googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, June 10, 2021
    10:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 11:00 am
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    10:15 am
    Advisory Council Roundtable
    • session level icon
    Topic: NIST SP 800-171 and CUI
    speaker photo
    CISO, Needling Worldwide
    speaker photo
    Cybersecurity Director, Gannett Fleming
    Registration Level:
    • session level iconVIP / Exclusive
    10:15 am - 10:55 am

    This session is for SecureWorld Advisory Council members by invite only.

    NIST SP 800-171 aligns DoD and government contractors around a unified set of standards to ensure proper cyber hygiene and safeguarding of Controlled Unclassified Information (CUI). Join this roundtable discussion to discuss the challenges and benefits of this approach to security and compliance. Wes Knight and Tamika Bass will moderate.

    10:15 am
    [Panel] How Industry, Government, and Higher Ed Can Collaborate to Train the Next Generation of Cyber Defenders
    speaker photo
    CISO, City of New York; Head of NYC Cyber Command
    speaker photo
    Vice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of Engineering
    speaker photo
    AVP, Emerging Tech, Cyber NYC, New York City Economic Development Corporation
    speaker photo
    Private Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and Aetna
    speaker photo
    Sr. Director of Cybersecurity Education, NYU Tandon
    Registration Level:
    10:15 am - 10:55 am

    We have a well-known cybersecurity jobs gap, while at the same time, studies have shown that the current workforce is underemployed. Higher education institutions need to actively partner with companies and government organizations to co-create scalable cybersecurity education that can bridge the skills gap, effectively prepare cybersecurity professionals to anticipate and adapt to evolving threats, and clear barriers to entry for a more diverse workforce.

    Join a panel with leaders from higher education, government, and industry who will discuss best practices for co-creating scalable, relevant, and affordable cybersecurity training, including:

    • The skills and mindsets we need to be teaching our next generation of professionals
    • Partnership strategies for industry and government
    • Best practices for optimal co-curriculum design
    • How to find and nurture cybersecurity talent
    10:15 am
    A Critical Look at the Security Posture of the Fortune 500
    • session level icon
    speaker photo
    Sr. Director, Chief Security Data Scientist, Rapid7
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:55 am

    The global pandemic has brought many changes to the IT landscape of corporations across the globe. To see how this has impacted the “best of the best,” Rapid7 Labs has reprised its seminal industry cyber exposure research from 2018 to see how the security posture of Fortune 500 organizations has evolved (or devolved), and to present solid advice to CISOs and practitioners looking to improve their cybersecurity practices.

    10:15 am
    Protecting Government Organizations from Third-Party Breaches
    • session level icon
    speaker photo
    Director, Sales Engineering, SecureLink
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:55 am

    The past year alone has revealed major vulnerabilities in critical infrastructure systems that resulted in immediate action to be taken by the White House. If there’s one lesson to be learned from the Colonial Pipeline attack and similar recent attacks such as the SolarWinds breach, it’s that companies must do everything they can to protect their critical infrastructure, environments, and networks.

    Within the last year, nearly half of organizations were victims of a cyberattack that was caused by a third-party vendor. The effectiveness of hackers using third parties to infiltrate internal networks is still seen in attacks on critical infrastructure systems like water plants and gas pipelines. The only way to really know the threats emerging from sophisticated and advanced hacking methods is by assessing all points of vulnerability.

    In this presentation, learn how government organizations can take action and put the right protocols in place to protect specifically against third-party breaches and provide actionable best practices using real life examples. With 54% of organizations not monitoring the security and privacy practices of third parties that they share sensitive or confidential information with on an ongoing basis, we will touch on why these organizations are so susceptible to attacks in the first place and the underlying issues when it comes to government entities using external vendors.

    11:00 am
    [Opening Keynote] Building the Future in Cybersecurity
    • session level icon
    speaker photo
    CISO, State of Washington
    speaker photo
    CISO, State of Colorado
    speaker photo
    Chief Risk Officer, State of North Carolina
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Our panelists will explain their roles during COVID-19 and how they dealt with security challenges over the past year, then move on to discuss:

    • coming year priority projects
    • the ransomware surge and preparing for security incidents
    • their organization’s security culture and training to deal with issues
    • innovative, special projects they are most excited about moving forward
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    The Evolution of Business Email Compromise
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm

    This session is led by two of the top Business Email Compromise (BEC) investigators at the U.S. Secret Service. BEC is rampant, and every agency or organization with funds to spend is at risk. Last year alone, the FBI Internet Crime Complaint Center (IC3) received more than 19,000 BEC/EAC (Email Account Compromise) complaints with adjusted losses of $1.8 billion.

    How does this type of cyberattack start, how is it uncovered, and what should you do if you discover your organization is a victim? This session will use case studies to help answer these questions and explain practical steps your agency or organization can take to mitigate this risk.

    12:00 pm
    Using the CIS Controls to Measure and Support Your Security Program
    • session level icon
    speaker photo
    Election Security Partnership Program Manager, Office of the Secretary, Commonwealth of Massachusetts
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm
    In this session, you will learn what the CIS Controls are, why people use them, and how they can be used to grade the maturity of your security program. This will help you shape your security budget for the next few years.

    Presentation Level: MANAGERIAL (security and business leaders)

    12:00 pm
    Adapting Threat Management Strategy to Address Predator and Prey
    • session level icon
    speaker photo
    Resident CISO, Proofpoint
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm

    The last year has forced us to make a paradigm shift to people as our perimeter. This evolution requires rethinking our approach to threat management and response. We will walk through an end-to-end method that incorporates the prey’s vulnerabilities concerning predatory threats.

    You will leave with an understanding of how modeling adaptive threat management strategies differentiate responses for predators vs. prey.

    12:00 pm
    Application Security: A Multi-Pronged Approach
    • session level icon
    speaker photo
    Security Solutions Architect, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm

    If you’re reading this, it’s probably because you’ve been responsible at some level, or at some point in time, for protecting your enterprise applications. We are all aware that applications are subject to attackers’ attempts to either take an application offline or exfiltrate data from the application for sale on the Dark Web. So, how can you prevent application downtime or data exfiltration? Join us to look at the state of the art technologies used to prevent the most advanced attacks.

    12:30 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:30 pm - 12:45 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:45 pm
    A Holistic Cyber Defense Strategy
    • session level icon
    speaker photo
    CISO, City of Los Angeles, Information Technology Agency
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm

    The threat landscape is evolving rapidly and so must the defense strategy. This presentation will walk through a holistic cybersecurity strategy for security and business leaders in today’s digital world. Key takeaways will include:

    • Understand what is the holistic cybersecurity approach and why it is important
    • Technology and technique involved in holistic cyber defense
    • Lessons learned and recommendations
    12:45 pm
    What We Need Now: A National Cybersecurity Safety Board
    • session level icon
    speaker photo
    Cybersecurity Program Chair, Indiana University
    speaker photo
    Former Chairman, National Transportation Safety Board; Founder, Hart Solutions LLP
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm

    No system for investigating and reporting on cyber attacks is perfect, and incentives will often be misaligned in this context. However, creating a National Cybersecurity Safety Board (NCSB), similar to the National Transportation Safety Board (NTSB), could help protect organizations and critical infrastructure more effectively than ever before. But how would such a Board function, and could it succeed where past public-private collaborations have failed given the rapid pace of technical innovation in the cybersecurity field? This session will examine the possibilities and limitations of such an approach within the broader context of critical infrastructure protection.

    Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)

    12:45 pm
    Top 4 Reasons Why Privileged Access Management Implementations Fail
    • session level icon
    speaker photo
    Chief Strategy Officer, Remediant
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm

    It is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management (PAM) technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.

    Join Remediant in this discussion to:

    • Learn the five reasons why privileged access management implementations fail
    • Identify areas in your IAM program where you can reduce admin access risk
    • Capitalize on existing investments, while improving your risk posture

    Presentation level: TECHNICAL (deeper dive including TTPs)

    12:45 pm
    How to Accelerate Zero Trust Adoption Through End-to-End Visibility and Increased IT Ops Collaboration
    • session level icon
    speaker photo
    Director, Systems Engineering - Public Sector Technical Practice, ExtraHop
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm

    It’s no surprise that Zero Trust initiatives are increasing in importance across federal, state, and local government institutions. New cybersecurity mandates and a boom in remote work due to COVID-19 are just two of the most common factors driving this demand. While the need for adopting Zero Trust is evident, the path to success is not.

    In this presentation, Tom Roeh of ExtraHop’s Public Sector team will discuss important considerations for planning, implementing, operating, and securing a Zero Trust deployment. You’ll also learn practical steps Public Sector IT teams can take to achieve your Zero Trust mandate more rapidly and with lower risk. This includes the vital role end-to-end visibility and frictionless collaboration between IT ops teams play across Zero Trust rollout phases.

    1:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:30 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:30 pm
    Zero to 60: Making Security Programmatic and Cultural at Princeton University
    • session level icon
    speaker photo
    CISO, Princeton University
    speaker photo
    Information Security Awareness and Training Program Manager, Princeton University
    Registration Level:
    • session level iconOpen Sessions
    1:30 pm - 2:00 pm

    Join members of Princeton University’s Information Security Office as they discuss their mission, focus, and critical successes. Princeton’s multi-year program has already made an impact on the campus’s security mindset, including risk reduction, implementing new technologies, broadening security knowledge, and strengthening campus partnerships. From position papers, a secure password manager, and a creative awareness model, find out how this Ivy League institution went from zero to 60. Learn about Princeton’s approach to making security thinking both programmatic and cultural, and learn about ideas you can apply to your own organization.

    Presentation level: MANAGERIAL (security and business leaders)

    1:30 pm
    How IoT Devices Are Driving Cyber Risk
    • session level icon
    speaker photo
    Vice President, Strategy & Risk, RiskRecon, a Mastercard company
    Registration Level:
    • session level iconOpen Sessions
    1:30 pm - 2:00 pm

    In the new digital transformation age, companies are more susceptible to exposing their data to the internet. A recent research study conducted by RiskRecon and the Cyentia Institute found that firms with IoT devices exposed to the internet have a 62% higher prevalence of cyber risk issues and 86% of security findings related to IoT devices are rated as critical.

    Learn how you can protect your organization from these IoT threats, and how to utilize continuous monitoring data to ensure that your vendors are not exposing their IoT devices to the internet, leaving you just as vulnerable.

    1:30 pm
    Code on Code Warfare
    • session level icon
    speaker photo
    Field CTO, Americas, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    1:30 pm - 2:00 pm

    During this talk we will review some security metrics from 2020, which includes common ways organizations are approaching complex security issues such as ransomware and advanced threat groups. During the discussion, we will provide some insight into alternative methods or considerations whereby we can use the power of compute to prevent, discover, and recover from advanced attacks.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:15 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:15 pm
    [Panel] No Perimeter: Securing Public Sector Work in the Cloud
    • session level icon
    speaker photo
    Solutions Engineer, Bitglass
    speaker photo
    Sr. Technical Marketing Engineer, Gigamon
    speaker photo
    Sr. Director, Industry Solutions Group, Proofpoint
    speaker photo
    Sr. Sales Engineer, iboss
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm

    The pandemic fueled massive digital adoption and increased the public’s willingness to interact virtually with government agencies and organizations. And cloud-based tools are also transforming the way Gov-Ed teams work. This panel will discuss trends, controls, and best practices for managing a secure cloud environment, to extend security well beyond the network’s perimeter.

    2:15 pm
    [Panel] Government Workforce 2.0: The New Normal?
    • session level icon
    speaker photo
    Advisory CISO, Cisco; Former CISO, The Ohio State University
    speaker photo
    Sr. Federal Sales Engineer, SonicWall
    speaker photo
    Director, US Public Sector Engineering, CrowdStrike
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm

    This panel will discuss the ongoing challenges for managing tele-work and the shifting workforce. InfoSec and Operations must have processes and technology in place to keep the agency or organization running while maintaining an acceptable level of risk. This discussion will explore best practices for securing the future of government work.

    2:15 pm
    Executive Roundtable [VIP invite only]
    • session level icon
    Let's Talk Ransomware: Protecting Your Gov-Ed Ecosystem
    speaker photo
    Executive Public Sector Strategist, CrowdStrike
    Registration Level:
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm

    Discussion forum for executive leaders and SecureWorld Advisory Council members (15-20, by invite only).

    As ransomware adversaries and their methods evolve, their continuous attack on vulnerable organizations such as government and education continues to rise. Whether after research, PII, citizen or student data, or confidential data, the success of ransomware adversaries has proven to be damaging to the finances, data, and reputation of our essential institutions.

    Join this session as Tina Thorstenson, Public Sector Strategist, moderates a discussion of knowledge sharing and best practices within the government and education ecosystem. We’ll cover topics such as:

    • The criminal ransomware ecosystem
    • Acceleration of cybersecurity tools used for 2020’s work/learn from home
    • The use of threat intelligence to stay ahead of the curve
    • Cybersecurity strategies implemented to help prevent ransomware

    Sponsored by CrowdStrike and AWS.

    3:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:15 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:15 pm
    Ransomware Hindsight: As Attacks Surge, What Can We Learn from Previous Response?
    • session level icon
    speaker photo
    CISO, State of Texas
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm

    Ransomware attacks are surging across the United States, often targeting government and education. That was certainly the case when 20 government agencies in Texas were attacked in a single day. Join this fireside chat as Texas CISO Nancy Rainosek shares what that day was like, how her team approached the attacks, and lessons they learned from remediating them. These insights could help your agency in the future.

    3:15 pm
    Examining the CMMC and the Reasoning Behind It
    • session level icon
    speaker photo
    Chairman of the Board, CMMC Center of Excellence
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm

    The Deputy Principal Cyber Advisor for the DoD recently told the Senate Armed Services Cybersecurity Subcommittee that the Cybersecurity Maturity Model Certification (CMMC) is part of a crucial effort: “Our goal must be to complicate and frustrate adversary planning and operations such that they cannot conduct them with impunity or at scale.”

    In this session, join the Chairman of the Board at the CMMC Center of Excellence as he explores the logic behind the Cybersecurity Maturity Model Certification, its objectives, and its security benchmarks.

    3:15 pm
    [Panel] Threat Landscape in Flux: Emerging Threats
    • session level icon
    speaker photo
    CTO, SecureLink
    speaker photo
    Sr. Security Engineer, Automox
    speaker photo
    Global Principal Engineer, Corelight
    speaker photo
    Director, Consulting Engineer, BitSight
    speaker photo
    Sr. Product Manager, Area 1 Security
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm

    The attack surface is shifting, threat actors are adapting, and security teams must also pivot. This panel will take a dive into various attack vectors, security gaps, and emerging threats organizations are now facing.

    4:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:15 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:15 pm
    [Closing Keynote] Intel Briefing: How Cyber Goes to War—and Why You're in the Fight
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    4:15 pm - 5:00 pm

    Nations and trans-national organizations that would lose a military fight against the U.S. are using cyber as a weapon of choice and a way to level the playing field. In this presentation, CNN Military Analyst and strategic risk advisor Colonel Cedric Leighton (USAF, Ret.) will brief us on the evolution of the nation-state and trans-national cyber threat. He will examine the top four players, their methods, their motives, and their targets. Plus, we’ll look at how Israel targeted Hamas’ cyber capabilities in their most recent conflict. Then, Colonel Leighton will put forward his plan for better defending our government agencies and critical infrastructure against these threats.

Exhibitors
  • Area 1 Security
    Booth:

    Area 1 Security is the only company that preemptively stops Business Email Compromise, malware, ransomware and targeted phishing attacks. By focusing on the earliest stages of an attack, Area 1 stops phish — the root cause of 95 percent of breaches — 24 days (on average) before they launch. Area 1 also offers the cybersecurity industry’s first and only performance-based pricing model, Pay-per-Phish.

    Area 1 is trusted by Fortune 500 enterprises across financial services, healthcare, critical infrastructure and other industries, to preempt targeted phishing attacks, improve their cybersecurity posture, and change outcomes.

    Area 1 is a Certified Microsoft Partner, and Google Cloud Technology Partner of the Year for Security.

  • Armis, Inc
    Booth:

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Bitglass
    Booth:

    Your company’s move to the cloud delivers flexibility and cost savings, but that doesn’t mean you should lose control of your data. Bitglass’ Cloud Access Security Broker (CASB) solution enables your enterprise to adopt cloud apps while ensuring data security and regulatory compliance. Bitglass secures your data in the cloud, at access, on any device.

    Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.

  • BitSight
    Booth:

    BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. For more information, please visit www.bitsight.com, read our blog, or follow @BitSight on X.

  • Duo
    Booth:

    Duo was founded with the belief that security can only be effective if it is easy to use. Through that vision, Duo has built a world-class security platform that is actually enjoyable to use. Duo supports thousands of customers and millions of users in organizations like Accenture, Boston Medical, Emblem Health, Facebook, Toyota, Twitter, Virginia Tech, Yelp and others, and enjoys the highest NPS score in the industry.

  • Cloud Security Alliance (CSA)
    Booth:

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Corelight
    Booth:

    Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com

  • CrowdStrike with AWS
    Booth:

    CrowdStrike sets the standard for cybersecurity in the cloud era. The CrowdStrike Falcon® platform protects and enables the people, processes, and technologies that drive modern enterprise, delivering superior protection, better performance, reduced complexity, and immediate time-to-value. CrowdStrike secures the most critical areas of enterprise risk—endpoints and cloud workloads, identity, and data—to keep organizations ahead of today’s adversaries and stop breaches.

  • Cybercrime Support Network
    Booth:

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • ExtraHop
    Booth:

    ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com

  • Gigamon
    Booth:

    Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. 

  • iboss
    Booth:

    iboss is a cloud security company that provides organizations and their employees fast and secure access to the Internet on any device, from any location, in the cloud. The iboss SASE cloud platform provides network security as a service, delivered in the cloud, as a complete SaaS offering. This eliminates the need for traditional network security appliances, such as firewalls and web gateway proxies, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 100 billion transactions daily, blocking nearly 4 billion malware threats per day. More than 4,000 global enterprises trust the iboss SASE cloud platform to support their workforce, including a large number of Fortune 50 companies.

  • Okta
    Booth:

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Proofpoint
    Booth:

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Radware
    Booth:

    Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.

  • Rapid7
    Booth:

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Remediant
    Booth:

    Founded in the heart of San Francisco, Remediant offers an industry leading Privileged Access Management (PAM) solution we call SecureOne.  Our innovative and enterprise-class cybersecurity solution enables real-time monitoring, Zero Trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security/Cloud ecosystems. We protect organizations from stolen credentials being used against them, which is the number one attack vector across all breaches. To learn more, please visit: www.remediant.com

  • RiskRecon
    Booth:

    RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
    easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
    solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
    enabling organizations to efficiently operate scalable, third-party risk management programs for
    dramatically better risk outcomes. Request a demo to learn more about our solution.

  • SecureLink
    Booth:

    SecureLink is a leader in managing secure third-party access and remote support for both enterprise companies and technology providers. SecureLink serves over 400 customers and 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming and retail rely on SecureLink’s secure, purpose-built platform.

  • SentinelOne
    Booth:

    SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.

  • SonicWall
    Booth:

    SonicWall has been fighting the cybercriminal industry for over 28 years defending small and medium businesses, enterprises and government agencies worldwide. Backed by research from SonicWall Capture Labs, our award-winning, real-time breach detection and prevention solutions secure more than a million networks, and their emails, applications and data, in over 215 countries and territories. These organizations run more effectively and fear less about security.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • WiCyS Critical Infrastructure
    Booth:

    Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Critical Infrastructure was formed to empower women in cyber across the critical infrastructure community and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.

  • Zscaler
    Booth:

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Wes Knight
    CISO, Needling Worldwide
  • speaker photo
    Tamika Bass
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Geoff Brown
    CISO, City of New York; Head of NYC Cyber Command

    Geoff Brown was appointed Chief Information Security Officer for the City of New York in 2016, a position focused on cybersecurity and aggregate information risk across all 100+ NYC departments and agencies. In July 2017, Mayor de Blasio established New York City Cyber Command, led by Geoff and charged with setting Citywide cybersecurity policies; directing
    response to cyber incidents; and advising City Hall, agencies and departments on the City's overall cyber defense.

    Prior to joining City government, Geoff worked in financial services, developing and operating threat management disciplines including threat intelligence, detection, response and countermeasures. Geoff also served in the federal government, including work with the National Commission for Terrorist Attacks Upon the United States (the 9/11 Commission), supporting the investigation’s work with the first responder community in NYC.

  • speaker photo
    Nasir Memon
    Vice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of Engineering

    Nasir Memon is Vice Dean for Academics & Student Affairs, Head of Tandon Online, and a Professor of Computer Science at NYU Tandon. He introduced cybersecurity studies to NYU Tandon in 1999. He is co-founder of NYU's Center for Cyber Security (CCS) & the founder of the OSIRIS Lab, CSAW, and NYU Tandon Bridge & Cyber Fellows programs at NYU. He was the Editor-In-Chief of the IEEE Transactions on Information Security and Forensics and has received several awards for best paper and teaching excellence. He is an IEEE Fellow and SPIE Fellow for his contributions to image compression and media security and forensics.

  • speaker photo
    Liat Krawczyk
    AVP, Emerging Tech, Cyber NYC, New York City Economic Development Corporation

    Liat Krawczyk is Assistant Vice President for Emerging Tech at the NYCEDC where she led the workforce arm of Cyber NYC, NYC's signature program to grow its cybersecurity ecosystem. She is also the founder and head of the women.nyc Childcare Innovation Lab. Prior to joining NYCEDC, Liat grew startups, social-enterprises, and innovation ecosystems with a focus on social impact tech and real estate tech. Liat is co-founder of The Jeneba Project, a nonprofit that provides educational opportunities for Sierra Leonean youth and runs an excellence academy for girls in Lungi. She is also an award-winning documentary film director.

  • speaker photo
    Jim Routh
    Private Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and Aetna

    Jim Routh serves as a security & risk advisor and Board member for several companies, and is the former CISO for MassMutual, CSO at Aetna, and Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and information security as a practitioner, management consultant, and leader of technology, analytic, and information security functions for global firms.

    Jim is the winner of the 2009 BITS Leadership Award for outstanding leadership of the Supply Chain Working Group sponsored by the financial industry in collaboration with NIST and the Department of Treasury. He was the 2007 Information Security Executive of the Year for the Northeast and the 2014 North American Information Security Executive of the Year for North America in Healthcare. He is a widely recognized expert in security program implementation and in reducing information security costs while significantly improving enterprise risk management practices through innovation and transformational leadership. He is a co-author of the FS-ISAC white paper on 3rd Party Software Security Controls and several other industry white papers.

  • speaker photo
    Moderator: Joel Caminer
    Sr. Director of Cybersecurity Education, NYU Tandon

    Joel Caminer is the Director of Cybersecurity Education at NYU Tandon. Joel has 20+ years of experience in Financial Services, IT, and Consulting, and has led many strategic initiatives across the IT Risk and cybersecurity spectrum. He previously served as the Global Head of Technology Risk Management at TD Securities; VP of Information Risk Management and CISO at Goldman Sachs; and Manager at Andersen Consulting (now Accenture).

  • speaker photo
    Bob Rudis
    Sr. Director, Chief Security Data Scientist, Rapid7

    Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Breach Investigations Report. Bob is a serial tweeter (@hrbrmstr), avid blogger (rud.is), R (#rstats) avunculur, author (Data-Driven Security), speaker, and regular contributor to the open source community.

  • speaker photo
    Russell Dowdell
    Director, Sales Engineering, SecureLink

    For nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations identify the SecureLink products and product features that can be leveraged to both improve security and streamline workflows.

  • speaker photo
    Vinod Brahmapuram
    CISO, State of Washington
  • speaker photo
  • speaker photo
    Maria Thompson
    Chief Risk Officer, State of North Carolina
  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Mike Ste Marie
    Election Security Partnership Program Manager, Office of the Secretary, Commonwealth of Massachusetts

    Mike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a Masters in Information Assurance from Norwich University and has been a long time member of the Secureworld Boston Advisory Council.

  • speaker photo
    Deborah Watson
    Resident CISO, Proofpoint

    Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah led cybersecurity strategy programs for public and private sector organizations across the Fortune 1000. Deborah has a Master's degree in Information Technology Management from Harvard University and is a Doctoral Candidate in Psychology (PsyD) at California Southern University.

  • speaker photo
    James McGril
    Security Solutions Architect, Radware

    James is a Security Solutions Architect and one of Radware’s thought leaders in Network and Application Security. He's been with Radware for nearly 10 years. James is a self-described geek and enjoys learning about application security and building web applications using the latest technologies. In his off time, James enjoys hiking, surfing, and playing guitar.

  • speaker photo
    Timothy Lee
    CISO, City of Los Angeles, Information Technology Agency
  • speaker photo
    Scott Shackelford
    Cybersecurity Program Chair, Indiana University

    Professor Scott J. Shackelford serves on the faculty of Indiana University where he is Cybersecurity Program Chair along with being the Executive Director of the Ostrom Workshop. He is also an Affiliated Scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Society, as well as a Senior Fellow at the Center for Applied Cybersecurity Research, and a Term Member at the Council on Foreign Relations.

    Professor Shackelford has written more than 100 articles, book chapters, essays, and op-eds for diverse publications. Similarly, his research has been covered by an array of outlets, including Politico, NPR, CNN, Forbes, Time, the Washington Post, and the L.A. Times. He is also the author of "The Internet of Things: What Everyone Needs to Know" (Oxford University Press, 2020), "Governing New Frontiers in the Information Age: Toward Cyber Peace" (Cambridge University Press, 2020), and "Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace" (Cambridge University Press, 2014).

    Both his academic work and teaching have been recognized with numerous awards, including a Harvard University Research Fellowship, a Stanford University Hoover Institution National Fellowship, a Notre Dame Institute for Advanced Study Distinguished Fellowship, the 2014 Indiana University Outstanding Junior Faculty Award, and the 2015 Elinor Ostrom Award.

  • speaker photo
    Christopher A. Hart
    Former Chairman, National Transportation Safety Board; Founder, Hart Solutions LLP

    Christopher A. Hart is the founder of Hart Solutions LLP, which specializes in improving safety in a variety of contexts, including the safety of automation in motor vehicles, workplace safety, and process safety in potentially hazardous industries.

    Mr. Hart is also Chairman of the Washington Metrorail Safety Commission, a three-jurisdictional agency (MD, VA, DC) that was created in 2019 to oversee the safety of the Washington area subway system. In addition, in 2019 he was asked by the Federal Aviation Administration to lead the Joint Authorities Technical Review that was created bring together the certification authorities of 10 countries, as well as NASA, to review the robustness of the FAA certification of the flight control systems of the Boeing 737 MAX and make recommendations as needed to improve the certification process. Also, he was recently asked to join the Board of the Joint Commission on Accreditation of Healthcare Organizations, the organization that accredits hospitals, to help improve healthcare safety. After an Uber test vehicle struck and killed a pedestrian in Tempe, AZ, in 2018, and Uber terminated such tests on public streets, Mr. Hart was included in the team of experts that Uber engaged to recommend how to safely resume street testing, which it has done.

    From 2009 until 2018 Mr. Hart was Chairman, Vice Chairman, and a Member of the National Transportation Safety Board (NTSB), having been nominated by President Obama and confirmed by the Senate. The NTSB investigates major transportation accidents in all modes of transportation, determines the probable causes of the accidents, and makes recommendations to prevent recurrences. He was previously a Member of the NTSB in 1990, having been nominated by (the first) President Bush.

    Mr. Hart has a law degree from Harvard Law School and a Master's degree and a Bachelor's degree (magna cum laude) in Aerospace Engineering from Princeton University. He is a member of the District of Columbia Bar and the Lawyer-Pilots Bar Association, and he is a pilot with commercial, multi-engine, and instrument ratings as well as a Cessna Citation SIC Type Rating.

  • speaker photo
    JD Sherry
    Chief Strategy Officer, Remediant

    JD Sherry is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cybersecurity, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private, and hybrid clouds emphasizing security architecture best practices to meet strict compliance standards.

    Over the last decade, he has established himself as a trusted senior advisor for the protection of Payment Card Industry (PCI), Health Information Privacy Act (HIPAA), and Personally Identifiable Information (PII) data. JD interfaces regularly with TV/media/press to provide expert insight on the state of cybersecurity and how individuals and organizations can adequately protect themselves from loss. JD has held Top Secret clearance and has an MBA/IT degree from Jones University and a B.S. degree from the University of Nebraska.

  • speaker photo
    Tom Roeh
    Director, Systems Engineering - Public Sector Technical Practice, ExtraHop

    Tom currently leads the ExtraHop Public Sector technical practice as Director of Systems Engineering. He has spent most of his 20-year career looking at networks, protocols, and packets in one way or another. Tom has a passion for utilizing data-driven techniques to solve the complex problems faced by modern IT practitioners. When he's not working with ExtraHop's extensive customer base, he is deeply involved in developing and defining techniques for intrusion detection, having informally launched ExtraHop's foray into the cybersecurity world with the award-winning Ransomware App for ExtraHop (http://bit.ly/2fAt2WM).

    Tom resides in Houston, Texas, along with his wife and three daughters. He remains actively involved with his alma mater Texas A&M (Electrical Engineering), and can be found most weekends cheering his Aggies on to victory.

  • speaker photo
    David Sherry
    CISO, Princeton University

    David Sherry is the CISO at Princeton University, with university-wide responsibility and authority regarding matters of information security and information risk. He is tasked with the development and maintenance of Princeton's information security strategy, policies and best practices, security training and awareness programs, as well as ongoing risk assessment and compliance tasks. David came to Princeton in 2016 with over 20 years of experience in information technology across several verticals. David sits on a number of committees that fall under the EDUCAUSE Higher Education Information Security Council, and is a faculty member for the Educause Management Institute.

  • speaker photo
    Tara Schaufler
    Information Security Awareness and Training Program Manager, Princeton University

    Tara Schaufler is the Information Security Awareness and Training Program Manager at Princeton University. Tara has worked at Princeton for 17 years, spending the last 10 focusing on training and technical communications, and over the past five years has built a robust security awareness and training program from the ground up. She is a member of the Educause Higher Education Information Security Council Awareness and Training Working Group and a frequent speaker at Educause events. Tara is CompTIA Security+ certified and is a Certified Professional in Accessibility Core Competencies (CPACC). She also holds a Bachelor of Arts degree in the social sciences from Thomas Edison State University and a Master of Administrative Science degree from Fairleigh Dickinson University.

  • speaker photo
    Jonathan Ehret
    Vice President, Strategy & Risk, RiskRecon, a Mastercard company

    Jonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.

  • speaker photo
    Dave Gold
    Field CTO, Americas, SentinelOne

    Dave has more than 15 years experience in enterprise information security and brings a strong track record of innovation and customer focus to SentinelOne. Prior to SentinelOne, he was the VP of Product and VP of Solutions Architecture at ProtectWise and helped launch and build the company from stealth to a successful exit to Verizon. Dave helped define the network detection and response market and has helped many organizations develop detection and response strategies and to embrace cloud delivered technologies. He has also led Firewall Product Management at McAfee and has held various roles in sales engineering, product management and support at Websense, Intel, McAfee and Secure Computing.

  • speaker photo
    Ed Lopez
    Solutions Engineer, Bitglass
  • speaker photo
    Baseer Balazadeh
    Sr. Technical Marketing Engineer, Gigamon

    Baseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor's degree in computer system networking engineering from Westwood College. Fun facts about Baseer: he has completed several (10+) century bicycle rides, with his favorite being the Ojai Valley Century; he’s traveled to 10 countries, 41 cites with 200,000 miles flown; and he thoroughly enjoys passing on gained knowledge.

  • speaker photo
    Ryan Witt
    Sr. Director, Industry Solutions Group, Proofpoint
  • speaker photo
    Adam Hastings
    Sr. Sales Engineer, iboss
  • speaker photo
    Helen Patton
    Advisory CISO, Cisco; Former CISO, The Ohio State University

    With more years working in the Security, Risk, Privacy and Resiliency professions than she cares to say, Helen Patton advocates using information risk, security and privacy to enable the mission of organizations and to support society at large.

    Helen is an Advisory CISO at Duo Security (now CISCO), where she shares security strategies with the security community. Previously, she was the CISO at The Ohio State University where she was awarded the ISE North American Academic/Public Sector Executive of the Year, and an Executive Director at JPMorgan Chase.

    Helen actively encourages collaboration across and within industries, to enable better information security and privacy practices. She believes in improving diversity and inclusion in the workforce, and mentors people interested in pursuing careers in security, privacy and risk management.

    Helen has a Master’s degree in Public Policy and has earned Certified Information Systems Auditor and Certified In Risk and Systems Control certifications from ISACA. She serves on the State of Ohio Cybersecurity Advisory Board and is a founding board member of the National Technology Security Coalition.

  • speaker photo
    Marcus Gwyn
    Sr. Federal Sales Engineer, SonicWall

    Marcus Gwyn has worked in cybersecurity sales for 10 years and in the Federal space for five of those years. He is the lead Sales Engineer on the SonicWall Federal team and has worked with Federal customers in Civilian, DOD, and Intel spaces. Marcus enjoys following trends in the threat landscape and learning more about cybersecurity. In his spare time, he enjoys the outdoors with his family and coaching his son’s baseball teams.

  • speaker photo
    Eric Monteith
    Director, US Public Sector Engineering, CrowdStrike
  • speaker photo
    Moderator - Tina Thorstenson
    Executive Public Sector Strategist, CrowdStrike

    Tina Thorstenson, Public Sector Strategist, sits on the Public Sector Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for Public Sector organizations across Federal, State and Local, Higher Education, and Healthcare. Just prior to joining CrowdStrike, she served as the Chief Information Security Officer and Deputy CIO for Arizona State University, capping a career of public sector service spanning 25+ years where the last 11 years of those she held the title of CISO.

  • speaker photo
  • speaker photo
    John Weiler
    Chairman of the Board, CMMC Center of Excellence

    John Weiler is currently the CEO and CIO of a congressionally charted IT "do tank" called IT-AAC. He has forged partnerships with two dozen leading non-profits and federal agencies committed to the Digital Transformation of the federal IT sector.

    He has 40 years of IT Management, Solution Engineering, and Architecture experiences, covering both private and public sectors. His expertise has taken him from senior leadership roles in Fortune 1000 companies (May Dept Stores, Giant Food, Boeing) to non-profit (Object Management Group, Interop. Clearinghouse), to high technology companies (Oracle, Excalibur, ParcPlace, Kodak, BAH, CACI).

  • speaker photo
    Joel Burleson-Davis
    CTO, SecureLink
  • speaker photo
    Marina Liang
    Sr. Security Engineer, Automox

    Marina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, triaging alerts and performing deep dive investigations into customer incidents, and suggesting steps to enhance customer security posture.

  • speaker photo
    Alex Kirk
    Global Principal Engineer, Corelight

    Alex Kirk is an open source security veteran, with a combined 17 years at Sourcefire, Cisco, Tenable, and now Corelight, where he serves as Global Principal for Suricata. Formerly a malware zookeeper and IDS signature writer, today he spends his time helping SOC analysts and advising on security policy for government agencies, universities, and large corporations around the world.

  • speaker photo
    David Hawkins
    Director, Consulting Engineer, BitSight

    David Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.

    On the Information Security side, David has been part of the engine behind responding to security questionnaires, writing security product and procedural documentation, and speaking on various topics to include identity management, secure file sharing, and advanced threat protection. As a consulting engineer with BitSight, he is focused on helping companies with risk, compliance, technology, and program development. His goal is to promote the continued maturity of the security ratings industry into a discipline that holistically considers information security, data protection, technology, and business risk as a unified concept.

  • speaker photo
    Kevin Wilson
    Sr. Product Manager, Area 1 Security

    Throughout his 14 years in cybersecurity, Kevin has been an Analyst and Engineer in various organizations, such as the U.S. Navy, First Data, and Lowe’s. Previously, he served as the Global Information Security Officer at Guess? Inc. and a Product Manager for McAfee.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes