Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 16, 2018
    9:00 am
    SecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    CISO, Pulte Financial Services, & Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Pecan

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.

  • Thursday, May 17, 2018
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:30 am
    ISACA Chapter Meeting: Light Breakfast and Guest Presentation - Open to all Attendees
    • session level icon
    Presenting: Cybersecurity Introspection - how focused pre-breach assessment helps you see around the corner
    speaker photo
    Managing Director, UHY Advisors TAP, Inc.
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Magnolia Keynote Theater

    Interested in your local associations? Join ISACA for a chapter meeting, light breakfast and guest presentation. This session is open to all attendees.

    Guest Presentation:
    There are numerous cybersecurity products, architectures, and cyber risk management best practices to help harden your enterprise perimeter, improve preventive and detective controls, and mature overall cybersecurity posture. Yet data breaches continue. Could it happen to your business? Would you know it was happening? A pre-breach assessment may provide a quicker answer on a regular basis.

    Like the business environment, cybersecurity risk management is complicated. There are multiple variables changing subtly throughout the year. Similarly, expenditures on security skilled people, security related processes, and security technologies are subject to entropy and may lose potency as your company’s cybersecurity risk profile changes. Legacy security activities can lose focus of adapting to emerging security risks in favor of automating routine security activities.

    In this session you’ll learn:

        1. Assurance is not absolute;
        2. Annual penetration test is security theater;
        3. Change management is your cybersecurity achilles heel;
        4. Agile companies fight FUD with fact;
        5. SecDevOps is your friend
    8:30 am
    Nyotron: State of Endpoint Security – Past, Present and Future
    • session level icon
    speaker photo
    Sr. Director of Product Management, Nyotron
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Elm
    Ponemon Institute estimates an average breach cost of $3.5 million in 2017, with a 27% probability that a U.S. company will experience a breach in the next 24 months. Just in one recent example, shipping company Maersk lost over $300 million when ransomware infected its systems. Malware is winning with a never ending supply of new attack vectors, previously unseen methods and malware variants. Why, after companies have invested billions of dollars in endpoint security, are they still so vulnerable?

    This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security, along with the evolution of traditional Antivirus (AV), and the rise of Next-Generation Antivirus (NGAV) products powered by Machine Learning and Endpoint Detection and Response (EDR) solutions. It will then look into the latest endpoint security trends that promise to increase efficacy, lower TCO and deliver a more robust feature set without requiring organizations to rip and replace their existing security stack.

    This presentation will include a demo of the infamous Rubber Ducky that remains practically unstoppable by today’s endpoint security products.

    8:30 am
    WhiteHouse.gov to WhiteHouse.com and Everything In-between
    • session level icon
    Protecting and preparing our youth for their cyber future
    speaker photo
    InfoSec Advisor, Fort Bend ISD
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Live Oak B

    What is harmful versus what is educational spans a broad spectrum from external actors (trying to steal staff and student PII) to internal actors (trying to change their Texas History grades) and even well intentioned school admins (unintentionally exposing sensitive information). Balancing the security needs of the organization against the core business requirements is always a challenge, tackling the same challenge with users who are under 13 presents additional unique challenges. Navigating Federal and State laws, content filters, consent, training, bullying, contracts, lunch money, audits, etc., does your K-12 have an InfoSec Advisor?

    8:30 am
    Quantum Computing & Quantum Cryptography: The Current State of the Art
    • session level icon
    speaker photo
    Computer Scientist, Northcentral University
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Pecan

    This presentation will provide an overview of quantum computing and what that implies for cryptography. The current state of both quantum computing and post-quantum cryptography will be presented.

    9:30 am
    OPENING KEYNOTE: IoT and Smart Home Security Trends: Reducing the Fear Factor
    • session level icon
    speaker photo
    VP & CISO, BJ's Wholesale Club
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Magnolia Keynote Theater

    This presentation will provide an overview of the trends in IoT and Smart Home technology. Understanding the growing number of connected products in homes, what does it means for consumers to evaluate risks vs. benefits? At the same time, this presentation will also educate the security industry on how to promote consumerization and reduce the fear factor. Finally, we will also look at the responsibilities of product companies towards the consumers.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable - (VIP / Invite Only)
    • session level icon
    Topic: Prioritizing Risk in an Ever Changing Threatscape
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Live Oak A

    This roundtable is for our Advisory Council Members only.

    11:15 am
    [Radware] Cybersecurity Pushed to the Limit
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Pecan

    Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the U.S. presidential election, worldwide malware outbreaks and the Equifax data breach. These and other high-profile events spurred greater cyber-defense investment by everyone from nation states and global corporations to individuals purchasing anti-malware solutions for personal devices. Yet even as investments increase so do threats, hacks and vulnerabilities. This session will help you understand these complex and challenging dynamics. Based on findings from Radware’s research and a global industry survey, the session will show real attack data and customer stories to paint a picture of where we are and what security professionals can do.

    Join the session to learn more about:
    • The threat landscape deep dive—the who, what and why of attacks
    • Potential impact on your business, including associated costs of different cyber-attacks
    • Critical attacks in the midst: DNS, IoT and risks lurking in the cloud
    • Emerging threats and how to protect against them
    • A look ahead – predictions and what to prepare for

    11:15 am
    Lather, Rinse, Repeat: Reality Cyber Hygiene in a Healthcare Company to Clean the Cyber Dirt
    • session level icon
    speaker photo
    National Director, Threat Management, Incident Response & Forensics, Catholic Health Initiatives
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Elm

    Starting from scratch, this presentation will lay bare the structure and framework of a modern healthcare company’s Cyber Hygiene program; high level policies, actual real-life, nuts and bolts technical standards, real life CE/medical device reviews, how configuration drift is detected, reported and actioned. Nobody likes “cyber dirty” new systems going live, so why not clean them first? How? With a step-by-step tour of a go-live technical security assessment to clean systems prior to moving any new platform, system, infrastructure or application into production. Layer in “hygiene hunting” to detect and clean between the cracks. The session will incorporate “it happened here” stories detailing how the Cyber Hygiene program held GE, Phillips, EMC, Cerner and Cisco accountable to implement net new systems with proper security postures.

    At the end of this session, participants will be able to:
    (1) Establish and/or grow their cyber hygiene program using real-live example policies and technical standards
    (2) Implement in their own company a technical go-live assessment process that is a valuable and influential pillar of remediating security vulnerabilities
    (3) Experience a new paradigm in cyber hygiene practices – witness the ease and value of “hygiene hunting”

    11:15 am
    Navigating the Alternative Facts of Malware Prevention
    • session level icon
    speaker photo
    Information Security Program Owner, National Instruments
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Live Oak B

    This presentation, given by an individual not linked to any anti-malware vendor, is the result of over two years of research covering several dozen tools in the anti-malware space, in an effort to find the ideal tool for our corporate environment. It is intended to be an in-depth focus on the evolution of the space, the tools, and the technologies behind them, with a “no holds barred” approach to presenting our evaluation methodology and results.

    11:15 am
    Climbing the Information Security Program Mount Everest
    • session level icon
    The mountaineer will learn...
    speaker photo
    CEO, Riskceptional Strategies
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Magnolia Keynote Theater

    Implementing and operating an information security program is a lot like leading a mountain climbing expedition. Each control in the program is like a group of a climbers: a collection of people, processes and technologies each striving to be capable of reaching a point on the mountain. The CISO, as expedition leader, is trying to help each climber group increase in capability in order to reach higher points on the mountain, with the goal of reaching the peak. Like the expedition, the security program needs a strategy, planning, logistics, and execution. The expedition will have groups (controls) at varying points along the mountain, all needing support, structure, and guidance. The information security program, like the expedition on the mountain, faces condition that are unpredictable and treacherous. When the summit is approached, the sky darkens, the winds increase, and the mountain’s sheer face of rock and ice certainly seem impossible to approach.

    What the mountaineer can expect to learn:
    • Every expedition has a trek in requiring an evaluation and analysis of current state, strategy for the expedition and a plan to get things moving. Security framework applications for assessment, gap analysis, and objectives-oriented program goals.
    • Planning for the full expedition – finite resources are precious; learn how to obtain and use them wisely. Strategic planning for developing program maturity to meet risk-oriented priorities.
    • When climbing the mountain, sometimes you have to retrace your steps, revert, and try again. Regrouping strategies for when things bog down and for those beginning the climb after the expedition is underway.
    • Approaching the security program like a business will help the CISO and help the organization. Key outcomes include:
    ◦ Operations expense vs. capital investment for program enablement
    ◦ Services vs. in-house expertise for program operations
    ◦ Activity based costing for program activities
    ◦ Business case for progress and risk management for decision making

     

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Topic: Responsibilities: Should the CISO Bear it All?
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Live Oak A

    This lunch roundtable is for our Advisory Council members only.

    12:15 pm
    LUNCH KEYNOTE: Trend Micro - Digital Extortion: Ransomware and Tools of Choice
    • session level icon
    speaker photo
    Director of Sales Engineering, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Magnolia Keynote

    Digital extortion is one of the most lucrative ways cybercriminals can profit in today’s threat landscape. Many have fallen victim to this particular scheme and been bilked of their money — from ordinary users to big enterprises. Everyone is a potential target, which is why being informed about what digital extortion is, how it’s carried out and how to protect against it is critical. This is especially relevant in 2018, where we predict that digital extortion efforts will involve other methods besides the tried and tested ransomware attack.

    1:15 pm
    Cloudy Days Ahead: Security Implications of the Expansion of IIoT/IoT in Industrial Control Environments
    • session level icon
    speaker photo
    Technical Product Security Leader, Digital Technology, BHGE (Baker Hughes, a GE Company)
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: Pecan
    In recent years, business drivers requiring access to more near real time or real time data has compelled organizations to increase connectivity within their industrial control environments. That connectivity is not only to enterprise networks, however, as there has been an expansion of IIoT (Industrial Internet of Things) capability within these control environments, and a subsequent movement of data into the cloud for further enrichment. What does this mean for a domain that already has significant security challenges? This presentation will examine some of those challenges and what implications there are as IIoT continues to expand.
    1:15 pm
    Check Point: Preparing for the Next Wave of Cybersecurity Threats
    • session level icon
    speaker photo
    Security Architect, Check Point Software Technologies, Inc
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Magnolia

    The year 2017 was pivotal in the cyber security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to full-scale nation state cyber-attacks, it is clear we are at an inflection point: The 5th generation of cyber-attacks is now increasing the risks of data breaches and costly disruptions for organizations like yours.

    – How your organization is at risk from 5th generation cyber attacks
    – How to avoid the cyber threat trends occurring in your industry
    – What Gen V (5th generation) security is and why you need it now

    1:15 pm
    Panel: Building a Better Mouse Trap (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Elm

    To be successful, as an industry, we must strive to get ahead of the bad guys. Easy enough to say, but how? By taking a look at the capabilities of the threats we see today, we should be able to make some educated guesses on what threats of tomorrow will look like. We know the bad guys don’t follow the rules, take the path of least resistance, and don’t care who they hurt in the process. We need to start thinking like them so that we can figure out what their next step is instead of guessing and hoping.

    PANELISTS:
    Michael Gough, IMF Security
    Loyd McBride, Keysight
    Paul Brager, Baker Hughes GE
    Eugene Kesselman, Tapjets
    Paul Berryman, Deloitte
    David O’Neil, Kudelski Security
    Moderator: John Jorgensen, ABS Advanced Solutions

    1:15 pm
    Trend Micro: Adapting to Security in the Cloud
    • session level icon
    speaker photo
    Solutions Architect, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Live Oak B
    The speed of change in the data center with virtualization was unprecedented. The promise that virtualization would only lower costs and drive consolidation didn’t end up that way… virtualization has changed the mentality of the IT organization to a point where there are now more servers than ever, all in support of new business initiatives. Because of this unimaginable environment, the idea of simply using legacy security in the data center and cloud simply doesn’t work.
    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    Information Security Plans
    • session level icon
    speaker photo
    Counsel, Elkins PLC, ; Associate Fellow, Kings College, U. of London; non-resident Senior Fellow, Middle East Institute, Washington, D.C.
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Elm

    The presentation examines the need for policies, objectives, controls, processes and procedures to help companies manage the risk, threats, and vulnerabilities that can cause loss as a result of a cyber breach or loss of confidential/proprietary information. It examines organizational responsibilities, key steps in forging and executing an Information Security Plan, and what you can do to better protect yourself from loss.

    3:00 pm
    When the “IT” Hits the Fan, Stick to the Plan: Incident Response Plan Management
    • session level icon
    speaker photo
    Cyber Team Lead / Incident Coordinator, Aramco Services
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Pecan

    Incident Response is a critical process for any organization. The effectiveness of the incident response plan can determine whether or not an organization can sustain and recover from a cyber attack. As with any process within the organization, the incident response plan needs continuous testing and review to ensure it remains effective for the organization.

    3:00 pm
    Lessons Learned in IT/OT Convergence
    • session level icon
    speaker photo
    Principal, RSM US LLP
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Live Oak B

    As more cyber maturity is driven in the OT environments leveraging existing IT tools, many organizations are facing the challenge of whether to converge IT and OT into a shared purpose organization that can govern and operate in both environments.

    This presentation will discuss current cyber trends seen in IT and OT across industries, what we have seen work well in organizations when implementing a company-wide cybersecurity program for IT and OT environments, and challenges / lessons learned from IT/OT convergence initiatives at companies of different sizes and industries.

    3:00 pm
    White-Collar Crime: The Challenges and Moral Dilemma of Justice
    • session level icon
    Don't let the white-collar criminals off the morality hook with the the advancement of cyberlife in the cloud.
    speaker photo
    Investigative Auditor, State of Texas
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Magnolia Theater

    Diane Glick’s presentation will cover the following topics:
    > A brief history of the term “white-collar crime” coined by Edwin Sutherland, and his forward-looking perspective
    > The characteristics of a white-collar criminal, and the common motives of those criminals
    > Social responsibility for holding white-collar criminals accountable
    > Examples of white-collar criminal cases over the past 100 years
    > The importance of continuing the fight against white-collar crime and holding criminals fully accountable (stiff prison sentences and restitution)

Exhibitors
  • ACFE Houston
    Booth: 580

    We are the world’s largest anti-fraud organization and premier provider of anti-fraud training and education. The mission of the ACFE Foundation is to increase the body of anti-fraud knowledge by supporting future anti-fraud professionals worldwide through the funding of the Ritchie-Jennings Memorial Scholarship Program. The scholarship program provides an opportunity for men and women of all ages, races, religions and income levels to advance their education. Many of these outstanding and deserving students go on to become Certified Fraud Examiners.

  • Arctic Wolf Networks
    Booth: 260

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOCTMservice is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.

  • Arista Networks
    Booth: 660

    Arista Networks was founded to pioneer and deliver software-driven cloud networking solutions for large data center storage and computing environments. Arista’s award-winning platforms, ranging in Ethernet speeds from 10 to 100 gigabits per second, redefine scalability, agility and resilience. Arista has shipped more than 15 million cloud networking ports worldwide with CloudVision and EOS, an advanced network operating system. Committed to open standards, Arista is a founding member of the 25/50GbE consortium. Arista Networks products are available worldwide directly and through partners.

  • Armis, Inc
    Booth: 540

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Bay Pay Forum
    Booth:

    The BayPay Forum, a Silicon Valley-based international network composed of over 14,000 payment and commerce executives, entrepreneurs and investors from thousands of different companies, serves as a forum to connect members in identifying and understanding the emerging trends and innovations in the industry.

  • Binary Defense Systems
    Booth: 240

    BDS is a company that works with you to understand your environment, what you have and building defenses to combat what we face today and for the attacks of tomorrow. Technology is continuously changing, businesses change every day – in order to keep up with the changes, BDS has created an extensively flexible yet highly accurate way of detecting attackers. We are attackers, and we know the best ways in detecting how attackers breach your network. An added bonus with BDS – continual penetration tests are performed regularly to enhance and develop additional safeguards. We are here to defend, protect and secure your company.

  • Check Point Security
    Booth: 100

    Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

  • CIOReview
    Booth:

    CIOReview is a technology magazine that talks about the enterprise solutions that can redefine the business goals of enterprises tomorrow. It is the leading source that shares innovative enterprise solutions developed by established solutions providers, upcoming hot enterprises and is a neutral source for technology decision makers. Published from Fremont, California, CIOReview is an excellent platform for the enterprise to showcase their innovative solutions.

  • CloudPost Networks
    Booth: 220

    Our mission is to empower organizations to reduce risk by classifying, managing, and safeguarding business IoT systems.

  • Comodo Cybersecurity
    Booth: 150

    In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers globally.

     

  • Cylance
    Booth: 120

    Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

  • EC-Council
    Booth:

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Fortinet
    Booth: 340

    Fortinet secures the largest enterprise, service provider, and government organizations around the world. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 300,000 customers trust Fortinet to protect their businesses.

  • Global Cyber Alliance
    Booth:

    The Global Cyber Alliance (GCA) is an international, cross-sector effort dedicated to confronting cyber risk and improving our connected world. It is a catalyst to bring communities of interest and affiliations together in an environment that sparks innovation with concrete, measurable achievements. While most efforts at addressing cyber risk have been industry, sector, or geographically specific, GCA partners across borders and sectors. GCA’s mantra “Do Something. Measure It.” is a direct reflection of its mission to eradicate systemic cyber risks. GCA, a 501(c)3, was founded in September 2015 by the Manhattan District Attorney’s Office, the City of London Police and the Center for Internet Security. Learn more at www.globalcyberalliance.org

  • InfraGard Houston
    Booth: 460

    The Houston Chapter of InfraGard provides members of the Critical Infrastructure community a means to share information to prevent, protect, and defend against hostile acts against Critical Infrastructure and Key Resources (CIKR). InfraGard is designed to address the need for private and public-sector information-sharing mechanisms at both the national and local levels. It is our goal to improve and extend information sharing between private industry and the government, particularly the FBI, when it comes to critical national infrastructures.

  • iRobot
    Booth: 600

    iRobot, the leading global consumer robot company, designs and builds robots that empower people to do more both inside and outside of the home. iRobot’s products, including the award-winning Roomba® Vacuuming Robot and the Braava® family of mopping robots, have been welcomed into millions of homes around the world and are hard at work every day helping people to get more done.

  • ISACA Houston
    Booth: 360

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area. We conduct chapter meetings the third Thursday of the month that typically includes a morning or afternoon training along with a luncheon meeting/training. We also sponsor SIG group meetings on the same day. Local seminars are held in the spring and fall that include topics of high relevance to our membership community. Certification training is scheduled before each ISACA exam date based on interest level.

  • Ixia, a Keysight Business
    Booth: 320

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • Kaspersky
    Booth: 440

    We’re an independent global cybersecurity company that empowers people to make the most of technology and the endless opportunities it brings. Backed by our deep threat intelligence, security and training expertise, we give businesses the power to stay safe—and the confidence to accelerate their own success. With insights gained from our unique international reach, we secure consumers, governments and more than 270,000 organizations. We’re proud to be the world’s most tested and awarded cybersecurity, and we look forward to keeping your business safe. Bring on the future.

  • Kudelski Security
    Booth: 340

    Kudelski Security is the premier cybersecurity innovator for Fortune 500 organizations. Our approach continuously evaluates customer’s security posture to reduce risk, maintain compliance and increase security effectiveness. Our partner, Wombat Security Technologies provides awareness and training to teach secure behavior. Wombat’s solutions reduce phishing attacks and malware infections up to 90%.

  • Nyotron
    Booth: 200

    Nyotron provides the industry’s first OS-Centric Positive Security to strengthen laptop, desktop, and server protection. Unlike all other approaches, our patented technology does not care about the type of threat or the attack vector, allowing us to provide ultimate protection by stopping the intended damage.

    Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.

  • Radware
    Booth: 300

    Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

  • RedSeal
    Booth: 140

    At RedSeal, our vision is to become the essential analytics and decision-making platform for building digitally resilient organizations people can trust. We do this by becoming the measure by which every organization can quantify its digital resilience. As thought leaders on resilience, we envision every organization starting the security discussion with the question “What’s our Digital Resilience Score?” Founded in 2004, RedSeal is headquartered in Sunnyvale, California.

  • Secure Data Solutions
    Booth: 260

    Secure Data Solutions is a Texas based Security Partner providing comprehensive results to our clients and giving them confidence in their security strategy. Using fundamental and leading-edge security technologies, Secure Data Solutions delivers expertise and visibility in all aspects of Network and Cyber-Security.

  • Securonix
    Booth: 380

    Securonix is redefining the next generation of cyber-threat detection using the power of machine learning and big data. Our purpose-built security analytics platform uses machine learning to track and create baselines of user, account, and system behavior and detects the most advanced insider threats, cyber threats, and fraud activities in real time. Built on a Hadoop platform, the Securonix solution provides an open platform with unlimited scalability. Securonix provides incident orchestration capabilities with playbooks that enable automated incident response. Globally, customers use Securonix to address their insider threat, cyber threat, cloud security, fraud, and application security monitoring requirements. Visit www.securonix.com.

  • Skyhigh Networks
    Booth: 640

    Enterprises are responsible for how they use cloud services. But today’s security is designed for the network and devices, not the cloud. Skyhigh gives enterprises the tools they need to protect data and users in real time across all cloud services without introducing any friction to the user experience. With total control over their data and activities, enterprises can confidently leverage cloud to accelerate their business. It’s security that accelerates business.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Trend Micro
    Booth: 400

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • TrustedSec
    Booth: 240

    TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.

     

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services, & Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Norman Comstock
    Managing Director, UHY Advisors TAP, Inc.

    Norman is President and Managing Director of UHY Advisors TAP, Inc., a subsidiary of UHY Advisors, bringing over 25 years of experience in strategic consulting services. Norman advises clients on enterprise risk management, IT assurance and governance, and cybersecurity. He is also an Instructor for courses in Business Ethics, and Governance, Risk, and Compliance at the C.T. Bauer School of Business at the University of Houston. Norman served as VP of Technology for IIA Houston 2011-2014, and served as President of the ISACA Houston Chapter 2012-2016. He maintains several certifications in security and assurance, including: CISSP, QSA, CISA, CGEIT, CIA, CRMA, and CCSA.

  • speaker photo
    Rene Kolga
    Sr. Director of Product Management, Nyotron

    Rene Kolga, CISSP, heads Product Management and Business Development for North America at Nyotron. Prior to working at Nyotron, Rene was Head of Product at ThinAir. Rene also spent eight years at Symantec where he managed multiple enterprise security product lines in the areas of encryption and endpoint security. Additionally, Rene led dozens of endpoint management, backup and business intelligence product teams at SolarCity, Citrix and Altiris. Earlier in his career, Rene run Customer Support and QA teams. Rene earned his Computer Science degree from Tallinn University of Technology. He also received an MBA from University of Utah.

  • speaker photo
    Christopher Kar
    InfoSec Advisor, Fort Bend ISD

    Mr. Kar is the Information Security Advisor for Fort Bend ISD, the 7th largest school district in TX with ~74,500 students, ~11,000 employees and contractors spanning 80+ educational and administrative campuses. Chris has previously held leadership roles at both public and private sector organizations including Memorial Hermann, the U.S. House of Representatives, the State of Michigan and Michigan State Univerity (where he also graduated). He is the Houston InfraGard Education SIG Chief, is a CISSP (since 2002) and expects to complete a Master's in Information Security and Assurance later this year.

  • speaker photo
    Chuck Easttom
    Computer Scientist, Northcentral University

    Dr. Easttom is the author of 26 computer science books and over 40 research papers, as well as an inventor with 14 patents. He is a frequent speaker at computer science and security conferences, and is a Distinguished Speaker of the ACM (Association of Computing Machinery). He holds a Doctor of Science in cyber security and three masters degrees.

  • speaker photo
    Ravi Thatavarthy
    VP & CISO, BJ's Wholesale Club

    Ravi Thatavarthy brings 20+ years of experience in Information Security to his role with a strong background in Security Architecture and building Security programs from ground up. His approach to Information Security is unique and well-balanced with a focus on ‘Business Value’ and ‘User Delight’. He recently appeared in ‘Profiles in Confidence’ as a Security leader running confident Security program. He spoke and served as a panelist in multiple conferences. Before joining BJ's, he was the Head of Information Security at iRobot, and previously led the Security, Policy & Compliance programs at Haemonetics where he worked as Director of Global Security & Policy.

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    Gregory C Braunton
    National Director, Threat Management, Incident Response & Forensics, Catholic Health Initiatives

    Gregg serves as the National Director, Threat Management, Incident Response & Forensics. In this role he manages internal/external vulnerability assessments, PENTEST activities, and web application security assessments; leads the organization’s CSIRT team, provide SCM/Cyber Hygiene governance leveraging the CIS Critical Security Controls, and supports all digital forensic and eDiscovery needs for both internal and external legal teams. Gregg has extensive civilian and military training and possesses both technical and management certifications in the Information Security discipline; CISSP, GCFA, C|HFI, C|EH, GIAC/GSEC (Gold), DoD Computer Network Defense Course (CNDC), MCP, Carnegie Mellon Incident Response Handling, Carnegie Mellon Information Assurance for Technical Staff, Certified Information Systems Security Manager (CISSM), DoD 8570 Certified/Compliant IA Tech III and/or Mgmt III. He currently lives and works in Houston.

  • speaker photo
    Josh Sokol
    Information Security Program Owner, National Instruments

    Josh Sokol, CISSP, graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies, including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as the Information Security Program Owner at National Instruments. In his current role, Sokol manages all compliance, security architecture, risk management, and vulnerability management activities for NI. Sokol created the free and open source risk management tool named SimpleRisk, has spoken on dozens of security topics including the much-hyped “HTTPS Can Byte Me” talk at Black Hat 2010, and recently finished four years serving as a Director of the OWASP Foundation.

  • speaker photo
    Brian Engle
    CEO, Riskceptional Strategies

    Brian A. Engle, CISSP, CISA Founder and CEO Riskceptional Strategies Brian Engle is an experienced security and risk management professional who works with business leaders to create and implement successful strategies for implementing sustainable risk-based information security programs. Prior to founding Riskceptional, Brian led the Retail Cyber Intelligence Sharing Center (R-CISC) from inception to significant membership levels sharing threat intelligence and cybersecurity strategies. Brian has been a CISO and executive leader for over 25 years in a variety of industries. Roles include leading the cybersecurity efforts for the State of Texas, the Texas Health and Human Services Commission, Temple-Inland, and Guaranty Bank as well as various information security community volunteer leadership.

  • speaker photo
    Brian Morovitz
    Director of Sales Engineering, Trend Micro

    For the past 10 years, Brian has helped organizations deploy and operationalize enterprise security solutions. With a background in customer success management, he built Trend Micro’s centralized premium support center of excellence in Las Colinas, Texas. Prior to Trend Micro, Brian led product launch, organizational change, process improvement, and marketing initiatives in the financial services sector.

  • speaker photo
    Paul Brager
    Technical Product Security Leader, Digital Technology, BHGE (Baker Hughes, a GE Company)

    Paul W. Brager, Jr has been a contributing member of the cyber security community for over twenty-three (23) years, with expert level knowledge of security architecture and defense-in-depth design, critical infrastructure/industrial cyber, IoT, and IIoT. He has extensive cyber experience in the oil and gas, manufacturing, power utility, chemical, banking and telecommunications sector. In his current capacity as a Technical Product Security Leader, Digital Technology with Baker Hughes, a GE Company, Paul works closely with oil and gas, energy, and internal clients to integrate cyber security capabilities and strategies into their critical manufacturing and operating infrastructure lifecycles. His efforts enable customers and internal clients to weave defense-in-depth cyber strategies into the overall design of products and solutions, thereby contributing to the oil and gas industry’s ability to have a more defensible posture against some of the world’s most complex adversaries.

  • speaker photo
    Richard Devera
    Security Architect, Check Point Software Technologies, Inc

    Richard Devera is the Security Architect at Check Point Software Technologies, Inc.. His background includes 20+ years of industry security experience. Richard is involved in providing best practices security strategies for all areas in networking. He is considered on of the thought leaders within the company providing strategic and technology direction. Richard has held several successful positions at Check Point from a Security Engineer, Area SE Manager, to Regional SE Director. Prior to Check Point he held the position as a network engineer providing support for the Mission Control Center and other Space Operations Centers in across the world.

  • speaker photo
    Charles Williams
    Solutions Architect, Trend Micro

    With over 17 years in security and compliance, Charles is a technology evangelist enabling customers globally from a pre-sales and post-sales perspective to ensure proper deployment and configuration of endpoint, gateway, and datacenter security solutions.

  • speaker photo
    James Farwell
    Counsel, Elkins PLC, ; Associate Fellow, Kings College, U. of London; non-resident Senior Fellow, Middle East Institute, Washington, D.C.

    James counsels clients in the areas of Cybersecurity and Privacy Protection. He has a CIPP/US certification from the International Association of Privacy Professionals. James advised the U.S. Department of Defense and U.S. Special Operations Command on cybersecurity and strategic communication. He served as consultant to the U.S. Department of Defense,

  • speaker photo
    Levone Campbell
    Cyber Team Lead / Incident Coordinator, Aramco Services

    Levone Campbell is the Cyber Security Lead / Incident Coordinator for his organization. Levone holds two Bachelor degrees in Management and Marketing from North Carolina A&T State University, a Masters in Business Administration from Walden University, and a Masters in Technology Management from Georgetown University. He also holds numerous certifications.

  • speaker photo
    Tauseef Ghazi
    Principal, RSM US LLP

    Ghazi currently serves as a principal in RSM’s security, privacy, and risk practice with more than 15 years of infrastructure security, system implementation and application security review experience. He leads RSM’s security, privacy and risk practice for the Central Region and leads RSM’s critical infrastructure practice nationally. In his role Ghazi leads teams that help our client build, operate or transform cyber security programs ranging from tactical initiatives to large-scale cyber program implementations both in IT and Operational Technology environments.

  • speaker photo
    Diane Glick
    Investigative Auditor, State of Texas

    30+ years experience in auditing and investigating white-collar crimes. Currently employed by Texas Office of Attorney General Medicaid Fraud Control Unit. Assisted Harris County DA in successfully prosecuting a case of cash theft of $150,000. Hold ACFE, CIA, and CGFM certifications. Past President of Houston Chapter, ACFE. Business Administration in Accounting from Oklahoma State University, and Masters of Liberal Studies from Rice University.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store
11th Annual Conference

Don't miss out! Join your InfoSec peers for high-quality, affordable training and networking. Sign up today.