- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Thursday, June 10, 202110:00 amExhibitor Hall openRegistration Level:
- Open Sessions
10:00 am - 11:00 amLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
10:15 amAdvisory Council RoundtableTopic: NIST SP 800-171 and CUICISO, Needling WorldwideCybersecurity Director, Gannett FlemingRegistration Level:- VIP / Exclusive
10:15 am - 10:55 amThis session is for SecureWorld Advisory Council members by invite only.
NIST SP 800-171 aligns DoD and government contractors around a unified set of standards to ensure proper cyber hygiene and safeguarding of Controlled Unclassified Information (CUI). Join this roundtable discussion to discuss the challenges and benefits of this approach to security and compliance. Wes Knight and Tamika Bass will moderate.
10:15 am[Panel] How Industry, Government, and Higher Ed Can Collaborate to Train the Next Generation of Cyber DefendersCISO, City of New York; Head of NYC Cyber CommandVice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of EngineeringAVP, Emerging Tech, Cyber NYC, New York City Economic Development CorporationPrivate Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and AetnaSr. Director of Cybersecurity Education, NYU TandonRegistration Level:10:15 am - 10:55 amWe have a well-known cybersecurity jobs gap, while at the same time, studies have shown that the current workforce is underemployed. Higher education institutions need to actively partner with companies and government organizations to co-create scalable cybersecurity education that can bridge the skills gap, effectively prepare cybersecurity professionals to anticipate and adapt to evolving threats, and clear barriers to entry for a more diverse workforce.
Join a panel with leaders from higher education, government, and industry who will discuss best practices for co-creating scalable, relevant, and affordable cybersecurity training, including:
- The skills and mindsets we need to be teaching our next generation of professionals
- Partnership strategies for industry and government
- Best practices for optimal co-curriculum design
- How to find and nurture cybersecurity talent
10:15 amA Critical Look at the Security Posture of the Fortune 500Sr. Director, Chief Security Data Scientist, Rapid7Registration Level:- Open Sessions
10:15 am - 10:55 amThe global pandemic has brought many changes to the IT landscape of corporations across the globe. To see how this has impacted the “best of the best,” Rapid7 Labs has reprised its seminal industry cyber exposure research from 2018 to see how the security posture of Fortune 500 organizations has evolved (or devolved), and to present solid advice to CISOs and practitioners looking to improve their cybersecurity practices.
10:15 amProtecting Government Organizations from Third-Party BreachesDirector, Sales Engineering, SecureLinkRegistration Level:- Open Sessions
10:15 am - 10:55 amThe past year alone has revealed major vulnerabilities in critical infrastructure systems that resulted in immediate action to be taken by the White House. If there’s one lesson to be learned from the Colonial Pipeline attack and similar recent attacks such as the SolarWinds breach, it’s that companies must do everything they can to protect their critical infrastructure, environments, and networks.
Within the last year, nearly half of organizations were victims of a cyberattack that was caused by a third-party vendor. The effectiveness of hackers using third parties to infiltrate internal networks is still seen in attacks on critical infrastructure systems like water plants and gas pipelines. The only way to really know the threats emerging from sophisticated and advanced hacking methods is by assessing all points of vulnerability.
In this presentation, learn how government organizations can take action and put the right protocols in place to protect specifically against third-party breaches and provide actionable best practices using real life examples. With 54% of organizations not monitoring the security and privacy practices of third parties that they share sensitive or confidential information with on an ongoing basis, we will touch on why these organizations are so susceptible to attacks in the first place and the underlying issues when it comes to government entities using external vendors.
11:00 am[Opening Keynote] Building the Future in CybersecurityCISO, State of WashingtonCISO, State of ColoradoChief Risk Officer, State of North CarolinaCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:- Open Sessions
11:00 am - 11:45 amOur panelists will explain their roles during COVID-19 and how they dealt with security challenges over the past year, then move on to discuss:
- coming year priority projects
- the ransomware surge and preparing for security incidents
- their organization’s security culture and training to deal with issues
- innovative, special projects they are most excited about moving forward
11:45 amNetworking BreakRegistration Level:- Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThe Evolution of Business Email CompromiseFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:- Open Sessions
12:00 pm - 12:30 pmThis session is led by two of the top Business Email Compromise (BEC) investigators at the U.S. Secret Service. BEC is rampant, and every agency or organization with funds to spend is at risk. Last year alone, the FBI Internet Crime Complaint Center (IC3) received more than 19,000 BEC/EAC (Email Account Compromise) complaints with adjusted losses of $1.8 billion.
How does this type of cyberattack start, how is it uncovered, and what should you do if you discover your organization is a victim? This session will use case studies to help answer these questions and explain practical steps your agency or organization can take to mitigate this risk.
12:00 pmUsing the CIS Controls to Measure and Support Your Security ProgramElection Security Partnership Program Manager, Office of the Secretary, Commonwealth of MassachusettsRegistration Level:- Open Sessions
12:00 pm - 12:30 pmIn this session, you will learn what the CIS Controls are, why people use them, and how they can be used to grade the maturity of your security program. This will help you shape your security budget for the next few years. Presentation Level: MANAGERIAL (security and business leaders)
12:00 pmAdapting Threat Management Strategy to Address Predator and PreyResident CISO, ProofpointRegistration Level:- Open Sessions
12:00 pm - 12:30 pmThe last year has forced us to make a paradigm shift to people as our perimeter. This evolution requires rethinking our approach to threat management and response. We will walk through an end-to-end method that incorporates the prey’s vulnerabilities concerning predatory threats.
You will leave with an understanding of how modeling adaptive threat management strategies differentiate responses for predators vs. prey.
12:00 pmApplication Security: A Multi-Pronged ApproachSecurity Solutions Architect, RadwareRegistration Level:- Open Sessions
12:00 pm - 12:30 pmIf you’re reading this, it’s probably because you’ve been responsible at some level, or at some point in time, for protecting your enterprise applications. We are all aware that applications are subject to attackers’ attempts to either take an application offline or exfiltrate data from the application for sale on the Dark Web. So, how can you prevent application downtime or data exfiltration? Join us to look at the state of the art technologies used to prevent the most advanced attacks.
12:30 pmNetworking BreakRegistration Level:- Open Sessions
12:30 pm - 12:45 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:45 pmA Holistic Cyber Defense StrategyCISO, City of Los Angeles, Information Technology AgencyRegistration Level:- Open Sessions
12:45 pm - 1:15 pmThe threat landscape is evolving rapidly and so must the defense strategy. This presentation will walk through a holistic cybersecurity strategy for security and business leaders in today’s digital world. Key takeaways will include:
- Understand what is the holistic cybersecurity approach and why it is important
- Technology and technique involved in holistic cyber defense
- Lessons learned and recommendations
12:45 pmWhat We Need Now: A National Cybersecurity Safety BoardCybersecurity Program Chair, Indiana UniversityFormer Chairman, National Transportation Safety Board; Founder, Hart Solutions LLPRegistration Level:- Open Sessions
12:45 pm - 1:15 pmNo system for investigating and reporting on cyber attacks is perfect, and incentives will often be misaligned in this context. However, creating a National Cybersecurity Safety Board (NCSB), similar to the National Transportation Safety Board (NTSB), could help protect organizations and critical infrastructure more effectively than ever before. But how would such a Board function, and could it succeed where past public-private collaborations have failed given the rapid pace of technical innovation in the cybersecurity field? This session will examine the possibilities and limitations of such an approach within the broader context of critical infrastructure protection.
Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)
12:45 pmTop 4 Reasons Why Privileged Access Management Implementations FailChief Strategy Officer, RemediantRegistration Level:- Open Sessions
12:45 pm - 1:15 pmIt is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management (PAM) technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.
Join Remediant in this discussion to:
- Learn the five reasons why privileged access management implementations fail
- Identify areas in your IAM program where you can reduce admin access risk
- Capitalize on existing investments, while improving your risk posture
Presentation level: TECHNICAL (deeper dive including TTPs)
12:45 pmHow to Accelerate Zero Trust Adoption Through End-to-End Visibility and Increased IT Ops CollaborationDirector, Systems Engineering - Public Sector Technical Practice, ExtraHopRegistration Level:- Open Sessions
12:45 pm - 1:15 pmIt’s no surprise that Zero Trust initiatives are increasing in importance across federal, state, and local government institutions. New cybersecurity mandates and a boom in remote work due to COVID-19 are just two of the most common factors driving this demand. While the need for adopting Zero Trust is evident, the path to success is not.
In this presentation, Tom Roeh of ExtraHop’s Public Sector team will discuss important considerations for planning, implementing, operating, and securing a Zero Trust deployment. You’ll also learn practical steps Public Sector IT teams can take to achieve your Zero Trust mandate more rapidly and with lower risk. This includes the vital role end-to-end visibility and frictionless collaboration between IT ops teams play across Zero Trust rollout phases.
1:15 pmNetworking BreakRegistration Level:- Open Sessions
1:15 pm - 1:30 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:30 pmZero to 60: Making Security Programmatic and Cultural at Princeton UniversityCISO, Princeton UniversityInformation Security Awareness and Training Program Manager, Princeton UniversityRegistration Level:- Open Sessions
1:30 pm - 2:00 pmJoin members of Princeton University’s Information Security Office as they discuss their mission, focus, and critical successes. Princeton’s multi-year program has already made an impact on the campus’s security mindset, including risk reduction, implementing new technologies, broadening security knowledge, and strengthening campus partnerships. From position papers, a secure password manager, and a creative awareness model, find out how this Ivy League institution went from zero to 60. Learn about Princeton’s approach to making security thinking both programmatic and cultural, and learn about ideas you can apply to your own organization.
Presentation level: MANAGERIAL (security and business leaders)
1:30 pmHow IoT Devices Are Driving Cyber RiskVice President, Strategy & Risk, RiskRecon, a Mastercard companyRegistration Level:- Open Sessions
1:30 pm - 2:00 pmIn the new digital transformation age, companies are more susceptible to exposing their data to the internet. A recent research study conducted by RiskRecon and the Cyentia Institute found that firms with IoT devices exposed to the internet have a 62% higher prevalence of cyber risk issues and 86% of security findings related to IoT devices are rated as critical.
Learn how you can protect your organization from these IoT threats, and how to utilize continuous monitoring data to ensure that your vendors are not exposing their IoT devices to the internet, leaving you just as vulnerable.
1:30 pmCode on Code WarfareField CTO, Americas, SentinelOneRegistration Level:- Open Sessions
1:30 pm - 2:00 pmDuring this talk we will review some security metrics from 2020, which includes common ways organizations are approaching complex security issues such as ransomware and advanced threat groups. During the discussion, we will provide some insight into alternative methods or considerations whereby we can use the power of compute to prevent, discover, and recover from advanced attacks.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:15 pm[Panel] No Perimeter: Securing Public Sector Work in the CloudSolutions Engineer, BitglassSr. Technical Marketing Engineer, GigamonVP, Industry Solutions, ProofpointSr. Sales Engineer, ibossRegistration Level:- Open Sessions
2:15 pm - 3:00 pmThe pandemic fueled massive digital adoption and increased the public’s willingness to interact virtually with government agencies and organizations. And cloud-based tools are also transforming the way Gov-Ed teams work. This panel will discuss trends, controls, and best practices for managing a secure cloud environment, to extend security well beyond the network’s perimeter.
2:15 pm[Panel] Government Workforce 2.0: The New Normal?Advisory CISO, Cisco; Former CISO, The Ohio State UniversitySr. Federal Sales Engineer, SonicWallDirector, US Public Sector Engineering, CrowdStrikeRegistration Level:- Open Sessions
2:15 pm - 3:00 pmThis panel will discuss the ongoing challenges for managing tele-work and the shifting workforce. InfoSec and Operations must have processes and technology in place to keep the agency or organization running while maintaining an acceptable level of risk. This discussion will explore best practices for securing the future of government work.
2:15 pmExecutive Roundtable [VIP invite only]Let's Talk Ransomware: Protecting Your Gov-Ed EcosystemExecutive Public Sector Strategist, CrowdStrikeRegistration Level:- VIP / Exclusive
2:15 pm - 3:00 pmDiscussion forum for executive leaders and SecureWorld Advisory Council members (15-20, by invite only).
As ransomware adversaries and their methods evolve, their continuous attack on vulnerable organizations such as government and education continues to rise. Whether after research, PII, citizen or student data, or confidential data, the success of ransomware adversaries has proven to be damaging to the finances, data, and reputation of our essential institutions.
Join this session as Tina Thorstenson, Public Sector Strategist, moderates a discussion of knowledge sharing and best practices within the government and education ecosystem. We’ll cover topics such as:
- The criminal ransomware ecosystem
- Acceleration of cybersecurity tools used for 2020’s work/learn from home
- The use of threat intelligence to stay ahead of the curve
- Cybersecurity strategies implemented to help prevent ransomware
Sponsored by CrowdStrike and AWS.
3:00 pmNetworking BreakRegistration Level:- Open Sessions
3:00 pm - 3:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:15 pmRansomware Hindsight: As Attacks Surge, What Can We Learn from Previous Response?CISO, State of TexasRegistration Level:- Open Sessions
3:15 pm - 4:00 pmRansomware attacks are surging across the United States, often targeting government and education. That was certainly the case when 20 government agencies in Texas were attacked in a single day. Join this fireside chat as Texas CISO Nancy Rainosek shares what that day was like, how her team approached the attacks, and lessons they learned from remediating them. These insights could help your agency in the future.
3:15 pmExamining the CMMC and the Reasoning Behind ItChairman of the Board, CMMC Center of ExcellenceRegistration Level:- Open Sessions
3:15 pm - 4:00 pmThe Deputy Principal Cyber Advisor for the DoD recently told the Senate Armed Services Cybersecurity Subcommittee that the Cybersecurity Maturity Model Certification (CMMC) is part of a crucial effort: “Our goal must be to complicate and frustrate adversary planning and operations such that they cannot conduct them with impunity or at scale.”
In this session, join the Chairman of the Board at the CMMC Center of Excellence as he explores the logic behind the Cybersecurity Maturity Model Certification, its objectives, and its security benchmarks.
3:15 pm[Panel] Threat Landscape in Flux: Emerging ThreatsCTO, SecureLinkSr. Security Engineer, AutomoxGlobal Principal Engineer, CorelightDirector, Consulting Engineer, BitSightSr. Product Manager, Area 1 SecurityRegistration Level:- Open Sessions
3:15 pm - 4:00 pmThe attack surface is shifting, threat actors are adapting, and security teams must also pivot. This panel will take a dive into various attack vectors, security gaps, and emerging threats organizations are now facing.
4:00 pmNetworking BreakRegistration Level:- Open Sessions
4:00 pm - 4:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:15 pm[Closing Keynote] Intel Briefing: How Cyber Goes to War—and Why You're in the FightCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:- Open Sessions
4:15 pm - 5:00 pmNations and trans-national organizations that would lose a military fight against the U.S. are using cyber as a weapon of choice and a way to level the playing field. In this presentation, CNN Military Analyst and strategic risk advisor Colonel Cedric Leighton (USAF, Ret.) will brief us on the evolution of the nation-state and trans-national cyber threat. He will examine the top four players, their methods, their motives, and their targets. Plus, we’ll look at how Israel targeted Hamas’ cyber capabilities in their most recent conflict. Then, Colonel Leighton will put forward his plan for better defending our government agencies and critical infrastructure against these threats.
- Area 1 SecurityBooth:
Area 1 Security is the only company that preemptively stops Business Email Compromise, malware, ransomware and targeted phishing attacks. By focusing on the earliest stages of an attack, Area 1 stops phish — the root cause of 95 percent of breaches — 24 days (on average) before they launch. Area 1 also offers the cybersecurity industry’s first and only performance-based pricing model, Pay-per-Phish.
Area 1 is trusted by Fortune 500 enterprises across financial services, healthcare, critical infrastructure and other industries, to preempt targeted phishing attacks, improve their cybersecurity posture, and change outcomes.
Area 1 is a Certified Microsoft Partner, and Google Cloud Technology Partner of the Year for Security.
- Armis, IncBooth:
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- BitglassBooth:
Your company’s move to the cloud delivers flexibility and cost savings, but that doesn’t mean you should lose control of your data. Bitglass’ Cloud Access Security Broker (CASB) solution enables your enterprise to adopt cloud apps while ensuring data security and regulatory compliance. Bitglass secures your data in the cloud, at access, on any device.
Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.
- BitSightBooth:
BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. For more information, please visit www.bitsight.com, read our blog, or follow @BitSight on X.
- DuoBooth:
Duo was founded with the belief that security can only be effective if it is easy to use. Through that vision, Duo has built a world-class security platform that is actually enjoyable to use. Duo supports thousands of customers and millions of users in organizations like Accenture, Boston Medical, Emblem Health, Facebook, Toyota, Twitter, Virginia Tech, Yelp and others, and enjoys the highest NPS score in the industry.
- Cloud Security Alliance (CSA)Booth:
The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
- CorelightBooth:
Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com
- CrowdStrike with AWSBooth:
CrowdStrike sets the standard for cybersecurity in the cloud era. The CrowdStrike Falcon® platform protects and enables the people, processes, and technologies that drive modern enterprise, delivering superior protection, better performance, reduced complexity, and immediate time-to-value. CrowdStrike secures the most critical areas of enterprise risk—endpoints and cloud workloads, identity, and data—to keep organizations ahead of today’s adversaries and stop breaches.
- Cybercrime Support NetworkBooth:
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- ExtraHopBooth:
ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com
- GigamonBooth:
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- ibossBooth:
iboss is a cloud security company that provides organizations and their employees fast and secure access to the Internet on any device, from any location, in the cloud. The iboss SASE cloud platform provides network security as a service, delivered in the cloud, as a complete SaaS offering. This eliminates the need for traditional network security appliances, such as firewalls and web gateway proxies, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 100 billion transactions daily, blocking nearly 4 billion malware threats per day. More than 4,000 global enterprises trust the iboss SASE cloud platform to support their workforce, including a large number of Fortune 50 companies.
- OktaBooth:
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- ProofpointBooth:
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- RadwareBooth:
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- Rapid7Booth:
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- RemediantBooth:
Founded in the heart of San Francisco, Remediant offers an industry leading Privileged Access Management (PAM) solution we call SecureOne. Our innovative and enterprise-class cybersecurity solution enables real-time monitoring, Zero Trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security/Cloud ecosystems. We protect organizations from stolen credentials being used against them, which is the number one attack vector across all breaches. To learn more, please visit: www.remediant.com
- RiskReconBooth:
RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
enabling organizations to efficiently operate scalable, third-party risk management programs for
dramatically better risk outcomes. Request a demo to learn more about our solution. - SecureLinkBooth:
SecureLink is a leader in managing secure third-party access and remote support for both enterprise companies and technology providers. SecureLink serves over 400 customers and 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming and retail rely on SecureLink’s secure, purpose-built platform.
- SentinelOneBooth:
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- SonicWallBooth:
SonicWall has been fighting the cybercriminal industry for over 28 years defending small and medium businesses, enterprises and government agencies worldwide. Backed by research from SonicWall Capture Labs, our award-winning, real-time breach detection and prevention solutions secure more than a million networks, and their emails, applications and data, in over 215 countries and territories. These organizations run more effectively and fear less about security.
- TechTargetBooth:
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- WiCyS Critical InfrastructureBooth:
Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Critical Infrastructure was formed to empower women in cyber across the critical infrastructure community and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.
- ZscalerBooth:
Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.
- Tamika BassCybersecurity Director, Gannett Fleming
Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.
- Geoff BrownCISO, City of New York; Head of NYC Cyber Command
Geoff Brown was appointed Chief Information Security Officer for the City of New York in 2016, a position focused on cybersecurity and aggregate information risk across all 100+ NYC departments and agencies. In July 2017, Mayor de Blasio established New York City Cyber Command, led by Geoff and charged with setting Citywide cybersecurity policies; directing
response to cyber incidents; and advising City Hall, agencies and departments on the City's overall cyber defense.Prior to joining City government, Geoff worked in financial services, developing and operating threat management disciplines including threat intelligence, detection, response and countermeasures. Geoff also served in the federal government, including work with the National Commission for Terrorist Attacks Upon the United States (the 9/11 Commission), supporting the investigation’s work with the first responder community in NYC.
- Nasir MemonVice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of Engineering
Nasir Memon is Vice Dean for Academics & Student Affairs, Head of Tandon Online, and a Professor of Computer Science at NYU Tandon. He introduced cybersecurity studies to NYU Tandon in 1999. He is co-founder of NYU's Center for Cyber Security (CCS) & the founder of the OSIRIS Lab, CSAW, and NYU Tandon Bridge & Cyber Fellows programs at NYU. He was the Editor-In-Chief of the IEEE Transactions on Information Security and Forensics and has received several awards for best paper and teaching excellence. He is an IEEE Fellow and SPIE Fellow for his contributions to image compression and media security and forensics.
- Liat KrawczykAVP, Emerging Tech, Cyber NYC, New York City Economic Development Corporation
Liat Krawczyk is Assistant Vice President for Emerging Tech at the NYCEDC where she led the workforce arm of Cyber NYC, NYC's signature program to grow its cybersecurity ecosystem. She is also the founder and head of the women.nyc Childcare Innovation Lab. Prior to joining NYCEDC, Liat grew startups, social-enterprises, and innovation ecosystems with a focus on social impact tech and real estate tech. Liat is co-founder of The Jeneba Project, a nonprofit that provides educational opportunities for Sierra Leonean youth and runs an excellence academy for girls in Lungi. She is also an award-winning documentary film director.
- Jim RouthPrivate Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and Aetna
Jim Routh serves as a security & risk advisor and Board member for several companies, and is the former CISO for MassMutual, CSO at Aetna, and Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and information security as a practitioner, management consultant, and leader of technology, analytic, and information security functions for global firms.
Jim is the winner of the 2009 BITS Leadership Award for outstanding leadership of the Supply Chain Working Group sponsored by the financial industry in collaboration with NIST and the Department of Treasury. He was the 2007 Information Security Executive of the Year for the Northeast and the 2014 North American Information Security Executive of the Year for North America in Healthcare. He is a widely recognized expert in security program implementation and in reducing information security costs while significantly improving enterprise risk management practices through innovation and transformational leadership. He is a co-author of the FS-ISAC white paper on 3rd Party Software Security Controls and several other industry white papers.
- Moderator: Joel CaminerSr. Director of Cybersecurity Education, NYU Tandon
Joel Caminer is the Director of Cybersecurity Education at NYU Tandon. Joel has 20+ years of experience in Financial Services, IT, and Consulting, and has led many strategic initiatives across the IT Risk and cybersecurity spectrum. He previously served as the Global Head of Technology Risk Management at TD Securities; VP of Information Risk Management and CISO at Goldman Sachs; and Manager at Andersen Consulting (now Accenture).
- Bob RudisSr. Director, Chief Security Data Scientist, Rapid7
Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Breach Investigations Report. Bob is a serial tweeter (@hrbrmstr), avid blogger (rud.is), R (#rstats) avunculur, author (Data-Driven Security), speaker, and regular contributor to the open source community.
- Russell DowdellDirector, Sales Engineering, SecureLink
For nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations identify the SecureLink products and product features that can be leveraged to both improve security and streamline workflows.
- Deborah BlythCISO, State of Colorado
- Maria ThompsonChief Risk Officer, State of North Carolina
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Mike Ste MarieElection Security Partnership Program Manager, Office of the Secretary, Commonwealth of Massachusetts
Mike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a Masters in Information Assurance from Norwich University and has been a long time member of the Secureworld Boston Advisory Council.
- Deborah WatsonResident CISO, Proofpoint
Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah led cybersecurity strategy programs for public and private sector organizations across the Fortune 1000. Deborah has a Master's degree in Information Technology Management from Harvard University and is a Doctoral Candidate in Psychology (PsyD) at California Southern University.
- James McGrilSecurity Solutions Architect, Radware
James is a Security Solutions Architect and one of Radware’s thought leaders in Network and Application Security. He's been with Radware for nearly 10 years. James is a self-described geek and enjoys learning about application security and building web applications using the latest technologies. In his off time, James enjoys hiking, surfing, and playing guitar.
- Scott ShackelfordCybersecurity Program Chair, Indiana University
Professor Scott J. Shackelford serves on the faculty of Indiana University where he is Cybersecurity Program Chair along with being the Executive Director of the Ostrom Workshop. He is also an Affiliated Scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Society, as well as a Senior Fellow at the Center for Applied Cybersecurity Research, and a Term Member at the Council on Foreign Relations.
Professor Shackelford has written more than 100 articles, book chapters, essays, and op-eds for diverse publications. Similarly, his research has been covered by an array of outlets, including Politico, NPR, CNN, Forbes, Time, the Washington Post, and the L.A. Times. He is also the author of "The Internet of Things: What Everyone Needs to Know" (Oxford University Press, 2020), "Governing New Frontiers in the Information Age: Toward Cyber Peace" (Cambridge University Press, 2020), and "Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace" (Cambridge University Press, 2014).
Both his academic work and teaching have been recognized with numerous awards, including a Harvard University Research Fellowship, a Stanford University Hoover Institution National Fellowship, a Notre Dame Institute for Advanced Study Distinguished Fellowship, the 2014 Indiana University Outstanding Junior Faculty Award, and the 2015 Elinor Ostrom Award.
- Christopher A. HartFormer Chairman, National Transportation Safety Board; Founder, Hart Solutions LLP
Christopher A. Hart is the founder of Hart Solutions LLP, which specializes in improving safety in a variety of contexts, including the safety of automation in motor vehicles, workplace safety, and process safety in potentially hazardous industries.
Mr. Hart is also Chairman of the Washington Metrorail Safety Commission, a three-jurisdictional agency (MD, VA, DC) that was created in 2019 to oversee the safety of the Washington area subway system. In addition, in 2019 he was asked by the Federal Aviation Administration to lead the Joint Authorities Technical Review that was created bring together the certification authorities of 10 countries, as well as NASA, to review the robustness of the FAA certification of the flight control systems of the Boeing 737 MAX and make recommendations as needed to improve the certification process. Also, he was recently asked to join the Board of the Joint Commission on Accreditation of Healthcare Organizations, the organization that accredits hospitals, to help improve healthcare safety. After an Uber test vehicle struck and killed a pedestrian in Tempe, AZ, in 2018, and Uber terminated such tests on public streets, Mr. Hart was included in the team of experts that Uber engaged to recommend how to safely resume street testing, which it has done.
From 2009 until 2018 Mr. Hart was Chairman, Vice Chairman, and a Member of the National Transportation Safety Board (NTSB), having been nominated by President Obama and confirmed by the Senate. The NTSB investigates major transportation accidents in all modes of transportation, determines the probable causes of the accidents, and makes recommendations to prevent recurrences. He was previously a Member of the NTSB in 1990, having been nominated by (the first) President Bush.
Mr. Hart has a law degree from Harvard Law School and a Master's degree and a Bachelor's degree (magna cum laude) in Aerospace Engineering from Princeton University. He is a member of the District of Columbia Bar and the Lawyer-Pilots Bar Association, and he is a pilot with commercial, multi-engine, and instrument ratings as well as a Cessna Citation SIC Type Rating.
- JD SherryChief Strategy Officer, Remediant
JD Sherry is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cybersecurity, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private, and hybrid clouds emphasizing security architecture best practices to meet strict compliance standards.
Over the last decade, he has established himself as a trusted senior advisor for the protection of Payment Card Industry (PCI), Health Information Privacy Act (HIPAA), and Personally Identifiable Information (PII) data. JD interfaces regularly with TV/media/press to provide expert insight on the state of cybersecurity and how individuals and organizations can adequately protect themselves from loss. JD has held Top Secret clearance and has an MBA/IT degree from Jones University and a B.S. degree from the University of Nebraska.
- Tom RoehDirector, Systems Engineering - Public Sector Technical Practice, ExtraHop
Tom currently leads the ExtraHop Public Sector technical practice as Director of Systems Engineering. He has spent most of his 20-year career looking at networks, protocols, and packets in one way or another. Tom has a passion for utilizing data-driven techniques to solve the complex problems faced by modern IT practitioners. When he's not working with ExtraHop's extensive customer base, he is deeply involved in developing and defining techniques for intrusion detection, having informally launched ExtraHop's foray into the cybersecurity world with the award-winning Ransomware App for ExtraHop (http://bit.ly/2fAt2WM).
Tom resides in Houston, Texas, along with his wife and three daughters. He remains actively involved with his alma mater Texas A&M (Electrical Engineering), and can be found most weekends cheering his Aggies on to victory.
- David SherryCISO, Princeton University
David Sherry is the CISO at Princeton University, with university-wide responsibility and authority regarding matters of information security and information risk. He is tasked with the development and maintenance of Princeton's information security strategy, policies and best practices, security training and awareness programs, as well as ongoing risk assessment and compliance tasks. David came to Princeton in 2016 with over 20 years of experience in information technology across several verticals. David sits on a number of committees that fall under the EDUCAUSE Higher Education Information Security Council, and is a faculty member for the Educause Management Institute.
- Tara SchauflerInformation Security Awareness and Training Program Manager, Princeton University
Tara Schaufler is the Information Security Awareness and Training Program Manager at Princeton University. Tara has worked at Princeton for 17 years, spending the last 10 focusing on training and technical communications, and over the past five years has built a robust security awareness and training program from the ground up. She is a member of the Educause Higher Education Information Security Council Awareness and Training Working Group and a frequent speaker at Educause events. Tara is CompTIA Security+ certified and is a Certified Professional in Accessibility Core Competencies (CPACC). She also holds a Bachelor of Arts degree in the social sciences from Thomas Edison State University and a Master of Administrative Science degree from Fairleigh Dickinson University.
- Jonathan EhretVice President, Strategy & Risk, RiskRecon, a Mastercard company
Jonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.
- Dave GoldField CTO, Americas, SentinelOne
Dave has more than 15 years experience in enterprise information security and brings a strong track record of innovation and customer focus to SentinelOne. Prior to SentinelOne, he was the VP of Product and VP of Solutions Architecture at ProtectWise and helped launch and build the company from stealth to a successful exit to Verizon. Dave helped define the network detection and response market and has helped many organizations develop detection and response strategies and to embrace cloud delivered technologies. He has also led Firewall Product Management at McAfee and has held various roles in sales engineering, product management and support at Websense, Intel, McAfee and Secure Computing.
- Baseer BalazadehSr. Technical Marketing Engineer, Gigamon
Baseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor's degree in computer system networking engineering from Westwood College. Fun facts about Baseer: he has completed several (10+) century bicycle rides, with his favorite being the Ojai Valley Century; he’s traveled to 10 countries, 41 cites with 200,000 miles flown; and he thoroughly enjoys passing on gained knowledge.
- Ryan WittVP, Industry Solutions, Proofpoint
Ryan Witt is Proofpoint's VP, Industry Solutions, and responsible for the strategy and solutions for the company's healthcare and public sector business. Ryan is also the Chair of Proofpoint's Healthcare Advisory Board and an appointed member of HIMSS Cybersecurity, Privacy and Security Committee. Previously, Ryan was the healthcare leader for Fortinet and Juniper Networks where he also was the Chair for their respective Healthcare Customer Advisory Boards. Ryan was a contributor to the 2013 WEDI Report, a former Co-Chair of WEDI's Privacy & Security Workgroup and has been elected to the WEDI Board of Directors. Ryan was also elected to the Association for Executives in Health Information Security (AEHIS) Advisory Board. A graduate of San Jose State University, Ryan has spent much of his professional life in Europe, but he and his family now live in Silicon Valley.
- Helen PattonAdvisory CISO, Cisco; Former CISO, The Ohio State University
With more years working in the Security, Risk, Privacy and Resiliency professions than she cares to say, Helen Patton advocates using information risk, security and privacy to enable the mission of organizations and to support society at large.
Helen is an Advisory CISO at Duo Security (now CISCO), where she shares security strategies with the security community. Previously, she was the CISO at The Ohio State University where she was awarded the ISE North American Academic/Public Sector Executive of the Year, and an Executive Director at JPMorgan Chase.
Helen actively encourages collaboration across and within industries, to enable better information security and privacy practices. She believes in improving diversity and inclusion in the workforce, and mentors people interested in pursuing careers in security, privacy and risk management.
Helen has a Master’s degree in Public Policy and has earned Certified Information Systems Auditor and Certified In Risk and Systems Control certifications from ISACA. She serves on the State of Ohio Cybersecurity Advisory Board and is a founding board member of the National Technology Security Coalition.
- Marcus GwynSr. Federal Sales Engineer, SonicWall
Marcus Gwyn has worked in cybersecurity sales for 10 years and in the Federal space for five of those years. He is the lead Sales Engineer on the SonicWall Federal team and has worked with Federal customers in Civilian, DOD, and Intel spaces. Marcus enjoys following trends in the threat landscape and learning more about cybersecurity. In his spare time, he enjoys the outdoors with his family and coaching his son’s baseball teams.
- Moderator - Tina ThorstensonExecutive Public Sector Strategist, CrowdStrike
Tina Thorstenson, Public Sector Strategist, sits on the Public Sector Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for Public Sector organizations across Federal, State and Local, Higher Education, and Healthcare. Just prior to joining CrowdStrike, she served as the Chief Information Security Officer and Deputy CIO for Arizona State University, capping a career of public sector service spanning 25+ years where the last 11 years of those she held the title of CISO.
- Nancy RainosekCISO, State of Texas
- John WeilerChairman of the Board, CMMC Center of Excellence
John Weiler is currently the CEO and CIO of a congressionally charted IT "do tank" called IT-AAC. He has forged partnerships with two dozen leading non-profits and federal agencies committed to the Digital Transformation of the federal IT sector.
He has 40 years of IT Management, Solution Engineering, and Architecture experiences, covering both private and public sectors. His expertise has taken him from senior leadership roles in Fortune 1000 companies (May Dept Stores, Giant Food, Boeing) to non-profit (Object Management Group, Interop. Clearinghouse), to high technology companies (Oracle, Excalibur, ParcPlace, Kodak, BAH, CACI).
- Marina LiangSr. Security Engineer, Automox
Marina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, triaging alerts and performing deep dive investigations into customer incidents, and suggesting steps to enhance customer security posture.
- Alex KirkGlobal Principal Engineer, Corelight
Alex Kirk is an open source security veteran, with a combined 17 years at Sourcefire, Cisco, Tenable, and now Corelight, where he serves as Global Principal for Suricata. Formerly a malware zookeeper and IDS signature writer, today he spends his time helping SOC analysts and advising on security policy for government agencies, universities, and large corporations around the world.
- David HawkinsDirector, Consulting Engineer, BitSight
David Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.
On the Information Security side, David has been part of the engine behind responding to security questionnaires, writing security product and procedural documentation, and speaking on various topics to include identity management, secure file sharing, and advanced threat protection. As a consulting engineer with BitSight, he is focused on helping companies with risk, compliance, technology, and program development. His goal is to promote the continued maturity of the security ratings industry into a discipline that holistically considers information security, data protection, technology, and business risk as a unified concept.
- Kevin WilsonSr. Product Manager, Area 1 Security
Throughout his 14 years in cybersecurity, Kevin has been an Analyst and Engineer in various organizations, such as the U.S. Navy, First Data, and Lowe’s. Previously, he served as the Global Information Security Officer at Guess? Inc. and a Product Manager for McAfee.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes