Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 17, 2017
    9:00 am
    SecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    SecureWorld PLUS registrants ONLY
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Elm

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.

  • Thursday, May 18, 2017
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:30 am
    Security During Acquisition or Divestiture
    • session level icon
    speaker photo
    IT Executive
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Elm

    Bad actors are becoming more aware of mergers and acquisitions as targets. This session will focus on lessons learned from large real-world projects, including planning, governance and potential pitfalls.

    8:30 am
    BluVector: Leveling the Cyber Battlefield: Using Machine Learning for a Moving Defense
    • session level icon
    speaker photo
    Threat Researcher, BluVector
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Keynote (Magnolia)

    Some of the world’s best-known brands have invested millions in cybersecurity. So have their adversaries. But malicious actors count on the fact that your defenses tend to be the same across the board. This talk demonstrates how current defenses, including machine learning, are exploited and defeated and proposes a sensible solution.

    8:30 am
    Symantec: Securing the Shift to Cloud Application Usage
    • session level icon
    speaker photo
    Sr. Cloud Security Specialist, Symantec
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Live Oak B

    As security practitioners, we must walk the line between business enablement and data security. What if you can have both? Join Scott Gordon to discuss the security challenges faced with moving to the cloud, and what you can do to safely enable the use of Cloud applications in your environment.

    8:30 am
    Cyber or Insider Threat?
    • session level icon
    speaker photo
    Chief Digital Forensic Investigator, Swailes Computer Forensics
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Pecan

    What's the greater threat to businesses, cyber or insider? The reality is both as they are two sides of the same coin and related to one another.

    9:30 am
    OPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private Partnership
    • session level icon
    speaker photo
    CNN Military Analyst, USAF (ret.) and CEO, Cedric Leighton Associates
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote (Magnolia)

    Col. Cedric Leighton's keynote presentation will cover the following:

    - Overview of the Cyber Threat based on publicly available intelligence
    - Why current Intelligence Community structure needs to be re-vamped for the Cyber Age
    - How intelligence agencies should be working with private companies
    - It's about new legislation AND changing mindsets and cultures
    - The new relationship between the US Intelligence Community and US companies in the Cyber Age - a vision for the future

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable: The Cost and Consequence of Insider Threats (VIP Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Live Oak A
    11:15 am
    RED TEAM: Active Hacker Drills
    • session level icon
    Learn how to safely simulate malicious activity to effectively measure cyber readiness & defense capabilities.
    speaker photo
    Red Team Lead, Oil & Gas Company
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Elm

    Join us in a presentation that will demonstrate attack scenarios to effectively measure your cyber defense position. The presenter will demonstrate Red Team cyber readiness & defense capability testing techniques. The audience will discover new Red Team tools that are safe to use for your active simulations. Additionally, the presenter will share a unique approach to effectively producing metrics and measurements for active hacker drills.

    11:15 am
    Cisco: The Way We Work Has Changed. Has Your Security?
    • session level icon
    speaker photo
    Cyber Security Systems Engineer, Cisco
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Keynote (Magnolia)

    By 2018, Gartner estimates that 25% of corporate data traffic will bypass the perimeter. As organizations evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This session will review some of the new risks introduced by SaaS/IaaS adoption and show how to effectively mitigate these risks using new approaches to security architecture.

    11:15 am
    Drive Profitability While Supporting Safe and Secure Manufacturing Operations
    • session level icon
    speaker photo
    Senior Security Architect, Booz Allen Hamilton, Inc
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Live Oak B

    Technology advancements increase "online" presence of operations in a business, they also create unintended cyber exposures which could potentially affect safety, quality and availability of production/manufacturing environments. Protecting business from adverse consequences requires collaboration between IT & OT to promote security awareness and unified protection efforts.

    11:15 am
    Trend Micro: Anatomy of a Ransomware Attack and Why It Matters
    • session level icon
    speaker photo
    Senior Security Engineer, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Pecan

    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Hackers use ransomware like CryptoLocker and CryptoWall to target a wide range of organizations like yours, demanding thousands of dollars. Find out how you can protect your business from ransomware security threats. Join Christian Fontaine, senior security engineer at Trend Micro, as he outlines the latest criminal underground threats and best practices to protect your data and systems.

    12:00 pm
    Advisory Council Lunch Round Table - The Threat of IoT to the Corporate Environment (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Live Oak A

    This session is for Advisory Council members only.

    12:15 pm
    LUNCH KEYNOTE: Cisco - Emerging Threats - The State of Cybersecurity
    • session level icon
    speaker photo
    Threat Researcher, Cisco Systems, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote (Magnolia)

    People responsible for defending networks realize that the security threat landscape is constantly changing. Understanding how threats evolve is critical to building better defenses. In this presentation, I will analyze recent threats and see how Talos leverages large datasets to deliver product improvements and mitigation strategies to protect our customers.

    1:15 pm
    Panel: Stopping the Attacks (Incident Response)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Pecan

    Security teams are struggling to keep up with the myriad of attack vectors that exist. Future InfoSec professionals will take a more adversarial approach to incident response. Will we have artificial intelligence helping threat hunters squash attacks before they can do any significant damage on the network while alerting the authorities in real time? Can a true partnership form between organizations and law enforcement to share information?

    Join our experts as they discuss challenges modern security teams face and how we can build a better plan for tomorrow.

    1:15 pm
    Panel: What Will They Think of Next? (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote (Magnolia)

    It would seem the more we “build a better mousetrap” the better the threats become. Will machine learning and AI be used against us in the future? Will these and other innovations be hacked and used for gain? Will the Crime as a Business platform take off where business competitors are utilizing these attacks for the upper hand? Perhaps the cars that are being hacked will evolve into driverless vehicles that are hacking companies from inside there own parking lots. What about drones?

    So many questions, let’s see what our experts say on this panel.

    1:15 pm
    Illumio: Stop Cyber Threats With Adaptive Micro-Segmentation
    • session level icon
    speaker photo
    Director of Systems Engineering, US West, Illumio
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Elm

    Virtualization, cloud, and the promise of containers have evolved data centers, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside data centers and clouds while speeding up application delivery.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    Social Engineering Automation
    • session level icon
    speaker photo
    Security Engineer, Amazon
    speaker photo
    Teleion Consulting
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Pecan

    The exponential security and privacy risks when social engineering is scaled via widely available APIs and automation frameworks.

    3:00 pm
    Methods That Work: Security Awareness That Changes Behavior
    • session level icon
    speaker photo
    Security and Compliance Manager, Andrews Kurth Kenyon, LLP
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Live Oak B

    91% of cyber attacks start with a phishing email. Traditional security won’t protect you from users with poor security habits and criminals know it. Learn to be an educator, marketing guru, and entertainer to get users to adopt safe online behaviors.

    3:00 pm
    Storyboarding Incident Response Methodology: Speed, Synergy and Accuracy
    • session level icon
    speaker photo
    National Director, Threat Management, Incident Response & Forensics, Catholic Health Initiatives
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Elm

    In the context of several real world IR events, participants will see, experience and participate in learning a new paradigm of "Storyboarding" Incident Response methodology.

Exhibitors
  • ACFE
    Booth: 430

    We are the world's largest anti-fraud organization and premier provider of anti-fraud training and education.
    The mission of the ACFE Foundation is to increase the body of anti-fraud knowledge by supporting future anti-fraud professionals worldwide through the funding of the Ritchie-Jennings Memorial Scholarship Program. The scholarship program provides an opportunity for men and women of all ages, races, religions and income levels to advance their education. Many of these outstanding and deserving students go on to become Certified Fraud Examiners.

  • Binary Defense Systems
    Booth: 110

    BDS is a company that works with you to understand your environment, what you have and building defenses to combat what we face today and for the attacks of tomorrow. Technology is continuously changing, businesses change every day – in order to keep up with the changes, BDS has created an extensively flexible yet highly accurate way of detecting attackers. We are attackers, and we know the best ways in detecting how attackers breach your network. An added bonus with BDS – continual penetration tests are performed regularly to enhance and develop additional safeguards. We are here to defend, protect and secure your company.

  • Blue Coat
    Booth: 230

    Blue Coat is a leader in advanced enterprise security, protecting 15,000 organizations every day. Through the Blue Coat Security Platform, Blue Coat unites network, security and cloud, providing customers with maximum protection against advanced threats, while minimizing impact on network performance and enabling cloud applications and services.

  • BluVector, Inc.
    Booth: 205

    BluVector helps security teams respond to malicious threats up to 80% faster than current approaches. As a leader in Network Security Monitoring & Analytics, BluVector applies supervised machine learning and automation so security teams can detect and respond to advanced security threats at digital speed. For more information visit: www.bluvector.io

  • Cisco
    Booth: 400

    Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

  • Critical Start
    Booth: 540

    Critical Start is a cybersecurity company with a holistic, customer-focused approach. We work with our customers to understand the impact of IT on their business and determine the associated risks. Using this risk profile, we can offer big-picture guidance on the strategies and controls that will enable them to effectively manage risk and improve security. Critical Start is 100% employee owned by a team of experts who are passionate about security, quality and service. For more information on what sets us apart, visit criticalstart.com.

  • Cybereason
    Booth: 500

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason's behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • CyberTrend
    Booth: TBD

    CyberTrend is a monthly business technology magazine for C-level executives, business owners, and affluent entrepreneurs. CyberTrend covers a broad range of technologies, companies, and solutions. Topics include mobility, security, data analytics, networking, communications, energy efficiency, and storage, among many others. Any technology that helps businesses become more efficient, improve ROI, and stay ahead of the competition is a fit for CyberTrend. CyberTrend helps readers understand the technologies that impact their organizations and make educated decisions when investing in new solutions.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Fortinet
    Booth: 100

    Fortinet secures the largest enterprise, service provider, and government organizations around the world. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 300,000 customers trust Fortinet to protect their businesses.

  • Gemalto
    Booth: 640

    SafeNet and Gemalto have joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering security services that are used by more than 30,000 businesses and two billion people in more than 190 countries around the world. We support 3,000 financial institutions and secure more than 80% of the world’s intra-bank fund transfers, and protect the world’s leading software applications.

  • HTCIA
    Booth: 350

    Investigators on the Leading Edge of Technology

    The High Technology Crime Investigation Association (HTCIA) was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes. As such, we are an organization that aspires to help all those in the high technology field by providing extensive information, education, collective partnerships, mutual member benefits, astute board leadership and professional management. Association Mission: Provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

  • Illumio
    Booth: 340

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • InfraGard
    Booth: 240

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA
    Booth: 620

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • ISSA South Texas
    Booth: 410

    The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.

  • Ixia
    Booth: 510

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks.
    Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • Juniper
    Booth: CyberLounge, 130

    Our customers don’t set out to build networks. They build on ideas that reinvent, reimagine, and improve the world around them. It makes sense that we should begin there, too.

    Through our passion for creating high-performing networks, Juniper extends knowledge, collaboration, and human advancement in industries around the world—such as energy, healthcare, education, and many others.

    While our innovative product and services portfolio evolves continuously, we need to reach farther to secure our customers’ long-term success. We’re looking beyond the horizons of today’s business challenges, and the technology future we see is built on real-time service integration. That means everything we develop must align with our vision.

  • Kudelski Security
    Booth: 100

    Kudelski Security is the premier cybersecurity innovator for Fortune 500 organizations. Our approach continuously evaluates customer’s security posture to reduce risk, maintain compliance and increase security effectiveness. Our partner, Wombat Security Technologies provides awareness and training to teach secure behavior. Wombat's solutions reduce phishing attacks and malware infections up to 90%.

  • LockPath
    Booth: 210

    LockPath is a leader in integrated risk management solutions. We empower companies of all sizes to manage risk, demonstrate compliance, monitor information security and achieve audit-ready status. In 2017, we are expanding our application portfolio to provide our customers with more efficient and effective programs. Learn more at lockpath.com.

  • QBKEY
    Booth: 250

    QBKEY is a pioneer in providing the most versatile and reliable data encryption solution for corporate clients and personal utilization as well. It allows users to manage their data, being at rest or in transit, in a truly BYOK fashion. Its next generation innovation provides a flexible, scalable and cost-effective TCO.

  • SecureWorks
    Booth: 200

    Dell SecureWorks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Dell SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.

  • Skybox Security
    Booth: 540

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • SparkCognition
    Booth: 220

    SparkCognition is a global leader in cognitive computing analytics. A highly awarded company recognized for cutting-edge technology, SparkCognition is successfully deploying a cognitive, data-driven analytics platform for clouds, devices, and the Internet of Things industrial and security markets by applying patented algorithms that deliver out-of-band, symptom-sensitive analytics, insights, and security. For more information on the company, its technology and team, please visit http://www.sparkcognition.com.

  • Symantec
    Booth: 230

    Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter and LinkedIn.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales e-Security
    Booth: 520

    Thales e-Security is the leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. We ensure that the data belonging to companies and government entities is both secure and trusted in any environment – on-premise, in the cloud, in data centers or big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged user control and high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales e-Security is part of Thales Group.

  • Trend Micro
    Booth: 300

    As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

  • TrustedSec
    Booth: 110

    Our #1 priority is you, our customer. We believe in our services and our quality of them. We truly care about each and every organization as much as you do. Our team is highly talented, skilled, senior, and not a commodity service like other INFOSEC consulting companies. TrustedSec’s model is to staff with only senior level resources and the highest quality of information security consulting. Our brand, reputation, and quality is how we have established ourselves in this industry and with the mindset of “always doing the right thing”. When we work with our customers, it’s more than “just another engagement” – it’s establishing an understanding with an organization, and working to make them better.

  • Zscaler
    Booth: 320

    Zscaler's Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Anita Bateman
    IT Executive

    Anita is a 19-year technology veteran with experience at Fortune 500 and premier energy/utility firms. She has a demonstrated track record in management, delivery, architecture and cybersecurity. She holds a Master of Sciences in Computer Science from the University of Texas at Austin.

  • speaker photo
    Wes Connell
    Threat Researcher, BluVector

    As the Threat Researcher for BluVector, Wes Connell is especially motivated and passionate for dramatically improving data hunting tradecraft within the cyber security domain. Wes has a broad range of technical interests – particularly in the security dimension of hardware, software, systems, and networks.

  • speaker photo
    Scott Gordon
    Sr. Cloud Security Specialist, Symantec

    Scott Gordon is a Senior Cloud Security Specialist at Symantec and has several years of experience with the industry leading CASB solution. Scott’s experience in International managed services product engineering and operations has given him fantastic insight into securing cloud-based applications and platforms.

  • speaker photo
    Ted Swailes
    Chief Digital Forensic Investigator, Swailes Computer Forensics

    As a digital forensic expert and licensed private investigator in the state of Texas, Ted Swailes has over twenty-four (24) years of investigative and technical security experience working with major corporations and law firms. He has brought expertise and support services to engagements in intellectual property theft investigations, non compete investigations, computer crimes and breaches, as well as civil and criminal investigations. This expertise has contributed to successful outcomes with live trial testimony, depositions, affidavits, and statements of fact.

  • speaker photo
    Col Cedric Leighton
    CNN Military Analyst, USAF (ret.) and CEO, Cedric Leighton Associates

    Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.

    Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

  • speaker photo
    Quincy Jackson
    Red Team Lead, Oil & Gas Company

    Quincy Jackson (CISSP, C|EH, GCIA, GWAPT, GREM) currently works as a Red Team Lead with over 20 years experience. His primary responsibilities include programs to evaluate and measure the actual effectiveness of the Security Operations Center. His Cyber Readiness and Defense Capability Testing Programs were created to reduce uncertainty and give assurance regarding detection, analysis and cyber defense capabilities. Quincy also specializes in web application security, penetration testing, mobile device hacking, and cyber threat defense techniques.

  • speaker photo
    Nathan Chu
    Cyber Security Systems Engineer, Cisco

    Nathan Chu is a Systems Engineer who stands at the forefront of the Cyber Security Realm to help organizations prepare for inevitable intrusions. Prior to joining Cisco’s Cyber Security team, Nathan spent 4 years as a Generalist Systems Engineer, consulting design strategies with clients to construct best practice networks.

  • speaker photo
    Hien Nguyen
    Senior Security Architect, Booz Allen Hamilton, Inc

    Hien Nguyen brings more than 16 years of IT & OT experience in the public and commercial sectors which includes information security programs, network/system security architecture, and regulatory compliance.
    Hien has also developed a growing professional service business inside a multinational management consulting firm with more than 5,000 security professionals on staff. He has worked with global enterprises to measure and mature their security capabilities across IT & OT functions.

  • speaker photo
    Christian Fontaine
    Senior Security Engineer, Trend Micro

    Christian Fontaine serves as a Senior Security Engineer for the Southeast region. He sits on several security committees at Trend Micro that evaluate and architect solutions that meet current demands for virtual and cloud environments. He has served as CISO at Humber College / University of Guelph at Humber in Canada. He has also served as a private security consultant for police agencies in Canada.

  • speaker photo
    Alex Chiu
    Threat Researcher, Cisco Systems, Inc.

    Alex is a Threat Researcher for the Talos Group at Cisco Systems, a group that specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. Much of his time is spent hunting for new and evolving threats and making sure customers are protected from them.

  • speaker photo
    Todd Truitt
    Director of Systems Engineering, US West, Illumio
  • speaker photo
    Alejandro Villegas
    Security Engineer, Amazon

    Seasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001

  • speaker photo
    Julie Villegas
    Teleion Consulting
  • speaker photo
    Dr. Paul Berryman
    Security and Compliance Manager, Andrews Kurth Kenyon, LLP

    Paul is a security manager at a Houston law firm, protecting against bad guys and bored teenagers. He’s worked in IT for over a decade following 6 years of adventures with the Navy. Paul has earned a masters in computer science and doctorate in education. Strong security starts with teaching users. It isn’t rocket science, but just in case he has a degree in that, too.

  • speaker photo
    Gregory C Braunton
    National Director, Threat Management, Incident Response & Forensics, Catholic Health Initiatives

    Gregg serves as the National Director, Threat Management, Incident Response & Forensics. In this role he manages internal/external vulnerability assessments, PENTEST activities, and web application security assessments; leads the organization’s CSIRT team, provide SCM/Cyber Hygiene governance leveraging the CIS Critical Security Controls, and supports all digital forensic and eDiscovery needs for both internal and external legal teams. Gregg has extensive civilian and military training and possesses both technical and management certifications in the Information Security discipline.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store