googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, June 8, 2016
    9:00 am
    SecureWorld Plus - June 8th - Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    President, CISSP, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    9:00 am
    SecureWorld Plus - June 8th - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program (SecureWorld Plus Registrants ONLY)
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
  • Thursday, June 9, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    8:30 am
    Data Breaches, Data Dams and Extortion: Navigating the Digital Landscape
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    ISSA Meeting - Open to All Attendees - Ransomware: The Real and Present Danger
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    8:30 am
    Join ISSA for their monthly meeting (ISSA members AND nonmembers invited) and guest speaker. For this presentation we will be discussing Ransomware. We will present a brief history of encryption malware and a very brief overview of what it does, some of the more well-known variants, and discuss real life case studies. Finally, we will have an overview of some of the measures that can be put in place to recover from an event. Guest Speakers: Christopher Paidhrin, Information Security Manager, City of Portland, OR Josh Scott, Information Security Architect, City of Portland,OR Mark Farley, CIO of FEI Company Light refreshments will be served.
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    8:30 am
    RSA: Left of Owned - Becoming the Hunter Instead of the Hunted
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    9:00 am
    Exhibit Floor Open
    Registration Level:
    9:00 am - 3:00 pm
    9:15 am
    OPENING KEYNOTE: Cybersecurity 2.0 - Thought Leadership for Changing Times
    • session level icon
    speaker photo
    Founder & CEO, BlackCloak
    Registration Level:
    • session level iconOpen Sessions
    9:15 am - 10:15 am
    10:15 am
    Conference Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    11:00 am
    Executive Roundtable --Your Security Organization Structure -- VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    11:15 am
    Time to Get a Data Security Insurance Update
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    Trend Micro: How to Defend Your Network Before You Invest in Breach Detection Technology
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    11:15 am
    US CyberPatriot - Fostering an Attitude of Security Learning
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    12:00 pm
    Executive Roundtable -- Manage the Damage --VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Radware - The Current Economics of Cyber Attacks
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:15 pm
    Panel: After the Hack
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    1:15 pm
    Security Innovation: Connected Cars — What Could Possibly Go Wrong?
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    1:15 pm
    Security Innovation: Connected Cars — What Could Possibly Go Wrong?
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:30 pm
    Dash For Prizes / CyberHunt / Passport
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:00 pm
    2:15 pm
    Critical Infrastructure Partnerships and Cyber Risk Management
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:15 pm - 3:00 pm
    3:00 pm
    Panel: Locking Down the Endpoints
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    3:00 pm
    Venafi: You Have a Blind Spot – Exposing The Misuse of The Foundation of Online Security
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
Exhibitors
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.

  • speaker photo
    Dr. Christopher Pierson
    Founder & CEO, BlackCloak

    Dr. Chris Pierson is the Founder & CEO of BlackCloak, a pioneer of personal digital protection for corporate executives, high-profile and high-net-worth individuals and their families. Chris has been on the front lines of cybersecurity, privacy protection, and fighting cybercrime in both the public and private sectors over 20 years. At the Department of Homeland Security, Chris served as a special government employee on their Cybersecurity and Privacy Committees. He’s also spent time as the Chief Privacy Officer for Royal Bank of Scotland, the world’s 3rd largest bank, as the Chief Information Security Officer for two prominent FinTechs, and as President of the Federal Bureau of Investigation’s Arizona InfraGard. Chris is also a Distinguished Fellow of the Ponemon Institute, a globally recognized keynote speaker & cybersecurity thought leader, and is frequently quoted by the media on cybersecurity & privacy topics.

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

secure world app
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes