discussion with an overview of the current threat landscape, illustrating with real-world incidents in following categories:
1. Cloud infrastructure abuse
2. Data breaches through publicly exposed S3 buckets
3. Ransom of poorly secured cloud data services
4. Cloud Infrastructure owning and wiping
5. Cloudification of DDoS attacks
6. Automated threatsA quick run through of the top 10 security facts.
The rest of the discussion will lead to the 10 facts and is organized in 4 chapters, each centering around a top of mind topic:
- Migrating to the cloud
- Cloud Native Applications
- Automated Threats
- 5G/IoT Intersection
Each chapter is summarized with the top security facts that were demonstrated throughout the discussion
1:15 pmPanel: Stopping the Attacks (Incident Response)Registration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterSecurity teams are struggling to keep up with the myriad of attack vectors that exist. Future InfoSec professionals will take a more adversarial approach to incident response. Will we have artificial intelligence helping threat hunters squash attacks before they can do any significant damage on the network while alerting the authorities in real time? Can a true partnership form between organizations and law enforcement to share information? Join our experts as they discuss challenges modern security teams face and how we can build a better plan for tomorrow.
Panelists:
Phillip Maddux, Signal Sciences
Steve Shalita, Pluribus Networks
Jim Labiszak, FireEye
David Sterns, baramundi
Grant Moerschel, SentinelOne
Matthew Aubert, Cisco1:15 pmCheck Point: Pass Known Good and Succeed in IT Security. Why Detection is Dead and Prevention is the Key.Director of Engineering, Check Point SoftwareRegistration Level:- Open Sessions
1:15 pm - 2:15 pmWe have tried for years to operationalize detection methodologies into our organizations. We have failed. Kierk will discuss the benefits of passing known good traffic and how that helps us to limit our attack surface and scale as an IT organization.
1:15 pmPanel: Phishing and Social Engineering Scams 2.0Registration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: Suite 3Phishing continues to be the #1 attack vector for the bad guys. Why? Simply put: it works. These attacks keep getting more realistic and sophisticated. In the future we should expect nothing less. Criminals will do more homework on their potential victims and possible pose as business leads or clients to gain our trust. What sales person doesn’t want email from a potential client who wants a new solution? Or they may just lay in wait until they’ve collected enough information to strike. Will they actually come to your business and drop thumb drives like pen testers do? Use drones to do their dirty work? Our experts will discuss the current state of affairs and brainstorm possible new scenarios.
Panelists:
Jon Clay, Trend Micro
Jeremy Briglia, Qualys
Kurt Wescoe, Wombat
Brandon Reid, Mimecast
Jeff Ostermiller, Zscaler2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:- Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
2:30 pmDash for Prizes & CyberHuntRegistration Level:- Open Sessions
2:30 pm - 2:45 pmLocation / Room: SecureWorld Exhibitor FloorBe sure to have exhibitors scan your badge for a chance to win prizes. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win
3:00 pmSecurity KPIs for the EnterpriseInformation Security (Focusing on Payments), XRegistration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: TheaterSecurity programs are product driven and lack measures that articulate value to the business. If you’re a security leader who’s been struggling for mindshare within your organizatoin, KPIs are metrics that can help you achieve your goal.
3:00 pmThe Expanded Scope of the Computer Fraud & Abuse Act (It's Not Just for Hackers Anymore)Founder & CEO, Ossian Law P.C.Registration Level:- Conference Pass
3:00 pm - 3:45 pmLocation / Room: Suite 3As the federal Computer Fraud and Abuse Act (CFAA) turns 33 years old, it is increasingly being applied not just to external hackers, but also to current and former employees, competitors, vendors, and even customers. Information Technology attorney Kathy Ossian will discuss recent civil and criminal actions under the CFAA and the impact of its expanded scope on businesses.
- A10 NetworksBooth: 224
A10 Networks (NYSE: ATEN) is a Secure Application Services™ company, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure.
- ACP MichiganBooth: TBD
The Association of Continuity Professionals (ACP) is a non-profit trade association dedicated to fostering continued professional growth and development in effective Contingency & Business Resumption Planning. ACP is the recognized premier international networking and information exchange organization in the business continuity industry.
- Alert LogicBooth: 240
Whether your company is transitioning infrastructure to the cloud, taking advantage of managed hosting services, or continuing to rely on owned data centers, Alert Logic offers intrusion detection, vulnerability assessment and log management solutions that are coupled with 24/7 monitoring and expert guidance services from our security operations center. More than 1,500 enterprise customers trust Alert Logic to secure and protect their digital information, and rely on us for keeping in step with increasingly complex regulatory issues. In addition to our team of GIAC analysts dedicated to careful observation and assessment of threats to your data, our research team stays on top of emerging developments so we can stop potential security breaches before they strike. We also have a dedicated support team ready to answer any questions you have about our products and services.
- AvectoBooth: 444
Avecto is a leader in Privilege Elevation and Delegation Management. Since 2008, the company has enabled over 8 million users to successfully work without admin rights, enabling many of the world’s biggest brands to achieve the balance between overlocked and underlocked environments.
Avecto’s Defendpoint software has been deployed in the most highly regulated industries, enabling organizations to achieve compliance, gain operational efficiency and stop internal and external attacks.
Defendpoint combines privilege management and application control technology in a single lightweight agent. This scalable solution allows global organizations to eliminate admin rights across the entire business – across Windows and Mac desktops and even in the data center.
Actionable intelligence is provided by Defendpoint Insights, an enterprise class reporting solution with endpoint analysis, dashboards and trend data for auditing and compliance.
- Binary DefenseBooth: 235
Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.
- BitdefenderBooth: 231
Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.
From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.
- BOMGARBooth: 244
Bomgar offers the most secure remote access and support technology on the planet. Each encrypted connection is outbound, so you can connect without VPN or firewall changes. You can leverage Active Directory and LDAPS to manage authentication, require multi-factor authentication, define more than 50 permissions for technicians and privileged users, and capture a detailed audit log of every remote connection.
- CA TechnologiesBooth: 414
CA Technologies helps customers succeed in a future where every business— from apparel to energy— is being rewritten by software. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live— from the data center to the mobile device.
Our business management software and solutions help our customers thrive in the new application economy by delivering the means to deploy, monitor and secure their applications and infrastructure. Our goal is to help organizations develop applications and experiences that excite and engage and, in turn, open up money-making opportunities for their businesses.
- Cadre Information SecurityBooth: 224
Data and network security is a critical element for any business, but it is not enough to win. To win, cybersecurity must be viewed through the prism of business process management, align with capabilities and core competencies of the business and be optimized to minimize or eliminate the friction. For more than 25 years, Cadre Information Security enables operationally obsessed, mid-market companies to lower their costs, gain more control and increase the velocity and impact of the efforts. For more information, visit www.cadre.net
- Carbon BlackBooth: 251
Carbon Black is Transforming Security Through Big Data and Analytics in the Cloud Growing trends in mobility and cloud have made the endpoint the new perimeter. New and emerging attacks are beating traditional defenses, and security teams are too reactive and held back by their technologies. Carbon Black is leveraging the power of big data and analytics to solve the challenges surrounding endpoint security. With the Cb Predictive Security Cloud platform, we are transforming cybersecurity to deliver a new generation of cloud-delivered security solutions designed to protect against the most advanced threats.
- CentrifyBooth: 208
Centrify provides unified identity management across data center, cloud and mobile environments. Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent. - Check Point Software TechnologiesBooth: 442
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- CiscoBooth: 206
Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.
- Core SecurityBooth: 233
Enterprises are responsible for securing and managing access to corporate data and ensuring availability of enterprise applications and services at all times. Core Security offers threat-aware identity, access, authentication and vulnerability management solutions to help identity, security, and risk teams control access, reduce risk, and maintain continuous compliance.
Our solutions provide actionable intelligence and context needed to manage identity access and security risk across the enterprise. By combining real-time insight into identity analytics with prioritized infrastructure vulnerabilities, organizations receive a more comprehensive view of their security posture. Organizations gain context and intelligence through analytics to make more informed, prioritized, and better security remediation decisions. This allows them to more rapidly and accurately identify, validate and proactively stop unauthorized access and defend against security threats.
- Crossmatch/DigitalPersonaBooth: 300
Crossmatch is a world leader in biometric identity management solutions. Our technologies and expertise are helping organizations of all sizes achieve new levels of efficiency, expand in new markets and find powerful new ways to protect people, property and profits. Heavy reliance on digital transactions, growing mobile workforces, global demand for e-gov services and the need for enhanced security at borders, in law enforcement and on battlefields all point to a clear need for the confidence and certainty of biometrics. Security-minded organizations in both the public and private realms understand the power and necessity of biometrics — and they are increasingly looking for an established partner to help solve this identity management challenge.
- CyberArk SoftwareBooth: 436
CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.
- CylanceBooth: 446
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
- DarktraceBooth: 308
Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,500 organizations to protect against threats to the cloud, email, IoT, networks, and industrial systems.
The company has over 1,200 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.
- Data PartnersBooth: 234
At Data Partner Inc. we understand the intimacy of being an extension of your IT organization. We build trusting and long-lasting relationships with the world’s leading organizations both large and small. Our goal is to help companies maximize the ROI on their IT spend while solving those business challenges. We specialize in: Block, Unified & Object Storage, Data Aware Storage, Hybrid Storage, Cybersecurity, Servers & Compute ,Cloud Consulting, Disaster Recovery, Wireless, Network Architecture & Data Center Networking, Virtualization & Hyper-Converged Infrastructure, Telecom & Mobility, Management and Professional Staffing Services.
- DuoBooth: TBD
Duo was founded with the belief that security can only be effective if it is easy to use. Through that vision, Duo has built a world-class security platform that is actually enjoyable to use. Duo supports thousands of customers and millions of users in organizations like Accenture, Boston Medical, Emblem Health, Facebook, Toyota, Twitter, Virginia Tech, Yelp and others, and enjoys the highest NPS score in the industry.
- EC-CouncilBooth: TBD
International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.
- ECTFBooth: TBD
As a result of the amalgamation of advanced technology and the Internet, both the quantity and sophistication of cybercrimes targeting U.S. financial institutions and critical infrastructure have increased. Today, criminal trends show an increased use of phishing emails, account takeovers, malicious software, hacking attacks and network intrusions resulting in significant data breaches. To protect the nation’s financial infrastructure from cyber and financial criminals, the Secret Service has adopted a multipronged approach.
- EndaceBooth: 307
Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.
- International Information Systems Security Certification Consortium, Inc., (ISC)²®Booth: 307
Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.
We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.
- ExabeamBooth: 450
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- FireEyeBooth: 402
FireEye (https://www.fireeye.com/) is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,100 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.
- ForcepointBooth: 406
Forcepoint is transforming cybersecurity by focusing on what matters most: people’s behavior as they interact with critical data and systems. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform, protecting the human point for thousands of enterprise and government customers. Our solutions include Cloud Security, Network Security, Data & Insider Threat Security.
- GemaltoBooth: 401
Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centers to devices and across networks. As the global leader in cloud and data protection, our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day.
- GigamonBooth: 424
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- GuardiCoreBooth: 448
Guardicore is a data center and cloud security company that protects an organization’s critical assets using flexible, quickly deployed, and easy to understand segmentation controls. Our solutions provide a simpler, faster way to guarantee persistent and consistent security for any application, in any IT environment – including IaaS, PaaS, on-premises VMs & legacy bare-metal servers. Guardicore was founded in 2013 with the goal of reinventing security to place greater emphasis on security beyond the traditional network perimeter.
- GuidePoint Security LLCBooth: 232
GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com
- HTCIA MichiganBooth: 308
We are the Michigan chapter of the worldwide High Technology Crime Investigation Association. Our membership consists of people from the private and public sectors. We have members from the U.S. Attorney’s Office, The State of Michigan, FBI, Treasury, and Customs. We also have members who represent cities, counties and townships, as well as universities and law enforcement.
- IBMBooth: 416
Digital is the wires, but digital intelligence, or artificial intelligence as some people call it, is about much more than that. This next decade is about how you combine those and become a cognitive business. It’s the dawn of a new era.
- InfobloxBooth: 438
Infoblox delivers modern, cloud-first networking and security experiences that are simple, automated, scalable and reliable. The company is the market leader with over 12,000 customers worldwide, including over 70 percent of the Fortune 500. The company’s portfolio of SaaS, data center, and hybrid offerings for DHCP, DNS, IPAM and security solutions enable organizations to leverage the advantages of on-premises and cloud-first architectures. The combination of NIOS, BloxOne DDI, BloxOne Threat Defense and threat intelligence services provide a robust foundation for connecting and securing the modern enterprise.
- InfraGard MichiganBooth: TBD
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
- IronNetBooth: 214
IronNet is a Cybersecurity / Behavior Analytics Product and Cyber Services company started by former NSA Director Keith Alexander (retired 4-star General). IronDefense, our behavior analytics system, brings real-time visibility and cutting edge analytics to customer networks to discover the most elusive threats, then ranks them by risk through an expert system to amplify analyst capabilities.
- ISC2Booth: TBD
ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, ISC2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation, The Center for Cyber Safety and Education™.
- ISACA DetroitBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Detroit area.
- ISSA Motor CityBooth: TBD
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals. The Motor City chapter is located in the automotive capital of the United States, Detroit, MI. Our chapter is committed to educating, consulting, advising, and overall improving information security for our technology infrastructures.
- Ixia, a Keysight BusinessBooth: 248
We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.
- LogRhythmBooth: 440
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
- McAfeeBooth: 256
Founded in 1989 and headquartered in Somerset, NJ, SHI International Corp. is a $7.5 billion global provider of information technology products and services. Driven by the industry’s most experienced and stable sales force and backed by software volume licensing experts, hardware procurement specialists, and certified IT services professionals, SHI delivers custom IT solutions to Corporate, Enterprise, Public Sector and Academic customers. With 3,500 employees worldwide, SHI is the largest Minority/Woman Owned Business Enterprise (MWBE) in the United States and is ranked 12th among CRN’s Solution Provider 500 list of North American IT solution providers. For more information, please
- MeritBooth: 312
Merit Network is a non-profit, member-owned organization governed by Michigan’s public universities. Founded in 1966, Merit owns and operates America’s longest-running regional research and education network. After 50 years of innovation, Merit continues to provide high-performance services to the educational communities in Michigan and beyond.
Merit continues to leverage its experience managing NSFNET, the precursor to the modern Internet, to catapult Michigan into the forefront of networking technologies. Through Merit, organizations have access to leading-edge network research, state and national collaborative initiatives and international peering.
- MimecastBooth: 226
Mimecast empowers our customers to help mitigate risk and manage complexities across a threat landscape driven by cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.
- Mobile Technology Association of MichiganBooth: TBD
The Mobile Technology Association of Michigan (MTAM) is a non-profit trade association for Michigan’s mobile/wireless (connected) technologies industry, businesses that provide these technologies, and the businesses – in all industries – that use these technologies. We are the first state-based mobile/wireless (connected) technologies trade association in the U.S. and we are focused on increasing demand for Michigan-based mobile/wireless technology products and services within the state, nationally and globally, thereby generating increased entrepreneurial and enterprise-level opportunities and creating sustainable jobs in Michigan.
- OktaBooth: 412
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- OptivBooth: 420
Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.
- Palo Alto NetworksBooth: 400
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
- ProofpointBooth: 246
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- Qualys, Inc.Booth: 236
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
- RadwareBooth: 230
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- Rapid7Booth: 202
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- RSA a Dell Technologies CompanyBooth: 422
RSA Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change.
- SailPointBooth: 222
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint’s customers are among the world’s largest companies in a wide range of industries.
- SplunkBooth: TBD
Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.
- SynopsysBooth: 250
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
- TechTargetBooth: TBD
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- TenableBooth: 309
Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
- ThalesBooth: TBD
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- Trend MicroBooth: 210
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- TripwireBooth: 426
Tripwire is the trusted leader for establishing a strong cybersecurity foundation. Partnering with Fortune 500 enterprises, industrial organizations and government agencies, Tripwire protects the integrity of mission-critical systems spanning physical, virtual, cloud and DevOps environments. Tripwire’s award-winning portfolio delivers top critical security controls, including asset discovery, secure configuration management, vulnerability management and log management. As the pioneers of file integrity monitoring (FIM), Tripwire’s expertise is built on a 20+ year history of innovation helping organizations discover, minimize and monitor their attack surfaces.
Learn more at https://www.tripwire.com.
- TrustedSecBooth: 235
TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.
- VenafiBooth: 220
Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.
With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms; four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.
For more information, visit: www.venafi.com.
- VioPointBooth: 218
VioPoint, an information security consulting firm located in Auburn Hills, Michigan, offers a variety of security solutions that help customers address information security challenges with fewer resources. Knowing the complexity of managing risk and compliance in today’s business climate, VioPoint provides trusted and experienced advisors to help address strategic and tactical issues within customer security programs. With experience across a broad spectrum of industries including insurance, healthcare, banking, education, and energy, VioPoint provides a blend of consulting and best-in-class technology solutions that helps their clients effectively manage risk.
- Walsh CollegeBooth: 306
At Walsh College, we blend business theory and real-world experience to deliver educational programs that boost career success. Our faculty are not only dedicated teachers, but also business professionals who integrate their experience into what you learn in class. Administrative staff deliver personal service in a professional learning environment.
Founded in 1922 and celebrating more than 90 years of business education, we offer 16 business and related technology degree programs at the bachelor’s and master’s levels that are responsive to student, employer, and community needs. Walsh is a private, not-for-profit institution offering courses and services at locations in Troy, Novi, Clinton Township, Port Huron, and online.
- Wombat Security TechnologiesBooth: 212
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.
- ZscalerBooth: 216
Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.
- Matt OlsenFormer Special Counsel , Director of the Federal Bureau of Investigation
Mr. Olsen also served at the Department of Justice in a number of leadership positions and was responsible for national security and criminal cases. He was a federal prosecutor for over a decade and served as Special Counsel to the Director of the Federal Bureau of Investigation.
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Dr. Peter StephensonTechnology Editor and author of "Threat Hunter" blog, SC Magazine
Dr. Peter Stephenson is the Technology Editor and author of the “Threat Hunter” blog in SC Magazine, a leading industry publication for which he has written for over 20 years. He is a cyber criminologist, digital investigator and digital forensic research scientist, as well as being a writer, researcher and lecturer on cyber threat analysis, cyber criminology, cyber jurisprudence and cyber criminalistics on large-scale computer networks.
He has lectured extensively on digital investigation and security, and has written, edited or contributed to 20 books and several hundred articles and peer-reviewed papers in major national and international trade, technical and scientific publications. He is the series editor of the new Peter Stephenson Series on Cyber Crime Investigation (Auerbach). He spends his time in retirement as a writer and researcher specializing in cyber threat analysis, cyber criminology, and cyber jurisprudence.
Dr. Stephenson was an Associate Professor and the Chief Information Security Officer for Norwich University and, prior to his retirement in July of 2015, was Director of the Norwich University Global Cyber Threat Observatory and Center for Advanced Computing and Digital Forensics, both of which he founded. He received the Distinguished Faculty Award in the Norwich College of Graduate and Continuing Studies. He retired from the university in July, 2015.
Dr. Stephenson has lectured or delivered consulting engagements for the past 45 years in eleven countries plus the United States and has been a technologist for fifty-three years.
Dr. Stephenson obtained his PhD by research in computing at Oxford Brookes University, Oxford, England where his research was in the structured investigation of digital incidents in complex computing environments. He holds a Master of Arts degree (cum laude) in diplomacy with a concentration in terrorism from Norwich University. He currently is pursuing a second PhD in law focusing on cyber jurisprudence research.
Dr. Stephenson is a full member of the Vidocq Society, for which he acts as Chief Information Security Officer, and has retired as a Fellow of the American Academy of Forensic Sciences. He is a member of the Albany chapter of InfraGard. He held—but has retired from—the CCFP, CISSP, CISM, FICAF and FAAFS designations, and currently is a licensed professional investigator in Michigan.
- Christopher RussellEnterprise Account Engineer, Trend Micro
As an enterprise account engineer at Trend Micro Inc., Christopher Russell focuses on Hybrid Cloud and Data Security, xGEN Endpoint Security, and Network Security. Chris acts as a liaison between enterprise customers, the Trend Micro sales team, and the Trend Micro product teams, providing a hands-on, real-world perspective. Prior to joining Trend Micro in 2014, Chris, a self-described “IT generalist,” held various leadership positions within a variety of technology organizations—categories ranging from corporate business to higher education institutions.
- Michael A. StoneATAG-Installations, DMVA Deputy Director, Commander 46th Military Police Command, Michigan Army National Guard and DMVA
Major General Michael A. Stone is the Commander, 46th Military Police Command, Michigan Army National Guard. In this capacity he provides leadership, mission command and strategic priorities in order to ensure effective and efficient accomplishment of the Command’s missions. General Stone is also an Assistant Adjutant General and responsible for Army armories and installations in the State of Michigan and a Deputy Director of the Michigan Department of Military & Veterans Affairs.
- Marrci ConnerCIS - Cybersecurity Program Lead, CyberPatriot Mentor, Henry Ford College
Marrci has been a Full-time Faculty member of Henry Ford College for the past 10 years. She has over 15 years’ experience as an IT Professional specializing in computer Security. She currently teaches computer programming, digital forensics and cybersecurity courses. Her educational background includes a Bachelor's degree in Business Information Systems from the University of Detroit-Mercy and a Master's in Business Administration/Information Assurance from Walsh College. She holds a Computer Information Systems Security Profession (CISSP) and CompTia Network+ certifications. Her favorite quote is: I don’t know if students will remember everything I taught them but I hope they remember how I made them feel about computer & cybersecurity!
- Steven F. FoxDirector of Information Security & Regulatory Compliance, ETS
Creating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I have successfully led audits testing controls from standards such as NIST CSF, ISO 27001, GDPR, and PCI-DSS. My contributions to the security community include publications in ISSA Journal and CSOonline, and presentations at RSA Conference, Blackhat Executive Summit, and DefCon. As a member of the SecureWorld Expo Advisory Committee, I remain actively engaged in advancing the field of cybersecurity.
- Charles Parker IICybersecurity Lab Engineer, Thomas Edison State University
Charles Parker, II has been in the computer science/InfoSec industry for over a decade in working with medical, sales, labor, OEM and Tier 1 manufacturers, and other industries. Presently, he is a Cybersecurity Lab Engineer at a Tier 1 manufacturer and professor. To further the knowledge base for others in various roles in other industries, he published in blogs and peer reviewed journals. He has completed several graduate degrees (MBA, MSA, JD, LLM, and PhD (ABD)), completed certificate programs in AI from MIT and other institutions, and researches AI’s application to InfoSec, FinTech, and other areas, and is highly caffeinated.
- Rebecca HeroldThe Privacy Professor; CEO, Privacy & Security Brainiacs
Rebecca Herold has more than 30 years of security, privacy, and compliance experience. She is founder of The Privacy Professor Consultancy (2004) and of Privacy & Security Brainiacs SaaS services (2021) and has helped hundreds of clients throughout the years. Rebecca has been a subject matter expert (SME) for the National Institute of Standards and Technology (NIST) on a wide range of projects since 2009, including: seven and a half years leading the smart grid privacy standards creation initiative, and co-authoring those informative references and standards; two years being a co-author of and a SME member of the team that created the Privacy Framework (PF) and associated documents; and three years as a SME team member, and co-author of the Internet of Things (IoT) technical and non-technical standards and associated informative references; and performing throughout the years proof of concept (PoC) tests for a variety of technologies, such as field electricity solar inverters, PMU reclosers, and associated sensors. Rebecca has served as an expert witness for cases covering HIPAA, privacy compliance, criminals using IoT devices to track their victims, stolen personal data of retirement housing residents, tracking apps and website users via Meta Pixels and other tracking tech, and social engineering using AI. Rebecca has authored 22 books, and was adjunct professor for nine and a half years for the Norwich University MSISA program. Since early 2018, Rebecca has hosted the Voice America podcast/radio show, Data Security & Privacy with the Privacy Professor. Rebecca is based in Des Moines, Iowa, USA. www.privacysecuritybrainiacs.com
- Rebecca HeroldThe Privacy Professor; CEO, Privacy & Security Brainiacs
Rebecca Herold has more than 30 years of security, privacy, and compliance experience. She is founder of The Privacy Professor Consultancy (2004) and of Privacy & Security Brainiacs SaaS services (2021) and has helped hundreds of clients throughout the years. Rebecca has been a subject matter expert (SME) for the National Institute of Standards and Technology (NIST) on a wide range of projects since 2009, including: seven and a half years leading the smart grid privacy standards creation initiative, and co-authoring those informative references and standards; two years being a co-author of and a SME member of the team that created the Privacy Framework (PF) and associated documents; and three years as a SME team member, and co-author of the Internet of Things (IoT) technical and non-technical standards and associated informative references; and performing throughout the years proof of concept (PoC) tests for a variety of technologies, such as field electricity solar inverters, PMU reclosers, and associated sensors. Rebecca has served as an expert witness for cases covering HIPAA, privacy compliance, criminals using IoT devices to track their victims, stolen personal data of retirement housing residents, tracking apps and website users via Meta Pixels and other tracking tech, and social engineering using AI. Rebecca has authored 22 books, and was adjunct professor for nine and a half years for the Norwich University MSISA program. Since early 2018, Rebecca has hosted the Voice America podcast/radio show, Data Security & Privacy with the Privacy Professor. Rebecca is based in Des Moines, Iowa, USA. www.privacysecuritybrainiacs.com
- Daniel ShoemakerProfessor and Director, Graduate Program, University of Detroit Mercy
Daniel P. Shoemaker, PhD, is a Full Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy, where he has worked for over 35 years. He has retired from his administrative position as Department Chair, PI for the NSA Center and Subject Matter Expert for DHS and NIST. He is enjoying more time with his students and writing. He has published over 200 cybersecurity papers and articles as well as this list of books:
• Cybersecurity “The Essential Body of Knowledge”
• “The CSSLP Certification All-in-One Exam Guide”
• Cybersecurity “Engineering a More Secure Software Organization”
• “A Guide to the National Initiative for Cybersecurity Education (NICE) Framework: The Complete Guide to Cybersecurity Risk & Controls in Cyber Security”
• ”Implementing Cybersecurity: A Guide to the NIST Risk Management Framework”,
• “Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Product”
• “How to Build A Cyber Resilient Organization”
• “The Complete Guide to Cybersecurity Risks and Controls”
• Information Assurance for the Enterprise: A Roadmap to Information Security”
• “The Cybersecurity Body of Knowledge”
• “The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity” - Bobby BuggsMobility Expert, Check Point Software Technologies
Bobby Buggs is a telecommunications professional that hails from Flint, MI. Bobby has worked in the mobile/wireless industry for over 19 years. Over the course of his career, Bobby has held numerous roles in both sales and technical disciplines. Bobby is also an MSU alumnus.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Zee AbdelnabiAdvisory Manager / Security Researcher, Deloitte
Zee is a security researcher and a manager experienced in managing large, complex global teams that focus on: advanced penetration testing, connected car security, SIEM, vulnerability management, threat modeling, and mobile security. Zee is an active security community member.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John TurnerSenior Director, Cloud Security, Optiv
John Turner is an accomplished IT executive with more than 20 years of leadership and operational IT experience. As the director of cloud security enablement at Optiv, Turner’s team of cloud architects are responsible for helping to ensure the successful integrated delivery of cloud security solutions. Turner plays a key part in bringing different areas of Optiv’s team together to deliver seamless cross practice wins. Turner also works as part of the cloud leadership team to define Optiv’s strategy and product portfolio.
Turner’s extensive operational background brings a unique client first perspective to the execution of Optiv’s cloud security practice. An early cloud veteran, Turner has first-hand experience moving his previous organizations to the cloud, as well as experience managing app-dev and dev-ops teams. His background also includes extensive experience with infrastructure, WLAN, performance management, analytics, data center builds, enterprise resource planning implementations, identity and access
management development, firewall and identity-based networking.Prior to joining Optiv in 2016, Turner was the vice president of product strategy at Adaptive Communications. He previously served as general manager of unified communications solutions at Aruba Networks. Turner got his start at Brandeis University building identity solutions and eventually leading the network and systems group as its director. Turner’s passion as a technologist has always fueled his interest and desire to make transformative changes with technology.
Turner has authored articles and papers on the use of technology as a change agent, and as a subject matter expert on wireless LAN and unified communications. Turner has appeared in many technology magazines, been a featured presenter and delivered keynote addresses at several national conferences. Turner holds a Bachelor of Arts degree from the College of Wooster in Wooster, Ohio.
- Shane HarschPrincipal Solution Engineer, SentinelOne
Shane Harsch is a Principal Solution Engineer at SentinelOne, a SANS Instructor, and an Adjunct Instructor at the University of Michigan with more than 25 years of experience in military, manufacturing, consulting, and professional services. He is a commissioned officer in the U.S. Army (MI), holds degrees in business (MBA) and computational linguistics (BA), and maintains the following certifications: GCIA, GCIH, GCED, CISSP, CTIA.
- Michael Muha, PhD, CISSP, CISM, CIPM, Certified GDPR PractitionerChief Information Security & Privacy Officer, WorkForce Software
Mike drove the global expansion of WorkForce Software’s cloud-based workforce management products from one data center to eight across the US, Europe, Canada, and Australia, and directed all compliance efforts (starting with SAS 70 and moving onto SOC 1, ISAE 3402, SOC 2, ISO 27001 certification, and EU-US Privacy Shield certification). Having led the company’s GDPR journey, he’s currently implementing a “Personal Information Management System” and additional global security controls to protect company and customer data.
- Patrick TurnerVice President and Chief Information Officer, Schoolcraft College
Patrick Turner, VP & CIO at Schoolcraft College, oversees all areas of IT. Patrick has designed and implemented tier 3+ data centers. Patrick has presented on various topics at MMC, Cisco Academy and Data Center World conferences. Patrick holds MS (MIT) and BS (MTU) degrees in Mechanical Engineering.
- Barbara L. CiaramitaroChair, Undergraduate Information Technology, Capella University
Dr. Barbara L. Ciaramitaro is the Chair of the Undergraduate Information Technology program at Capella University. She has taught graduate and undergraduate courses on a variety of topics including cybersecurity, emerging technology, complex systems dynamics, software engineering and project management. Dr. Ciaramitaro is a frequent speaker and author on cybersecurity, current technology issues, business intelligence, data and decision-making, and cyber physical systems. She has authored and edited books on quality assurance, virtual world technologies, mobile technology, privacy, security, social engineering and forensics.
- J. Wolfgang GoerlichCISO, Oakland County, Michigan Government
J. Wolfgang Goerlich is an active part of the Michigan security community. He hosts a YouTube video series and the Encode/Decode Security podcast. Wolfgang regularly advises on and presents on the topics of risk management, incident response, business continuity, secure development life cycles, and more.
Prior to his current role, Wolfgang led IT and IT security in the healthcare and financial services verticals. He has held VP positions at several consulting firms, leading advisory and assessment practices. He is an active part of the security community, and regularly advises on and presents on the topics of security architecture and design.
- Chad Childers, ModeratorAutomotive Solutions Director, Sec eDGE
Internationally recognized security thought leader. Expert on Threat Modeling, IoT Security, Threat Analysis and Risk Assessment (TARA), Cryptography, Application Security, and Agile Development Security.
Chad is a voting member of SAE Vehicle Cybersecurity Committee TEVEES18A that shapes the future of automotive security and leading a TARA standardization sub-committee.
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Dr. Peter StephensonTechnology Editor and author of "Threat Hunter" blog, SC Magazine
Dr. Peter Stephenson is the Technology Editor and author of the “Threat Hunter” blog in SC Magazine, a leading industry publication for which he has written for over 20 years. He is a cyber criminologist, digital investigator and digital forensic research scientist, as well as being a writer, researcher and lecturer on cyber threat analysis, cyber criminology, cyber jurisprudence and cyber criminalistics on large-scale computer networks.
He has lectured extensively on digital investigation and security, and has written, edited or contributed to 20 books and several hundred articles and peer-reviewed papers in major national and international trade, technical and scientific publications. He is the series editor of the new Peter Stephenson Series on Cyber Crime Investigation (Auerbach). He spends his time in retirement as a writer and researcher specializing in cyber threat analysis, cyber criminology, and cyber jurisprudence.
Dr. Stephenson was an Associate Professor and the Chief Information Security Officer for Norwich University and, prior to his retirement in July of 2015, was Director of the Norwich University Global Cyber Threat Observatory and Center for Advanced Computing and Digital Forensics, both of which he founded. He received the Distinguished Faculty Award in the Norwich College of Graduate and Continuing Studies. He retired from the university in July, 2015.
Dr. Stephenson has lectured or delivered consulting engagements for the past 45 years in eleven countries plus the United States and has been a technologist for fifty-three years.
Dr. Stephenson obtained his PhD by research in computing at Oxford Brookes University, Oxford, England where his research was in the structured investigation of digital incidents in complex computing environments. He holds a Master of Arts degree (cum laude) in diplomacy with a concentration in terrorism from Norwich University. He currently is pursuing a second PhD in law focusing on cyber jurisprudence research.
Dr. Stephenson is a full member of the Vidocq Society, for which he acts as Chief Information Security Officer, and has retired as a Fellow of the American Academy of Forensic Sciences. He is a member of the Albany chapter of InfraGard. He held—but has retired from—the CCFP, CISSP, CISM, FICAF and FAAFS designations, and currently is a licensed professional investigator in Michigan.
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Dr. Peter StephensonTechnology Editor and author of "Threat Hunter" blog, SC Magazine
Dr. Peter Stephenson is the Technology Editor and author of the “Threat Hunter” blog in SC Magazine, a leading industry publication for which he has written for over 20 years. He is a cyber criminologist, digital investigator and digital forensic research scientist, as well as being a writer, researcher and lecturer on cyber threat analysis, cyber criminology, cyber jurisprudence and cyber criminalistics on large-scale computer networks.
He has lectured extensively on digital investigation and security, and has written, edited or contributed to 20 books and several hundred articles and peer-reviewed papers in major national and international trade, technical and scientific publications. He is the series editor of the new Peter Stephenson Series on Cyber Crime Investigation (Auerbach). He spends his time in retirement as a writer and researcher specializing in cyber threat analysis, cyber criminology, and cyber jurisprudence.
Dr. Stephenson was an Associate Professor and the Chief Information Security Officer for Norwich University and, prior to his retirement in July of 2015, was Director of the Norwich University Global Cyber Threat Observatory and Center for Advanced Computing and Digital Forensics, both of which he founded. He received the Distinguished Faculty Award in the Norwich College of Graduate and Continuing Studies. He retired from the university in July, 2015.
Dr. Stephenson has lectured or delivered consulting engagements for the past 45 years in eleven countries plus the United States and has been a technologist for fifty-three years.
Dr. Stephenson obtained his PhD by research in computing at Oxford Brookes University, Oxford, England where his research was in the structured investigation of digital incidents in complex computing environments. He holds a Master of Arts degree (cum laude) in diplomacy with a concentration in terrorism from Norwich University. He currently is pursuing a second PhD in law focusing on cyber jurisprudence research.
Dr. Stephenson is a full member of the Vidocq Society, for which he acts as Chief Information Security Officer, and has retired as a Fellow of the American Academy of Forensic Sciences. He is a member of the Albany chapter of InfraGard. He held—but has retired from—the CCFP, CISSP, CISM, FICAF and FAAFS designations, and currently is a licensed professional investigator in Michigan.
- Jeffrey GromanSenior Manager, Mandiant Global Consulting Services
Mr. Groman is a Senior Manager in the Mandiant Global Consulting Services organization and a senior member
of the Mandiant Central Region leadership team. He is an Information Security veteran with over 18 years of
experience as a practitioner, mentor, and trusted advisor. His primary focus is helping clients prepare for a
security breach. He also works with clients scoping and delivering technical and strategic assessments and
forensic investigations.
Mr. Groman has assisted customers in the Fortune 10-500 building security programs ranging from Vulnerability
Management, Application Security, Incident Response and SOC implementations. He also has extensive
experience running assessments and investigations across industries such as healthcare, manufacturing, retail,
finance, and hospitality.
Regional Manager
Mr. Groman served as a regional services manager for a Security Product and Services Company, helping their
largest customers build and mature their security programs. Elements of these security programs included
developer training, prioritizing fixes, and metrics reporting and analytics. Mr. Groman played a pivotal role in
identifying the right set of tools and augmenting customer staff with rightly skilled resources and building out
repeatable processes.
Program Manager
Mr. Groman worked for a large Health Insurer building out their Application Security Program and internal
Forensics capability. The capabilities did not previously exist in-house, and Mr. Groman was responsible for
building these capabilities through a combination of in-house staff and trusted partners.
EDUCATION
» BS Electrical & Computer Engineering, University of Colorado at Boulder, 1995
PROFESSIONAL TRAINING AND CERTIFICATIONS
» Certified Information Security Systems Professional (CISSP) #58218
» GIAC Certified Web Application Defender (GWEB) 2011
» GIAC Certified Forensic Analyst (GCFA) 2008 - Martin BallyVP & CSO, Diebold Nixdorf
Martin Bally is currently the Vice President and Chief Security Officer for Diebold Nixdorf with more than 20 years of experience. Prior he spent four years in the legal and financial industry and 12 years at Chrysler. He holds a Master’s of Science in Information Assurance and the CISSP, CISM, CISO, and CRISC security certification.
- Marcia MangoldInformation Security Control Assurance Manager , Experian
Marcia has spent the past 17+ years using her abilities to be a business enabler for IT and IS, and has worked for several organizations, including IBM, GE, and Blue Cross Blue Shield of Michigan. Marcia focuses on Information Security awareness training, risk, and policy lifecycle management. Marcia is a Certified Information Systems Security Professional (CISSP), a founding board meeting of the local (ISC)2 chapter, a proud member of the Michigan InfraGard chapter, and a board member of ISSA. In addition, Marcia was a contributing NIST Big Data Public Working Group member for the Special Publication (NIST SP) - 1500-4, Big Data Interoperability Framework: Volume 4, Security and Privacy.
- David BartonManaging Director, UHY Consulting
David Barton is a Managing Director with UHY Consulting and practice leader of the Technology, Risk, and Compliance practice, which provides cybersecurity consulting and compliance services focused around information technology. He has over 30 years of practical experience in information systems and technology risk and controls.
David is frequently asked to speak at national and regional events, such as SecureWorld and the Cloud Security Alliance Congress. He is the primary author of the CSA position paper on AICPA Service Organization Control Reports. He regularly provides his input and opinions for national publications such as Compliance Week, Accounting Today, and the Atlanta Journal Constitution.
David holds an MBA and BS in Business Administration from Appalachian State University. He is Certified in Risk and Information Systems Control (CRISC), received the Certified Information Systems Auditor (CISA) designation in 1988, and is a member of the Atlanta chapter of the Cloud Security Alliance. David has active civic memberships with the Atlanta chapter of the Porsche Club of America and the Tire Rack Street Survival® program for teen driver education. He is also a certified high-performance driving instructor and former Porsche Club racer. - Barbara HiemstraPrivacy Engineer, IT Security and Compliance , Steelcase Inc.
Barbara leads the Global Security Awareness/Phishing program to reduce risk and improve the cybersecurity culture at Steelcase. This includes creating content for employee awareness articles, training classes, and conducting multi-language phishing simulation and reporting.
Prior to joining Steelcase, Barb was the Information Security-Governance Manager at Perrigo; the Information Security Director and the Deputy Director for IT at Kent County, Michigan; and Tech Director for Grandville Public Schools. She co-founded the West Michigan Cyber Security Consortium (WMCSC). She served on the Board and worked part-time for Cybercrime Support Network (CSN), whose goal is to bring a voice to and serve the victims of cybercrime.
Barb holds a BA degree in Telecommunications from Michigan State University, Certified Information Privacy Technologist (CIPT), GIAC Security Leadership Certification (GLSC) and the GIAC Critical Controls Certificate (GCCC), GIAC Law of Data Security & Investigations (GLEG), and ITIL2 Foundations and Change Management certifications.
- Brett WilliamsMajor General, U.S. Air Force (Retired)
Major General (Ret) Brett Williams co-founded IronNet Cybersecurity and is the President of the Operations, Training and Security Division. Providing strategic vision and the foundational security platform solutions for IronNet, General Williams also serves as the Chief Security Officer responsible for product, enterprise and physical security. His division provides security analytics, hunt operations, and threat analysis and intelligence support for the IronNet Cyber Operations Center, as well as product training and support for client operations centers.
A highly experienced combat fighter pilot, General Williams held several significant command positions during his 33-year career with the U.S. Air Force. As Director of Operations for U.S. Cyber Command, General Williams was the architect of DoD's operational approach to cyberspace operations. He was responsible for the operations and defense of DoD networks, and offensive cyberspace operations in support of U.S. strategic objectives. General Williams also served as Director of Operations (A30) at the Pentagon, leading more than 1,300 Airmen and civilians stationed worldwide; and as Director of Communications, Command and Control for U.S Pacific Command.
As an authority on cybersecurity, General Williams has appeared on NBC's Meet the Press with Chuck Todd, ABC's This Week with George Stephanopoulos and MSNBC's The Last Word with Lawrence O'Donnell. In addition, he conducts cyber-risk training seminars for corporate boards as a faculty member of the National Association of Corporate Directors. He earned a BS in Computer Science from Duke University and three additional graduate degrees in management and national security studies.
- Mike DonofrioDirector, IT Security & Compliance, Martinrea Inc.
- Clark R. CrainGRC Consultant, Comp-West, LLC
I have been a CISSP for more that 19 years, CISM for more that 14, and a CRISC for more that 7. I have worked as a compliance consultant for PCI, HIPAA-HITECH, NERC, NRC and others.
- Dr. Faith HeikkilaInformation Security Governance Specialist, Perrigo Company plc
Faith Heikkila, Ph.D., CISM, FIP, CIPM, CIPP-US is an Information Security Architect - Governance at Perrigo Company plc. Dr. Heikkila has prior CISO practitioner experience in overall information security governance, compliance, vendor management, protection of personal and financial information, along with GDPR expertise in a global pharmaceutical company.
- Joe CarusilloProgram Director, Security Client Initiatives, IBM
Joe Carusillo currently serves as Program Director of Client Initiatives for IBM’s Security Business Unit. His responsibilities include leading the team responsible for developing and driving the implementation of the strategy for vertical industry sales, consulting, solution development and thought leadership for IBM Security. They also include managing the Security Tiger Sales team and the IBM Security Strategic Accounts program.
- Shanee YelderIT Audit Specialist, Meadowbrook Insurance Group
Shanee has Big 4 accounting firm and private sector (financial services) experience working as an IT Auditor. She holds a BS in Business Administration with a concentration in Information Systems Management and is currently pursuing a MBA.
- Mark TestoniPresident & CEO of SAP National Security Services (NS2), President of NS2 Serves
Testoni is among the nation’s leading experts in the application of technology to solve problems in government and industry, in the U.S. national security space. With more than 15 years of tech industry experience, 20 years in the U.S. Air Force and 30 years of public-sector management experience, Testoni is a sought-after business strategist and thought leader.
- Kevin PetersonDirector of Security and Network Transformation, Zscaler
Kevin Peterson is the director or security and network transformation at Zscaler, where he primarily works with the largest cloud security deployments to ensure that the desired business objectives are achieved. He brings with him the advantage of having lead the security efforts for one of McKesson's (Fortune 10) major business units (75 software products, managed services...), as well as the company-wide cloud security strategy, ranging from A to Z (Azure to Zscaler!). As a top practitioner and trusted advisor on both enterprise and cloud security topics, his goal is helping everyone achieve the most effective security with the lowest cost to the business. He is also a featured speaker on the Security Influencers Podcast (available on iTunes), co-author of one information security book, and patent holder on security technologies. And, of course, maintains a presence in the metro Atlanta information security community.
- Bob BacigalAVP, Information Security, Amerisure Insurance
Bob Bacigal is the Assistant Vice President of Information Security at Amerisure Insurance. He has over 30 years of experience in information security management, risk management, incident response, disaster recovery, and business continuity planning. Prior to joining Amerisure, he held security management positions with Great Lakes BanCorp, the Federal Reserve Bank of Chicago, and Delphi Corporation. Bob is an active member of the InfoSec community and has served as President and Chairman of the InfraGard Michigan Members Alliance (IMMA) and is currently serving on its Board of Directors. He is an active member of the State of Michigan CSO Kitchen Cabinet, Detroit CISO Executive Council Governing Body, and the SecureWorld Detroit Advisory Council. Bacigal earned his bachelor’s degree in Criminology form Eastern Michigan University and is both a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM).
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Kierk SanderlinDirector of Engineering, Check Point Software
Kierk Sanderlin is the Director of Engineering at Check Point Software Technologies. He has been in the cyber security space for almost 20 years and has been a regular speaker at various cyber security events across the region.
- Steven AielloInformation Security (Focusing on Payments), X
Mr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.
- Kathy OssianFounder & CEO, Ossian Law P.C.
Kathy Ossian is Founder and CEO of Ossian Law, P.C., a firm focused exclusively on Information Technology Law. Kathy has practiced for 35 years; over 22 in Information Technology law. She is a frequent author and speaker on timely IT law topics and the Managing Editor of “Social Media and the Law” published by PLI. Kathy is also an Adjunct Faculty Member at Oakland University and the University of Detroit Mercy Law School. She has been named for many years as a Best Lawyer in America and a Michigan Super Lawyer in information technology law.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes