Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 2, 2017
    9:00 am
    SecureWorld PLUS Course – Big Data and IoT: Wonderful, Terrible, Inevitable
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Court Yard 2

    Join us the day before the conference for 6 additional CPE credits (12 total when attending the PLUS course and the conference).

    Big Data and the Internet of Things are revolutionizing virtually every industry. We’re told of pinpoint accurate medical records and diagnostics, all-encompassing analytics, mastery of industrial processes, effortless control of our static and moving environments and complete connectivity and communication with anything and everything we might ever imagine being useful. Wonderful!

    But SecureWorld attendees and others who’ve been in IT Security for any appreciable time have an internal red flag that goes up upon hearing “It’s gonna be great!” Then those euphoria-deflating security questions start multiplying and running through our somewhat addled brains. Where is all this Big Data coming from? Where will it reside? Who controls it? Who grants access? On what basis? How do we know it’s accurate, relevant? Is it complete enough for life and death medical decisions? What about analytics system administration; data monitoring and correction procedures; incompatible security architectures? Oh yeah, and privacy?

    What kind of security is built into all these Internet-connected devices? How easy is it to control access? Is the data they trade and store encrypted? Who’s liable if they fail or give erroneous signals?

    Big Data and IoT are neither fads nor merely trends, they constitute a revolution. There’s no going back. Join us as we look from a security perspective at both the bright and dark sides.

  • Wednesday, May 3, 2017
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Advisory Council Round Table: The Costs and Consequences of Insider Threat (VIP / Invite Only)
    • session level icon
    Coffee / Breakfast Served
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: Court Yard 7
    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    8:30 am
    Defenders Want to Score Goals Too!
    • session level icon
    InfraGard Session - Open to All Attendees
    speaker photo
    CISO, Cboe Global Markets
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Keynote Theater

    File hashes, signatures and IP addresses provide us the ability to defend our organizations, yet breaches still occur. Rather than always playing defense, we will provide you with activities and examples of how to get ahead of the attackers and score goals.

    8:30 am
    IoT Defense: A Holistic Approach
    • session level icon
    speaker photo
    Sr. Director of Technology, (ISC)2
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Court Yard 3

    Reviewing the current state of IoT devices, their cloud endpoints and the connection between them to understand the threat landscape and where our focus needs to be in the years ahead.

    8:30 am
    Aligning Functional Roles to Support Governance and Leadership in Cybersecurity
    • session level icon
    ISACA Session - Open to all Attendees
    speaker photo
    Owner/Consultant, BAR Management Solutions
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Court Yard 4

    With cybersecurity gaining more visibility and importance in the corporate boardroom, how does one effectively use their role to help support the governance function in this critical area of any organization? Come and explore how to be a key part of your team, no matter your level.

    8:30 am
    The State of the State
    • session level icon
    Gain a better understanding of what the state of Missouri is doing to protect its citizens information.
    speaker photo
    Network Security Analyst CIT III, Office of Cyber Security, State of Missouri
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Court Yard 5

    This presentation will be discussing the state of Missouri’s security posture and what we have seen in the last year.

    9:30 am
    OPENING KEYNOTE: The Cost and Consequences of Complexity in IT Security
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    The actions of Imposters, negligent and malicious insiders can have significant financial and reputational consequences for companies. Most companies, according to recent Ponemon Institute research, admit they have failed to detect a data breach involving the loss or theft of business-critical information. They also believe it is highly likely that one or more pieces of information critical to the success and competitiveness of their companies is now in the hands of a competitor. In this session, Dr. Larry Ponemon will quantify the cost of the insider risk, why the threat is serious and how to secure business-critical information in the workplace.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:15 am
    Ready Is the New Black: Data Theft, Breach Response, and Liability Updates
    • session level icon
    speaker photo
    Partner and Co-Chair of the Data Security and Privacy Practice, Armstrong Teasdale
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Court Yard 5

    When it comes to data security, knowing a little goes a long way. Jeff Schultz, Armstrong Teasdale partner and co-chair of the firm’s Data Security and Privacy practice, will cover common and even some unexpected threats, how to prepare for and how to respond following a breach, and potential liability.

    11:15 am
    Containers: Burden or Benefit for InfoSec?
    • session level icon
    Container Fundamentals, Security Concerns and Best Practices
    speaker photo
    CISO, QTS Datacenters
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Court Yard 3

    Application containers provide abstraction and isolation between applications and the operating system, enabling portability. But what about security? Infosec professionals need to understand how application containers impact an organization’s security posture. Come learn the fundamentals of application containers, the security challenges and opportunities they introduce, and best practices / strategies.

    11:15 am
    [Radware] Cybersecurity Pushed to the Limit
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Court Yard 4

    Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the U.S. presidential election, worldwide malware outbreaks and the Equifax data breach. These and other high-profile events spurred greater cyber-defense investment by everyone from nation states and global corporations to individuals purchasing anti-malware solutions for personal devices. Yet even as investments increase so do threats, hacks and vulnerabilities. This session will help you understand these complex and challenging dynamics. Based on findings from Radware’s research and a global industry survey, the session will show real attack data and customer stories to paint a picture of where we are and what security professionals can do.

    Join the session to learn more about:
    • The threat landscape deep dive—the who, what and why of attacks
    • Potential impact on your business, including associated costs of different cyber-attacks
    • Critical attacks in the midst: DNS, IoT and risks lurking in the cloud
    • Emerging threats and how to protect against them
    • A look ahead – predictions and what to prepare for

    11:15 am
    Infosec Heresies: What We’re Doing Isn’t Working
    • session level icon
    It’s time to question your own authority.
    speaker photo
    Information Security and Infrastructure Manager, Educational Testing Service
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Court Yard 6

    Stop writing policies that no one reads or enforces. Stop paying for security tools that don’t demonstrably reduce risk. Stop saying “no” to everyone. Maybe a bit of information security heresy is just what we need to reverse the trend of information security failures in our organizations.

    12:00 pm
    Advisory Council Round Table: Riding the IoT Cloud: Marketing Genius or Privacy Nightmare? (VIP / Invite Only)
    • session level icon
    Lunch Served
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Court Yard 7
    12:15 pm
    LUNCH KEYNOTE: Surviving the Siege – Medieval Lessons in Modern Security
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    Warfare and the arts of intrusion have advanced considerably since the Middle Ages, but in many ways the principles of fortification we use today remain the same. The great castles of antiquity were ingeniously designed with multiple layers of physical security to protect their inhabitants from persistent, even advanced enemy threats. Their carefully planned and creative defensive measures provide rich metaphors, both positive and negative, for today’s cyber guardians. On the other hand, clever, daring, sometimes brilliant offensive strategies and tactics have historically breached battlements thought to be unassailable. Come join us as we examine lessons that can be applied to securing our own sophisticated digital fortresses.

    1:15 pm
    Panel: Cloudy with a Chance of Breach
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Court Yard 3

    Everything old is new again. Migrating to the cloud certainly is not a new thing. It is for some smaller companies that are just now able to afford making the move to the cloud. Cloud boasts a secure, disaster proof option for companies to store their data offsite with access to that data from practically anywhere. So, who’s fault is it when the data is compromised? What if your information is stolen from the cloud because another user’s data was at fault? At the end of the day, isn’t the cloud just someone else’s computer? Join this panel discussion as they guide you through the pros and cons in migrating to the cloud.
    Panelists
    Ronald Pipkins, Alert Logic
    Brandon Bradshaw, Trend Micro
    Ron Shuck, CURO Financial Technologies Corp.
    Kevin Augspurger, Unite Private Networks
    Moderator: Florian Yanez, Helzberg Diamonds

    1:15 pm
    Panel: Building a Better Mouse Trap (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    To be successful, as an industry, we must strive to get ahead of the bad guys. Easy enough to say but how? By taking a look at the capabilities of the threats we see today we should be able to make some educated guesses on what threats of tomorrow will look like. We know the bad guys don’t follow the rules, take the path of least resistance, and don’t care who they hurt in the process. We need to start thinking like them so that we can figure out what their next step is instead of guessing/hoping.
    Panelists
    Sean Griesheimer, RSA
    Scott Hamann, One Identity
    Heeyoung Sim, Darktrace
    Justin Sharples,Core First Bank & Trust
    Rich Keith, SailPoint
    Moderator: John Godfrey, CISO, University of Kansas Medical Center

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    How Mature is Your Security Program?
    • session level icon
    speaker photo
    VP of Information Security, Veterans United Home Loans
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Court Yard 3

    We will look at a couple of tools that quickly and easily help any organization assess the maturity level of their security program. We will also show how to use the results to help communicate risk and drive spending in the right areas to show demonstrable improvement in a short time.

    3:00 pm
    For The Record: SPF, DKIM, and DMARC Records
    • session level icon
    SecKC Session
    speaker photo
    Director of Technical Operations - Cino Ltd | Director of IT, Challenger Sports
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Court Yard 5

    Discover SecKC, and learn how to use SPF, DKIM, and DMARC records to define who can and can’t send email AS YOUR COMPANY to the world, as well as specify what to do with messages that don’t align with your policies. See real-world examples of how the speaker blocks approximately half a million fraudulent messages per week using these simple tools.

    3:00 pm
    RSA: Top 5 Challenges & Mistakes in Breach Detection and Response
    • session level icon
    Recognize and avoid common breach challenges, and understand the importance of comprehensive visibility.
    speaker photo
    Field CTO (US) & Principal Sales Engineer, RSA
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Court Yard 4

    Organizations of all sizes are under attack today, and one common challenge is how ill–prepared we all tend to be while responding. Join RSA as we talk about lessons learned and how to most effectively combine people, processes, and technologies in the midst of a breach response.

    3:00 pm
    What I Learned from Building an ISO 27001 Compliant Security Program
    • session level icon
    speaker photo
    Director of Information Security, Polsinelli PC
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Court Yard 6

    ISO Certification is globally recognized. If you or your company are considering certification, discover what you will encounter
    along the way from someone who has gone through the process.

Exhibitors
  • BeyondTrust
    Booth: 108

    Your Ally Against Cyber Security Threats
    BeyondTrust cyber security solutions deliver the visibility to reduce risks and the control to act against internal and external data breach threats.

  • Black Duck Software
    Booth: 101

    Black Duck is a global leader in open source risk management, with the industry’s largest knowledge base of open source project, license, and security information, covering 530+ billion lines of code for 2+ million, 79,000+ vulnerabilities, and 2,500 open source licenses. We provide visibility into the security, license compliance, and code quality risks affecting the open source components used in organizations’ codebase, including a focus on container security. We augment M&A due diligence with on-demand audits of third-party code libraries. We invest heavily in R&D with our Center for Open Source Research and Innovation and 100+ researchers and engineers worldwide.

  • DataLocker
    Booth: 120

    DataLocker is the leading provider of advanced encryption solutions. With a complete suite of hardware encrypted products, cloud encryption gateway and central management platforms, DataLocker protects sensitive data and intellectual property for thousands of government, military and enterprise clients worldwide.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • FireEye
    Booth: 209

    FireEye (https://www.fireeye.com/) is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,100 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.

  • Gemalto
    Booth: 133

    Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centers to devices and across networks. As the global leader in cloud and data protection, our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day.

  • GuidePoint Security LLC
    Booth: 108

    GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com

  • Hexadite
    Booth: 108

    Hexadite AIRS connects to existing security detection systems to investigate every threat, leveraging artificial intelligence to apply targeted mitigation to stop security breaches in their tracks.

  • InfraGard
    Booth: 200

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • Integration Partners
    Booth: 221

    We know and understand you have options when choosing the right partner. Networking technology alone isn’t a differentiator, it’s how we do business with you. We’ve curated the best solutions not just to support IT needs, but to support your business strategy. Our culture is one that influences the customer experience. We never stop improving, and so we will never let you fall behind. From this simple and often overlooked practice, we believe the greatest customer relationships come from our mutual and shared strategies. Now just think… WHAT’S POSSIBLE.

  • ISACA Kansas City
    Booth: 232

    Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.

  • (ISC)2
    Booth: 132

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

  • ISSA Kansas City
    Booth: 213

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.

  • Kansas City ECTF
    Booth: 228

    The USSS ECTF aims to increase the resources, skills and vision by which state, local, and federal law enforcement agencies team with prosecutors, private industry and academia to fully maximize what each has to offer in an effort to combat criminal activity. The common purpose is the prevention, detection, mitigation, and aggressive investigation of attacks on the nation’s financial and critical infrastructures.

  • KU – Edwards Campus
    Booth: 233

    The University of Kansas holds a tradition of excellence over a century old. In the 1970s, it shared that tradition with Greater Kansas City by providing courses to working professionals. In 1993 the university opened another location, the KU Edwards Campus, to provide permanent growth and education in the Kansas City community. In the past two decades, it has contributed more than $400 million to the Johnson County economy. In 2008, the Edwards Campus became proud partners in the Johnson County Education Research Triangle.

  • Malwarebytes
    Booth: 100

    Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations, simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives. Visit us at www.malwarebytes.com/business.

  • Okta
    Booth: 108

    Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

  • Proofpoint
    Booth: 113

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Radware
    Booth: 208

    Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

  • Rapid7
    Booth: 201

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • RSA a Dell Technologies Company
    Booth: 128

    RSA Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions.  With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change.

  • SecKC
    Booth: 240

    For those of you in Kansas City who find yourselves doing information security work as part of the day-to-day (be it consulting, penetration testing, internal compliance or just being the netadmin or sysadmin that has to mind the patches, firewalls and whatnot), I suggest trying to make it to SecKC.

  • SentinelOne
    Booth: 108

    SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tenable
    Booth: 108

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • Venafi
    Booth: 108

    Venafi secures and protects keys and certificates so they can’t be used by bad guys in cyber attacks. Criminals want to gain trusted status and go undetected. This makes keys and certificates a prime target. Criminals steal and compromise keys and certificates that are not properly protected, and use them to circumvent security controls. This has become the attack of choice. As a Gartner-recognized Cool Vendor, Venafi delivered the first trust protection platform to secure cryptographic keys and digital certificates that businesses and governments depend on for secure communications, commerce, computing, and mobility. Venafi finds all keys and certificates and puts them under surveillance to detect anomalies. Vulnerable keys and certificates are fixed to prevent attack. Ongoing remediation is performed automatically. Venafi strengthens defenses of today’s critical security controls.

  • Zscaler
    Booth: 129

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Aaron Weissenfluh
    CISO, Cboe Global Markets

    Aaron Weissenfluh currently serves as the Chief Information Security Officer of one of the largest stock exchanges in the world. He has presented internationally and leads the charge to forever end the metrics based approach to security.

  • speaker photo
    Jason Cradit
    Sr. Director of Technology, (ISC)2

    As Sr. Director of Technology at TRC, a national engineering, environmental consulting and construction management firm, Jason’s mission is to deliver high-quality and cost-effective technology solutions that contribute to the business effectiveness of the organization. He brings 15+ years of Information Technology experience in various positions around Oil and Gas. Jason has a Bachelor of Science in Management from Baker University and a Masters in Information Technology, with an emphasis in Security from Kansas University.

  • speaker photo
    Brian Howell
    Owner/Consultant, BAR Management Solutions

    Brian Howell, CISA, is an experienced business consultant and entrepreneur. He uses his business knowledge and experience to communicate complex concepts and issues in simple terms. Brian has held several public accounting and consulting positions focusing on business process analysis, the internal control environment, information systems and operations risk management. In his current role, he serves his clients in a wide range of areas including business development, IT audit and governance, and operational metrics. Brian currently serves as a Director for the local Kansas City ISACA chapter.

  • speaker photo
    Aaron Riley
    Network Security Analyst CIT III, Office of Cyber Security, State of Missouri

    Born and raised in Kansas City, I'm a proud Missourian. I have received two degrees from Moberly Area Community College in computer science and working on a third. I have been with the state for 3 years and am currently with the SOC team in the Office of Cyber Security.

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Jeff Schultz
    Partner and Co-Chair of the Data Security and Privacy Practice, Armstrong Teasdale

    Jeff Schultz is an experienced business litigator with extensive knowledge about the field of data security and privacy. He is co-chair of Armstrong Teasdale’s Data Security and Privacy practice group and a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals.

  • speaker photo
    Andrew Wild
    CISO, QTS Datacenters

    Andrew Wild is the chief information security officer at QTS Data Centers, the only fully integrated data center, managed hosting and cloud services provider. Wild has spent more than 25 years developing effective, customer-driven information security, incident response, compliance and secure networking programs for technology and telecommunications organizations.

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    Robert Dewhirst
    Information Security and Infrastructure Manager, Educational Testing Service

    Mr. Dewhirst is a senior information security professional with 24 years of experience in software development and IT systems management. He currently manages information security, infrastructure and system administration for the K-12 testing systems of the world's largest private nonprofit educational testing and assessment organization.

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Randy Raw
    VP of Information Security, Veterans United Home Loans

    Randy Raw is VP of Information Security, serving as the Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Caleb Christopher
    Director of Technical Operations - Cino Ltd | Director of IT, Challenger Sports

    Caleb Christopher is the Director of Technical Operations at Cino Ltd - a national cybersecurity and risk
    management firm; and the Director of IT at Challenger Sports - a global soccer camp organization. He has 9+ years experience in security.

  • speaker photo
    Ben Smith
    Field CTO (US) & Principal Sales Engineer, RSA

    Ben Smith is Field CTO (US East) with RSA, and a technically-focused risk management executive with over 25 years’ experience. He holds the CISSP and CRISC certifications and has presented on RSA's behalf at cybersecurity events sponsored by Gartner, FS-ISAC, ISSA, BSides, ICI, (ISC)2, ISACA, InfraGard, HTCIA and other organizations.

  • speaker photo
    Rob Arnold
    Director of Information Security, Polsinelli PC
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store