Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, April 20, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Executive Advisory Council Breakfast - Cybersecurity in an Interconnected World - VIP / Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    Location / Room: Strafford
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Berwin
    8:00 am
    SecureWorld Plus: DevOps and APPSec: Building an AppSec Pipeline
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: Devin
    8:30 am
    SecureWorld Plus: Handling & Managing Security Incidents
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    8:30 am - 9:30 am
    8:30 am
    Computer Security For ML Business & Government
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Data Breach Digest- Scenarios from the Field
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Narco Terror and Security Issues We Face
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 pm
    8:30 am
    SecureAuth: Identity in Security - Know Who's in Your Network
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Wayne
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Digital Doomsday- a Message from the U.S. Cyber Defense Advisor to NATO
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    11:00 am
    Executive Advisory Council Roundtable - BYOD Trends - VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Strafford
    11:15 am
    A 2016 Perspective on Bring Your Own Device (BYOD)
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Villanova
    11:15 am
    Garbo, D-Day and Ultimate Social Engineering
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    11:15 am
    Wombat: The State of Phishing Attacks and How to Reduce Their Impact
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    12:00 pm
    Executive Roundtable - Big Data Security- VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Strafford
    12:15 pm
    LUNCH KEYNOTE: Radware - Safety, Sanctuary and Security: The Societal Impact of Ever-Permeating Connectivity
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 am
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Locking Down the Endpoints
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Villanova
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    Frugal Girl's Guide to Threat Management
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Wayne
    3:00 pm
    HIPAA-HITECH Enforcement Update: Preparing Your Organization for the Phase II Audits and Possible Enforcement
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    3:00 pm
    New Twists on Moving Target Defense
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Haverford
    3:00 pm
    SecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    SecureWorld Plus: DevOps and APPSec: Building an AppSec Pipeline - (SecureWorld Plus Registrants ONLY)
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    SecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants Only)
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    Service Provider Management and Oversight
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Villanova
  • Thursday, April 21, 2016
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus: DevOps and APPSec: Building a AppSec Pipeline- (SecureWorld Plus Registrants ONLY)
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    20 Years of Auditing - Lessons Learned
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Cloud Services Best Practices
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Security Enhanced Composer
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Welcome to the Desert of the New Cybersecurity World
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Hacked Again- It Can Happen to Anyone, Even a CyberSecurity Expert
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    11:00 am
    Executive Advisory Council Roundtable - Your Security Org's Structure - VIP / Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Check Point Software: The Critical Need for Incident Response
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    11:15 am
    Information Overload
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    LogicNow: Data Breach Risk Intelligence That Matters
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    12:00 pm
    Advisory Council Roundtable Lunch: Let's Talk About Risk- Lunch Served VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: The Confluence of Data Security Challenges
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 am
    1:15 pm
    Panel: After The Hack
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    1:15 pm
    Panel: You've Got Humans on Your Network
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    3:00 pm
    From Security Director to Risk Leader: Continuous Monitoring, Transparency and Accountability in the New Era of Security Risk Management
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    HIPAA-HITECH Enforcement Update: Preparing Your Organization for the Phase II Audits and Possible Enforcement
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    3:00 pm
    Secure Digital Password Storage- Are you Doing it Right?
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    3:00 pm
    Security Architecture Tools
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
Exhibitors
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dan Lohrmann
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform

    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.

    Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.

    Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.

    He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    Dan Lohrmann
    Chief Strategist and CSO, Security Mentor, Named One of the World's Top 100 IT Security Influencers for 2019 by CISO Platform

    Dan Lohrmann is Chief Strategist and Chief Security Officer (CSO) at Security Mentor. In this role, Lohrmann leads efforts to define and develop key strategic initiatives for the company’s security awareness training offerings, including new programs that can improve security and compliance by elevating an organization’s workforce into security savvy employees. Representing Security Mentor, Lohrmann serves as thought leader serving as a keynote speaker on security and security awareness training, and giving government and industry presentations.

    Over the past decade, Lohrmann has advised the U.S. Department of Homeland Security, the White House, FBI, numerous federal agencies, law enforcement, state and local governments, non-profits, foreign governments, local businesses, universities, churches, and home users on issues ranging from personal Internet safety to defending government and business-owned technology and critical infrastructures from online attacks. Prior to joining Security Mentor, Lohrmann was Michigan's first CSO and Deputy Director for Cybersecurity and Infrastructure Protection and has been recognized as a global leader in cyber defense for government.

    Previously, Lohrmann represented the National Association of State Chief Information Officers on the U.S. Department of Homeland Security’s IT Government Coordinating Council where he assisted in the writing and editing of the National Infrastructure Protection Plans, sector specific plans, Cybersecurity Framework, and other federal cyber documents. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web, published in November 2008 by Brazos Press and BYOD for You: The Guide to Bring Your Own Device to Work, published in Kindle format in April 2013.

    He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine, “Public Official of the Year” by Governing magazine and “Premier 100 IT Leader” by Computerworld Magazine. Lohrmann received his bachelor’s degree in computer science from Valparaiso University in Indiana and his M.S. in Computer Science from Johns Hopkins University in Baltimore.

secure world app
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store