googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 17, 2017
    9:00 am
    SecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Elm

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.

  • Thursday, May 18, 2017
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:30 am
    Security During Acquisition or Divestiture
    • session level icon
    speaker photo
    IT Executive
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Elm

    Bad actors are becoming more aware of mergers and acquisitions as targets. This session will focus on lessons learned from large real-world projects, including planning, governance and potential pitfalls.

    8:30 am
    BluVector: Leveling the Cyber Battlefield: Using Machine Learning for a Moving Defense
    • session level icon
    speaker photo
    Threat Researcher, BluVector
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Keynote (Magnolia)

    Some of the world’s best-known brands have invested millions in cybersecurity. So have their adversaries. But malicious actors count on the fact that your defenses tend to be the same across the board. This talk demonstrates how current defenses, including machine learning, are exploited and defeated and proposes a sensible solution.

    8:30 am
    Symantec: Securing the Shift to Cloud Application Usage
    • session level icon
    speaker photo
    Sr. Cloud Security Specialist, Symantec
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Live Oak B

    As security practitioners, we must walk the line between business enablement and data security. What if you can have both? Join Scott Gordon to discuss the security challenges faced with moving to the cloud, and what you can do to safely enable the use of Cloud applications in your environment.

    8:30 am
    Cyber or Insider Threat?
    • session level icon
    speaker photo
    Chief Digital Forensic Investigator, Swailes Computer Forensics
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Pecan

    What’s the greater threat to businesses, cyber or insider? The reality is both as they are two sides of the same coin and related to one another.

    9:30 am
    OPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private Partnership
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote (Magnolia)

    Col. Cedric Leighton’s keynote presentation will cover the following:

    – Overview of the Cyber Threat based on publicly available intelligence
    – Why current Intelligence Community structure needs to be re-vamped for the Cyber Age
    – How intelligence agencies should be working with private companies
    – It’s about new legislation AND changing mindsets and cultures
    – The new relationship between the US Intelligence Community and US companies in the Cyber Age – a vision for the future

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable: The Cost and Consequence of Insider Threats (VIP Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Live Oak A
    11:15 am
    RED TEAM: Active Hacker Drills
    • session level icon
    Learn how to safely simulate malicious activity to effectively measure cyber readiness & defense capabilities.
    speaker photo
    Red Team Lead, Oil & Gas Company
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Elm

    Join us in a presentation that will demonstrate attack scenarios to effectively measure your cyber defense position. The presenter will demonstrate Red Team cyber readiness & defense capability testing techniques. The audience will discover new Red Team tools that are safe to use for your active simulations. Additionally, the presenter will share a unique approach to effectively producing metrics and measurements for active hacker drills.

    11:15 am
    Cisco: The Way We Work Has Changed. Has Your Security?
    • session level icon
    speaker photo
    Cyber Security Systems Engineer, Cisco
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Keynote (Magnolia)

    By 2018, Gartner estimates that 25% of corporate data traffic will bypass the perimeter. As organizations evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This session will review some of the new risks introduced by SaaS/IaaS adoption and show how to effectively mitigate these risks using new approaches to security architecture.

    11:15 am
    Drive Profitability While Supporting Safe and Secure Manufacturing Operations
    • session level icon
    speaker photo
    Senior Security Architect, Booz Allen Hamilton, Inc
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Live Oak B

    Technology advancements increase “online” presence of operations in a business, they also create unintended cyber exposures which could potentially affect safety, quality and availability of production/manufacturing environments. Protecting business from adverse consequences requires collaboration between IT & OT to promote security awareness and unified protection efforts.

    11:15 am
    [Trend Micro] Anatomy of a Ransomware Attack and Why It Matters
    • session level icon
    speaker photo
    Senior Security Engineer, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Pecan

    Cyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Hackers use ransomware like CryptoLocker and CryptoWall to target a wide range of organizations like yours, demanding thousands of dollars. Find out how you can protect your business from ransomware security threats. Join Christian Fontaine, senior security engineer at Trend Micro, as he outlines the latest criminal underground threats and best practices to protect your data and systems.

    12:00 pm
    Advisory Council Lunch Round Table - The Threat of IoT to the Corporate Environment (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Live Oak A

    This session is for Advisory Council members only.

    12:15 pm
    LUNCH KEYNOTE: Cisco - Emerging Threats - The State of Cybersecurity
    • session level icon
    speaker photo
    Threat Researcher, Cisco Systems, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote (Magnolia)

    People responsible for defending networks realize that the security threat landscape is constantly changing. Understanding how threats evolve is critical to building better defenses. In this presentation, I will analyze recent threats and see how Talos leverages large datasets to deliver product improvements and mitigation strategies to protect our customers.

    1:15 pm
    Panel: You Got Burned, Now What? (Incident Response)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Pecan

    We’ve all heard the adage that it’s not if it happens but when you are inevitably breached… Do you have a plan? Even a framework to go off of? What do you include? Who do you include? How often should you be practicing this plan? Join our experts as they discuss incident response plans, who should be involved, best practices, and pitfalls.
    Panelists:
    Gregg Braunton, Catholic Health Initiatives
    Duwayne Engelhardt, Wallisbank
    Eric Botts, Swailes & Company
    Manoj Tripathi, PROS
    Pulse Secure
    Paul Schofield, Ensilo
    Ram Yarlagadda, Pulse Secure
    Paul Schofield, enSilo
    Moderator: Berris Bramble

    1:15 pm
    Panel: Building a Better Mouse Trap (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote (Magnolia)

    To be successful, as an industry, we must strive to get ahead of the bad guys. Easy enough to say, but how? By taking a look at the capabilities of the threats we see today, we should be able to make some educated guesses on what threats of tomorrow will look like. We know the bad guys don’t follow the rules, take the path of least resistance, and don’t care who they hurt in the process. We need to start thinking like them so that we can figure out what their next step is instead of guessing and hoping.

    PANELISTS:
    Michael Gough, IMF Security
    Loyd McBride, Keysight
    Paul Brager, Baker Hughes GE
    Eugene Kesselman, Tapjets
    Paul Berryman, Deloitte
    David O’Neil, Kudelski Security
    Moderator: John Jorgensen, ABS Advanced Solutions

    1:15 pm
    Illumio: Stop Cyber Threats With Adaptive Micro-Segmentation
    • session level icon
    speaker photo
    Director of Systems Engineering, US West, Illumio
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Elm

    Virtualization, cloud, and the promise of containers have evolved data centers, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside data centers and clouds while speeding up application delivery.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Networking Break — Dash for Prizes and CyberHunt winners announced
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors throughout the day. Past prizes have included Kindles, Bose wireless headphones, gift cards, iPads, drones, and more! *Must be present to win.

    3:00 pm
    Social Engineering Automation
    • session level icon
    speaker photo
    Security Engineer, Amazon
    speaker photo
    Teleion Consulting
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Pecan

    The exponential security and privacy risks when social engineering is scaled via widely available APIs and automation frameworks.

    3:00 pm
    Methods That Work: Security Awareness That Changes Behavior
    • session level icon
    speaker photo
    Cyber Risk Strategy Manager, Deloitte
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Live Oak B

    91% of cyber attacks start with a phishing email. Traditional security won’t protect you from users with poor security habits and criminals know it. Learn to be an educator, marketing guru, and entertainer to get users to adopt safe online behaviors.

    3:00 pm
    Storyboarding Incident Response Methodology: Speed, Synergy and Accuracy
    • session level icon
    speaker photo
    Banking, Insider Threat Operations
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Elm

    In the context of several real world IR events, participants will see, experience and participate in learning a new paradigm of “Storyboarding” Incident Response methodology.

Exhibitors
  • ACFE Houston
    Booth: 430

    We are the world’s largest anti-fraud organization and premier provider of anti-fraud training and education. The mission of the ACFE Foundation is to increase the body of anti-fraud knowledge by supporting future anti-fraud professionals worldwide through the funding of the Ritchie-Jennings Memorial Scholarship Program. The scholarship program provides an opportunity for men and women of all ages, races, religions and income levels to advance their education. Many of these outstanding and deserving students go on to become Certified Fraud Examiners.

  • Binary Defense
    Booth: 110

    Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.

  • Blue Coat
    Booth: 230

    Blue Coat is a leader in advanced enterprise security, protecting 15,000 organizations every day. Through the Blue Coat Security Platform, Blue Coat unites network, security and cloud, providing customers with maximum protection against advanced threats, while minimizing impact on network performance and enabling cloud applications and services.

  • BluVector, Inc.
    Booth: 205

    BluVector helps security teams respond to malicious threats up to 80% faster than current approaches. As a leader in Network Security Monitoring & Analytics, BluVector applies supervised machine learning and automation so security teams can detect and respond to advanced security threats at digital speed. For more information visit: www.bluvector.io

  • Cisco
    Booth: 400

    Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

  • Critical Start
    Booth: 540

    Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.

  • Cybereason
    Booth: 500

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • CyberTrend
    Booth: TBD

    CyberTrend is a monthly business technology magazine for C-level executives, business owners, and affluent entrepreneurs. CyberTrend covers a broad range of technologies, companies, and solutions. Topics include mobility, security, data analytics, networking, communications, energy efficiency, and storage, among many others. Any technology that helps businesses become more efficient, improve ROI, and stay ahead of the competition is a fit for CyberTrend. CyberTrend helps readers understand the technologies that impact their organizations and make educated decisions when investing in new solutions.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Fortinet
    Booth: 100

    Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.

  • Gemalto
    Booth: 640

    Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centers to devices and across networks. As the global leader in cloud and data protection, our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day.

  • HTCIA
    Booth: 350

    Investigators on the Leading Edge of Technology

    The High Technology Crime Investigation Association (HTCIA) was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes. As such, we are an organization that aspires to help all those in the high technology field by providing extensive information, education, collective partnerships, mutual member benefits, astute board leadership and professional management. Association Mission: Provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

  • Illumio
    Booth: 340

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • InfraGard
    Booth: 240

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA
    Booth: 620

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • ISSA South Texas
    Booth: 410

    The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.

  • Ixia, a Keysight Business
    Booth: 510

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • Juniper
    Booth: CyberLounge, 130

    Our customers don’t set out to build networks. They build on ideas that reinvent, reimagine, and improve the world around them. It makes sense that we should begin there, too.

    Through our passion for creating high-performing networks, Juniper extends knowledge, collaboration, and human advancement in industries around the world—such as energy, healthcare, education, and many others.

    While our innovative product and services portfolio evolves continuously, we need to reach farther to secure our customers’ long-term success. We’re looking beyond the horizons of today’s business challenges, and the technology future we see is built on real-time service integration. That means everything we develop must align with our vision.

  • Kudelski Security
    Booth: 100

    Kudelski Security is the premier cybersecurity innovator for Fortune 500 organizations. Our approach continuously evaluates customer’s security posture to reduce risk, maintain compliance and increase security effectiveness. Our partner, Wombat Security Technologies provides awareness and training to teach secure behavior. Wombat’s solutions reduce phishing attacks and malware infections up to 90%.

  • Lockpath
    Booth: 210

    Lockpath is a software company bringing order to the chaos of managing risk. From SMB to enterprise, our risk management platforms flex and scale to existing processes enabling customers a straightforward approach to identify, understand, manage and report on risk.

  • QBKEY
    Booth: 250

    QBKEY is a pioneer in providing the most versatile and reliable data encryption solution for corporate clients and personal utilization as well. It allows users to manage their data, being at rest or in transit, in a truly BYOK fashion. Its next generation innovation provides a flexible, scalable and cost-effective TCO.

  • Secureworks
    Booth: 200

    Dell Secureworks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Dell SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.

  • Skybox Security
    Booth: 540

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • SparkCognition
    Booth: 220

    SparkCognition is a global leader in cognitive computing analytics. A highly awarded company recognized for cutting-edge technology, SparkCognition is successfully deploying a cognitive, data-driven analytics platform for clouds, devices, and the Internet of Things industrial and security markets by applying patented algorithms that deliver out-of-band, symptom-sensitive analytics, insights, and security. For more information on the company, its technology and team, please visit http://www.sparkcognition.com.

  • Symantec
    Booth: 230

    Symantec is the world’s leading cyber security company. Organizations worldwide look to Symantec for strategic, integrated solutions to defend against sophisticated attacks, and more than 50 million people rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home. For more information, please visit www.symantec.com.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales
    Booth: 520

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • Trend Micro
    Booth: 300

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • TrustedSec
    Booth: 110

    TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.

     

  • Zscaler
    Booth: 320

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Anita Bateman
    IT Executive

    Anita is a 19-year technology veteran with experience at Fortune 500 and premier energy/utility firms. She has a demonstrated track record in management, delivery, architecture and cybersecurity. She holds a Master of Sciences in Computer Science from the University of Texas at Austin.

  • speaker photo
    Wes Connell
    Threat Researcher, BluVector

    As the Threat Researcher for BluVector, Wes Connell is especially motivated and passionate for dramatically improving data hunting tradecraft within the cyber security domain. Wes has a broad range of technical interests – particularly in the security dimension of hardware, software, systems, and networks.

  • speaker photo
    Scott Gordon
    Sr. Cloud Security Specialist, Symantec

    Scott Gordon is a Senior Cloud Security Specialist at Symantec and has several years of experience with the industry leading CASB solution. Scott’s experience in International managed services product engineering and operations has given him fantastic insight into securing cloud-based applications and platforms.

  • speaker photo
    Ted Swailes
    Chief Digital Forensic Investigator, Swailes Computer Forensics

    As a digital forensic expert and licensed private investigator in the state of Texas, Ted Swailes has over twenty-four (24) years of investigative and technical security experience working with major corporations and law firms. He has brought expertise and support services to engagements in intellectual property theft investigations, non compete investigations, computer crimes and breaches, as well as civil and criminal investigations. This expertise has contributed to successful outcomes with live trial testimony, depositions, affidavits, and statements of fact.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Quincy Jackson
    Red Team Lead, Oil & Gas Company

    Quincy Jackson (CISSP, C|EH, GCIA, GWAPT, GREM) currently works as a Red Team Lead with over 20 years experience. His primary responsibilities include programs to evaluate and measure the actual effectiveness of the Security Operations Center. His Cyber Readiness and Defense Capability Testing Programs were created to reduce uncertainty and give assurance regarding detection, analysis and cyber defense capabilities. Quincy also specializes in web application security, penetration testing, mobile device hacking, and cyber threat defense techniques.

  • speaker photo
    Nathan Chu
    Cyber Security Systems Engineer, Cisco

    Nathan Chu is a Systems Engineer who stands at the forefront of the Cyber Security Realm to help organizations prepare for inevitable intrusions. Prior to joining Cisco’s Cyber Security team, Nathan spent 4 years as a Generalist Systems Engineer, consulting design strategies with clients to construct best practice networks.

  • speaker photo
    Hien Nguyen
    Senior Security Architect, Booz Allen Hamilton, Inc

    Hien Nguyen brings more than 16 years of IT & OT experience in the public and commercial sectors which includes information security programs, network/system security architecture, and regulatory compliance.
    Hien has also developed a growing professional service business inside a multinational management consulting firm with more than 5,000 security professionals on staff. He has worked with global enterprises to measure and mature their security capabilities across IT & OT functions.

  • speaker photo
    Christian Fontaine
    Senior Security Engineer, Trend Micro

    Christian Fontaine serves as a Senior Security Engineer for the Southeast region. He sits on several security committees at Trend Micro that evaluate and architect solutions that meet current demands for virtual and cloud environments. He has served as CISO at Humber College / University of Guelph at Humber in Canada. He has also served as a private security consultant for police agencies in Canada.

  • speaker photo
    Alex Chiu
    Threat Researcher, Cisco Systems, Inc.

    Alex is a Threat Researcher for the Talos Group at Cisco Systems, a group that specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. Much of his time is spent hunting for new and evolving threats and making sure customers are protected from them.

  • speaker photo
    Todd Truitt
    Director of Systems Engineering, US West, Illumio
  • speaker photo
    Alejandro Villegas
    Security Engineer, Amazon

    Seasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001

  • speaker photo
    Julie Villegas
    Teleion Consulting
  • speaker photo
    Dr. Paul Berryman
    Cyber Risk Strategy Manager, Deloitte

    Paul Berryman, EdD, CISSP, CISA, is a Cyber Risk Strategy Manager. He’s worked in IT security for almost 2 decades protecting against the usual suspects of hackers, criminals, and bored teenagers. After 6 years of swashbuckling adventures with the US Navy, he’s led several security operation teams. He’s a big fan of colleges, having attended 7 different ones, most recently at the University of Houston where he earned a doctorate specializing in learning and technology. Strong security starts with teaching how to behave online. It isn’t rocket science, but just in case he has a degree in that, too.

  • speaker photo
    Gregg Braunton
    Banking, Insider Threat Operations

    A strategic security partner blended with deep operational, architecture, and compliance expertise. Innovative, strategic, and tactical security leadership utilizing "business aligned" and "data-driven" cybersecurity models and frameworks. Gregg has 20+ years extensive cyber expertise leading and delivering cybersecurity operations, architecture, and security risk life-cycle management in highly compliant driven risk frameworks: HIPAA, FISMA, NIST, HiTrust. TOP SECRET CLEARANCE.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes