googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 17, 2023
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 4:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] AI vs. AI: The Future of Cybersecurity in the ChatGPT World
    • session level icon
    speaker photo
    CISO, Abnormal Security
    speaker photo
    Head of Machine Learning, Abnormal Security
    speaker photo
    CISO, LendingPoint
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Generative AI, and specifically ChatGPT, has taken over the conversation in recent months. The productivity increase it enables for financial services organizations is astonishing—ensuring compliance with regulations, detecting potential fraud, analyzing investment portfolios, and more.

    But in the same way that it helps financial services employees do their jobs more efficiently, it can also be used by cybercriminals to run more effective scams. An increase in attacks brought on by generative AI tools means only one thing: our security solutions must be more effective to keep our employees, customers, and brand safe.

    Join us for this session where our panelists will discuss:

    • The pros and cons of generative AI tools like ChatGPT
    • How generative AI is changing the attack landscape
    • How cybersecurity must evolve in response to AI-created attacks
    • And what security leaders must do to protect their companies from these threats

    With key insights from security leaders and machine learning experts, this session will give you insight into what you need to know about ChatGPT, both now and in the future.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Navigating the Insider Threatscape
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Threat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.

    12:00 pm
    [Fireside Chat] The Ethics of Technology
    • session level icon
    speaker photo
    Co-Founder & Managing Partner, XPAN Law Partners
    speaker photo
    Chief Security Officer & Technology Lead, Trexin Group
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    “The pace of technological change has been accelerating at an unprecedented rate over the past few decades” (at least, according to ChatGPT). This creates a continuing stream of opportunities, and also causes considerable less-desirable disruption. Technology is about what “can be done”, whereas ethics are what “should be done”. This talk discusses our responsibilities viewed through the lens of providers, practitioners, users, and the US legal system.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Democratizing Threat Modeling Across the Enterprise
    • session level icon
    speaker photo
    VP & Lead Cybersecurity Architect, Threat Modeling Center of Excellence Program Lead, JPMorgan Chase
    speaker photo
    VP & Lead Cybersecurity Architect, JPMorgan Chase; President, WiCyS Houston Affiliate
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Key Take-Away: Understand how to better plan, deliver, and execute Threat Modeling across the enterprise.

    This presentation will help answer the following questions and more:

    • How do you apply governance principles to Threat Modeling?
    • How to apply Threat Modeling across multiple engagement types?
    • How do you ensure enterprise stakeholders including cybersecurity teams and different lines of business benefit from Threat Modeling as a service on an ongoing basis?
    1:00 pm
    [Panel] Financial Services and the Ever-Changing Face of Risk
    • session level icon
    speaker photo
    Technology Evangelist, Uptycs
    speaker photo
    Head of Security Operations, Abnormal Security
    speaker photo
    Sr. Principal, Industries, Okta
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    The cybersecurity community is smart and more than capable of thwarting bad actors. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Hear our panelists’ views on the current threat landscape facing the finance sector and solutions they have to offer.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Technology Disruption and How to Transform Cybersecurity
    • session level icon
    speaker photo
    Cyber Risk Advisor, EY
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Technological advancement is bringing about new challenges where organizations are unable to effectively manage their cyber risk and the impact these risks could have on their business. This presentation speaks to the growing need to evolve cybersecurity and how to transform the way cyber risk is viewed and managed.

    2:00 pm
    2023 Financial Sector Threat Landscape
    • session level icon
    speaker photo
    Global Director, Threat Intelligence, CrowdStrike
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    In this session, we will discuss the latest changes in the cyber threat landscape and zero in on specific threats facing financial services organizations. Attendees will benefit from unique insights into ransomware, data extortion, targeted eCrime, and nation-state actors targeting the sector. We’ll close by proposing actionable recommendations to harden defenses these threats.

    2:00 pm
    When Scams Collide
    • session level icon
    speaker photo
    Program Director, Military & Veteran Program, Cybercrime Support Network
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    The State of the Cybersecurity Workforce
    • session level icon
    2023 Job Data: It Will Surprise You!
    speaker photo
    Founder and CEO, CyberSN and Secure Diversity
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description to come.

    3:00 pm
    Security Awareness Training: A Proactive Approach to Cybersecurity
    • session level icon
    speaker photo
    Senior Information Security Analyst, LPL Financial
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description coming soon.

    3:00 pm
    Point of Scary: The POS Ecosystem
    • session level icon
    speaker photo
    Director of Cloud Security, Financial Services
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    We all use point-of-sale (POS) systems on a regular basis and never give much thought to the technology powering these devices. What OS do these devices use? What kind of networking capabilities do they have? When was the last time the OS was patched? What countries do these devices beacon out to? Does the PCI logo emblazoned on the website actually mean anything? Join us as we delve into several different kinds of systems and discover the convergence of hardware, software, APIs, and an ecosystem built on scary.
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    Cyber World on Fire: A Look at Internet Security in Today’s Age of Conflict
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    This informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.

    Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.

    He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.

    4:00 pm
    A Whole Lotta BS (Behavioral Science) About Cybersecurity
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Let’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security.  We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.

     

Exhibitors
  • Abnormal Security
    Booth:

    Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
    Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.

    Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.

  • CREST
    Booth:

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • CrowdStrike
    Booth:

    CrowdStrike sets the standard for cybersecurity in the cloud era. The CrowdStrike Falcon® platform protects and enables the people, processes, and technologies that drive modern enterprise, delivering superior protection, better performance, reduced complexity, and immediate time-to-value. CrowdStrike secures the most critical areas of enterprise risk—endpoints and cloud workloads, identity, and data—to keep organizations ahead of today’s adversaries and stop breaches.

  • Cybercrime Support Network
    Booth:

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • National Cybersecurity Alliance
    Booth:

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Okta
    Booth:

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Uptycs
    Booth:

    Inspired by CRM and business process analytics, the Uptycs vision is to empower security teams with the same real-time decision making, driven by structured telemetry and powerful analytics.

    By providing a unified view of cloud and endpoint telemetry from a common solution, making every user and platform action auditable, and having an open and extensible API, we eliminate black-box operations, reduce tool sprawl, and ultimately arm modern defenders with the insights they need across their cloud-native attack surfaces.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Mike Britton
    CISO, Abnormal Security

    Mike Britton is the CISO of Abnormal Security, an email security company that uses behavioral AI to prevent business email compromise, supply chain fraud, and other socially-engineered attacks. At Abnormal, he leads the information security and privacy programs, where he is integral in building and maintaining the customer trust program, performing vendor risk analysis, and protecting the workforce with proactive monitoring of the multi-cloud infrastructure. He also works closely with the Abnormal product and engineering teams to ensure platform security and serves as the voice of the customer for feature development.

    Prior to Abnormal, Mike spent six years as the CSO and Chief Privacy Officer for Alliance Data and previously worked for IBM and VF Corporation. He brings 25 years of information security, privacy, compliance, and IT experience from multiple Fortune 500 global companies.

  • speaker photo
    Dan Shiebler
    Head of Machine Learning, Abnormal Security

    Dan is the Head of Machine Learning at Abnormal Security, responsible for leading a team of 40+ detection and ML engineers in building the data processing and ML layers in the platform. Prior to Abnormal, Dan worked at Twitter, first as a staff machine learning engineer in Cortex, and later as the manager of the web ads machine learning team. Before Twitter, Dan worked as a senior data scientist at Truemotion, where he developed smartphone sensor algorithms to price car insurance. He has a PhD in machine learning from the University of Oxford.

  • speaker photo
    Adam Pendleton
    CISO, LendingPoint
  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Rebecca Rakoski
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski is the managing partner at XPAN Law Partners, LLC. Rebecca advises her clients on a proactive, multi jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She uses her extensive experience to work with her clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.

    Rebecca counsels and aggressively defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. As an experienced litigator, Rebecca has handled hundreds of matters in state and federal courts. Rebecca skillfully manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to minimize her client's litigation risks.

    Rebecca regularly negotiates complex contractual provisions that are impacted by domestic and international data privacy regulations including the California Consumer Privacy Act of 2018, and the European Union's General Data Protection Regulation. She understands how the nature of the data can affect the role her client plays in the data transaction and uses that knowledge to mitigate corporate liability.
    As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section.

    Rebecca has been appointed and served in multiple highly complex litigation matters by the New Jersey Superior Court as a Special Master in the areas of technology and eDiscovery. She also served on the Complex Business Litigation Committee that drafted and revised the New Jersey Court Rules involving electronic discovery. Rebecca was on the eDiscovery committee of her prior law firm and created its eDiscovery subgroup.

    Rebecca is on the Board of Governors for Temple University Health Systems and is also the Acting Dean of Online Learning and an adjunct professor at Drexel University’s Thomas R. Kline School of Law.

  • speaker photo
    Glenn Kapetansky
    Chief Security Officer & Technology Lead, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Glenn's current focus areas—as Senior Principal and Chief Security Officer at Trexin Group—are agile management, data protection, and audit/regulatory compliance.

    Glenn speaks and publishes on occasion. He has been named numerous times in various Who's Who, and is a repeat recipient of Bell Labs' Arno Penzias Award for Innovation in the Marketplace. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Glenn's certifications and memberships include IEEE, ISC2 (CISSP), ISACA (CISA), and ITIL (SM).

  • speaker photo
    Karen Harris
    VP & Lead Cybersecurity Architect, Threat Modeling Center of Excellence Program Lead, JPMorgan Chase

    Karen Harris is an IT professional with over 20 years of global banking and finance technical and operational expertise and is an avid threat modeling advocate. Karen is currently the Threat Modeling Center of Excellence Lead, and actively supports Grace Hopper, npower and Technica conferences mentoring and supporting young men and women (including those of color) in pursuing tech careers.

  • speaker photo
    Annie Jamshed
    VP & Lead Cybersecurity Architect, JPMorgan Chase; President, WiCyS Houston Affiliate

    Annie Jamshed is a cybersecurity professional with Bachelor's in Electrical Engineering and Master's in Cybersecurity. She has more than four years' experience working in Security Operations Center performing incident response, forensics, and threat intelligence. She is currently working at JP Morgan Chase as a Security Architect and threat modeling practitioner. Annie is very active in the Houston area cybersecurity community. She serves as President for WiCyS Houston Affiliate and Speaker Wrangler for HouSecCon. She holds CISM, GNFA, GCTI, and CompTIA Sec+.

  • speaker photo
    Jack Roehrig
    Technology Evangelist, Uptycs

    Jack has been passionate about (obsessed with) information security and privacy since he was a child. Attending 2600 meetings before reaching his teenage years, and DEF CON conferences shortly after, he quickly turned an obsession into a career. He began his first professional, full-time information security role at the world's first internet privacy company, focusing on direct-to-consumer privacy.

    After working the startup scene in the 90s, Jack realized that true growth required a renaissance education. He enrolled in college, completing almost six years of coursework in a two-year period, studying a variety of disciplines before focusing on obtaining his two computer science degrees. University taught humility and empathy. These were key to pursuing and achieving a career as a CSO lasting more than 10 years.

    Jack primarily focuses his efforts on mentoring his peers (as well as them mentoring him), advising young companies (especially in the information security and privacy space), and investing in businesses that he believes are both innovative and ethical.

  • speaker photo
    Mick Leach
    Head of Security Operations, Abnormal Security

    Mick Leach is the Head of Security Operations at Abnormal Security. Prior to joining Abnormal, he held several security positions with Fortune 500 organizations, including Alliance Data and Nationwide Insurance and served in the United States Army for over 8 years.

    Mick is a seasoned IT security leader with an extensive background in managing high-performing teams tasked with enterprise risk reduction through the engineering, implementation, and operations of industry-leading information security solutions. He is certified by GIAC in multiple areas and a standing member of the GIAC Advisory Council.

  • speaker photo
    Tom Malta
    Sr. Principal, Industries, Okta
  • speaker photo
    Brandon M. Bapst
    Cyber Risk Advisor, EY

    Brandon has more than nine years of strategic experience in the security risk field. As a Cyber Risk Advisor within EY's Cyber Transformation practice, he works closely with executives, CSOs and CISOs on developing mature cyber risk programs. He has worked with Global Fortune 100 companies to transform tactical security programs into holistic enterprise security risk management practices enabled through data driven insights and technology. He is a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and Certified Information Systems Auditor (CISA).

  • speaker photo
    Joshua Shapiro
    Global Director, Threat Intelligence, CrowdStrike

    Joshua Shapiro leads CrowdStrike’s Threat Intelligence business, globally. His team builds strong partnerships and helps customers develop robust intelligence-driven information security programs that stop breaches and reduce risk. Prior to CrowdStrike, Joshua was a leader in Deloitte’s Federal Intelligence & Investigations practice. In this capacity, he stood up special analytical programs across multiple federal law enforcement agencies and led teams that supported multi-agency operations targeting narcotics trafficking, terror finance & procurement, human smuggling, and money laundering networks.

  • speaker photo
    Ally Armeson
    Program Director, Military & Veteran Program, Cybercrime Support Network

    Ally Armeson serves as the Program Director for the Military & Veteran Program at Cybercrime Support Network (CSN). Ally is responsible for building and managing CSN’s Military & Veteran Program, which provides service members, veterans, and their families with the education and resources they need to protect themselves from fraud and scams throughout each phase of military life and beyond.

    She is a milspouse and veteran who served for more than 10 years as an officer in the U.S. Army. During her time in the military, she worked as a Civil Affairs Officer where she developed and implemented many humanitarian assistance projects in developing countries. After transitioning out of the military, Ally completed her MBA from UNC Kenan-Flagler Business School and began her civilian career as an operations manager.

  • speaker photo
    Deidre Diamond
    Founder and CEO, CyberSN and Secure Diversity

    Deidre Diamond is the founder and CEO of CyberSN, the largest cybersecurity talent acquisition technology and services firm in the U.S., transforming job searching and hiring for the cybersecurity industry. Standardizing all cybersecurity job functions into a common taxonomy of 45 roles, the CyberSN platform allows professionals to make anonymous, public profiles that match with employer-posted job descriptions using the same taxonomy. This innovation is disruptive and solves a serious national security issue. Deidre’s leadership style combines 25 years of experience working in technology and staffing, her love of the cybersecurity community, and a genuine enthusiasm for people. She has led large-scale sales and operations and built high-performance teams at Rapid7 and Motion Recruitment prior to founding her own organizations. She believes a company-culture established on ‘anything is possible’ attitudes and open communication frameworks, along with positive energy, career advancement, and kindness, enables her teams to have fun at work and reach beyond peak performance. She also encourages the use of EQ (Emotional Intelligence) skills: self-awareness, self-regulation, motivation, social skills, and empathy. Deidre has also founded SecureDiversity.org, a non-profit organization working to raise awareness for, and increase the hiring of, women and underrepresented humans in the cybersecurity workforce. She has also spoken at some of the biggest tech summits, conferences, and podcasts in the world including ISC2 Congress, RSA, ISSA International, and Hacker Halted.

  • speaker photo
    Michael Terry
    Senior Information Security Analyst, LPL Financial
  • speaker photo
    Aaron Weaver
    Director of Cloud Security, Financial Services

    Aaron Weaver has over 20 years' experience specializing in application and cloud security and providing training sessions at various international industry events. His work includes security consulting, penetration testing, threat modeling, and code reviews. Aaron also enjoys honey bees and recently has been experimenting with hive designs.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes