Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 18, 2017
    9:00 am
    SecureWorld PLUS Course – Big Data and IoT: Wonderful, Terrible, Inevitable
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Parlor C

    Join us the day before the conference for 6 additional CPE credits (12 total when attending the PLUS course and the conference).

    Big Data and the Internet of Things are revolutionizing virtually every industry. We’re told of pinpoint accurate medical records and diagnostics, all-encompassing analytics, mastery of industrial processes, effortless control of our static and moving environments and complete connectivity and communication with anything and everything we might ever imagine being useful. Wonderful!

    But SecureWorld attendees and others who’ve been in IT Security for any appreciable time have an internal red flag that goes up upon hearing “It’s gonna be great!” Then those euphoria-deflating security questions start multiplying and running through our somewhat addled brains. Where is all this Big Data coming from? Where will it reside? Who controls it? Who grants access? On what basis? How do we know it’s accurate, relevant? Is it complete enough for life and death medical decisions? What about analytics system administration; data monitoring and correction procedures; incompatible security architectures? Oh yeah, and privacy?

    What kind of security is built into all these Internet-connected devices? How easy is it to control access? Is the data they trade and store encrypted? Who’s liable if they fail or give erroneous signals?

    Big Data and IoT are neither fads nor merely trends, they constitute a revolution. There’s no going back. Join us as we look from a security perspective at both the bright and dark sides.

  • Wednesday, April 19, 2017
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:30 am
    Surviving the Siege: Medieval Lessons in Modern Security
    • session level icon
    Discover the 2017 SecureWorld Theme
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Galleria 3

    Warfare and the arts of intrusion have advanced considerably since the Middle Ages, but in many ways the principles of fortification we use today remain the same. The great castles of antiquity were ingeniously designed with multiple layers of physical security to protect their inhabitants from persistent, even advanced enemy threats. Their carefully planned and creative defensive measures provide rich metaphors, both positive and negative, for today’s cyber guardians. On the other hand, clever, daring, sometimes brilliant offensive strategies and tactics have historically breached battlements thought to be unassailable. Come join us as we examine lessons that can be applied to securing our own sophisticated digital fortresses.

    8:30 am
    RESILIENCE: Not Just for Computers, for YOU
    • session level icon
    Resilience is a critical skill of a successful pro and you can build it for yourself.
    speaker photo
    Founder, Managing Principal , W Risk Group LLC
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Galleria 1

    For many, if not most of us, we either fear failure, or we are figuring out how to recover from it. Karen’s own personal crisis as the CISO of Microsoft is what drives her to share radical resilience strategies for pros so you can roll with the punches and find the best path for you health, wealth and relationships.

    8:30 am
    SentinelOne: Next Generation Endpoint Protection
    • session level icon
    speaker photo
    Regional Director, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Galleria 2

    In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    9:30 am
    OPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private Partnership
    • session level icon
    speaker photo
    CNN Military Analyst; USAF (Ret.), CEO, Cedric Leighton Associates
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    Col. Cedric Leighton’s keynote presentation will cover the following:

    – Overview of the Cyber Threat based on publicly available intelligence
    – Why current Intelligence Community structure needs to be re-vamped for the Cyber Age
    – How intelligence agencies should be working with private companies
    – It’s about new legislation AND changing mindsets and cultures
    – The new relationship between the US Intelligence Community and US companies in the Cyber Age – a vision for the future

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable: The Cost and Consequence of Insider Threats (VIP Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Parlor B
    11:15 am
    Motivating Internal Teams for Security
    • session level icon
    speaker photo
    Sr Security Strategist II, Uber Technologies Inc.
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Galleria 1

    Pursuit of security compliance certifications can be challenging. Actively engaging engineering teams
    and enthusiastic participation by all stakeholders is crucial for the success. This talk will focus on
    actionable ideas to convince all stakeholders about the importance of efforts for security & compliance.

    11:15 am
    What’s in Your Enterprise Risk Program – Are Your Assets and Information Safe?
    • session level icon
    Must Have Programs for Your Organization
    speaker photo
    Director Community Institutions & Associations, Financial Services - Information Sharing & Analysis Center
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Galleria 3

    Cyber-threats such as DDoS, destructive malware, and ransomware are only a few of the tactics malicious actors use to attack US organizations. Learn how part of your enterprise risk management program should include plans that can limit the damage to your information assets and systems.

    11:15 am
    Cylance: Hitchhiker’s Guide to Ransomware – From Genesis to Current Menace
    • session level icon
    speaker photo
    Principal Consultant - Incident Response, Cylance
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Galleria 2

    This presentation will cover: ransomware, ransomware infection vectors, the history & evolution of ransomware, business model for ransomware and what the best ways to detect and prevent ransomware.

    11:15 am
    Atmosera: Can You Trust the Public Cloud and is it Ready for Secure Workloads?
    • session level icon
    speaker photo
    Vice President of Information Security, Atmosera
    speaker photo
    Senior Vice President of Client Operations, Atmosera
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Parlor C

    There is a lot of hype and concerns about using a public cloud to power mission critical applications and especially those with higher security or compliance requirements. Successfully using a public cloud such as Azure requires careful consideration and expertise to ensure it is properly setup with InfoSec in mind.

    12:00 pm
    Advisory Council LUNCH Roundtable: Social Engineering – Phish On! (VIP Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Parlor B
    12:15 pm
    LUNCH KEYNOTE: Cybersecurity Lessons Learned from Medieval Times
    • session level icon
    Balancing protection, exposure, and business objectives in an effort to protect the assets.
    speaker photo
    Deputy Cyber Security Director, Portland General Electric
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    How do today’s companies protect assets, people, and customer information from infiltration? Finding the cracks in the armor, identifying business critical assets, and evaluating risk.

    1:15 pm
    Panel: Hazards on the Horizon - Emerging Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    Cyber threats are changing and evolving at a rapid pace because this is a lucrative business model for organized crime. Malware, botnets, ransomware, and more can be purchased via the dark net. Is awareness training the answer? Better network controls? Cyber Police? Bring your questions to this interactive panel of security professionals and learn what threats to look out for today and the in the near future.

    Panelists:
    Tom Pace, Principal Consultant, Incident Response & Forensics, Cylance
    Craig Schippers, Sr. Sales Engineer, CISSP, Trend Micro
    Bryan Burns, VP Threat Research, Proofpoint
    Hariom Singh, Director, Policy Compliance & SAQ, Qualys
    Bill Lapp, Sr, Director, Sales Engineering, Zscaler
    Paul Anderson, Sr. Systems Engineer, ExtraHop Networks
    Moderator: Mike Metzler, Sr., Compliance Officer, CenturyLink

    1:15 pm
    Panel: Manage the Damage - The Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Galleria 1

    Every week we learn about some business, government entity, bank, or healthcare establishment in the news that has been hacked. Often times, the intruders had been sitting collecting information for months before being discovered. Now more than ever it is crucial for organizations to develop, practice and fine tune their incident response plans. When do you get law enforcement involved? What about the legal team or PR? Will your business recover? This panel discussion will tackle these issues as well as your questions on what you need to know to manage the damage.
    Panelists:
    Matt Sherman, Incident Response Specialist, Symantec
    Peter Oelschlaeger, Director of Technical Account Management, Tanium
    Jared Cheney, SVP of Client Operations, Atmosera
    Chris Bates, Principal Architect, SentinelOne
    Kellen Christensen, Solutions Architect, Dasher Technologies
    Moderator: Dennis Tomlin, ISO, State of Oregon Employment

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    Location / Room: Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    Social Engineering Automation
    • session level icon
    speaker photo
    Security Engineer, Amazon
    speaker photo
    Teleion Consulting
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Galleria 1

    The exponential security and privacy risks when social engineering is scaled via widely available APIs and automation frameworks.

    3:00 pm
    Effective Cybersecurity Staffing – How to “Fill the Gap” Quickly and Efficiently
    • session level icon
    speaker photo
    Doctor & Professor, Information Systems and Technology Management, Mt. Hood Community College
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Galleria 2

    With some 400k open CS positions nationwide, BLS projects that by the 2020’s 46% of all Cybersecurity jobs will be unfilled. The resulting supply-and-demand environment makes the cyber professional a very expensive commodity. We discuss a solution which can provide trained cyber technicians that will not break the budget.

    3:00 pm
    Zscaler: Transforming IT for a Cloud-Enabled World
    • session level icon
    speaker photo
    Sr. Director, Sales Engineering, Zscaler
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Galleria 3

    With an explosion of vendors providing cloud-based services are we ready to move security functions out of our premises as well? We will be exploring the market readiness to (re)move the security perimeter, the extent to which this can be accomplished, while discussing the challenges associated with this transformation.

    Audience Takeaway: Key considerations for both security and network transformation as IT teams undertake cloud initiatives (moving infrastructure to AWS/Google, building apps in Azure, deploying Office 365)

    Presentation topics: IT transformation, Cloud first, secure direct to internet access, security platform

Exhibitors
  • Archer Security Group
    Booth: 204

    Archer is a premier cyber security consulting firm with decades of professional experience delivering exceptional internal security audits, vulnerability assessments, pen testing and security compliance support (HIPPA, Sarbanes-Oxly, NERC CIP, PCI Security, etc.). We also provide system integration for several key security and compliance solutions such as Tripwire, Qualtrax, ProtectWise and many others. Our consultants and service providers are highly skilled security practitioners with hands-on experience in banking, auto manufacturing, electric utilities (we specialize in NERC CIP), gas & oil, food automation and other mission critical environments that rely on information and operation technology.

  • Aruba
    Booth: 109

    Aruba, a Hewlett Packard Enterprise company (NYSE:HPE), introduces Aruba 360 Secure Fabric, an enterprise security framework that gives security and networking teams an integrated, more comprehensive way to gain visibility and control of their networks. It provides a quick way to respond to cyberattacks across multivendor infrastructures, with support for hundreds to thousands of users and devices. It’s the only solution that combines a complete campus, branch, and cloud-connected network infrastructure with built-in security, along with secure network access control and advanced threat detection and response – for any network.

    To learn more, visit Aruba 360 Secure Fabric at http://www.arubanetworks.com/solutions/security/ . For real-time news updates follow Aruba on Twitter and Facebook, and for the latest technical discussions on mobility and Aruba products visit Airheads Social at http://community.arubanetworks.com.

  • Atmosera
    Booth: 105

    Atmosera is a leading Microsoft Azure solutions provider leveraging both the Microsoft Cloud Platform System and Azure. We engineer and operate highly scalable Azure cloud environments that support business critical (they can never go down) applications. With over 20 years of industry experience and real-world best practices, Atmosera is a trusted and secure (HIPAA/HITECH, HITRUST, PCI DSS V.3, IRS 1075, and SSAE 16) global cloud partner to SaaS providers, financial institutions, healthcare providers, retailers, government agencies, manufacturers, and other industries of commerce. Interested? Visit www.atmosera.com.

  • Blue Coat
    Booth: 217

    Blue Coat is a leader in advanced enterprise security, protecting 15,000 organizations every day. Through the Blue Coat Security Platform, Blue Coat unites network, security and cloud, providing customers with maximum protection against advanced threats, while minimizing impact on network performance and enabling cloud applications and services.

  • Crossmatch/DigitalPersona
    Booth: 212

    Crossmatch is a world leader in biometric identity management solutions. Our technologies and expertise are helping organizations of all sizes achieve new levels of efficiency, expand in new markets and find powerful new ways to protect people, property and profits. Heavy reliance on digital transactions, growing mobile workforces, global demand for e-gov services and the need for enhanced security at borders, in law enforcement and on battlefields all point to a clear need for the confidence and certainty of biometrics. Security-minded organizations in both the public and private realms understand the power and necessity of biometrics — and they are increasingly looking for an established partner to help solve this identity management challenge.

  • Cylance
    Booth: 108

    Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.

  • Cyphort
    Booth: 209

    Cyphort is the next generation APT defense solution for the enterprise. Cyphort provides a single pane of glass across perimeter and laterally moving threats, correlates threat signals before and after an incident while eliminating noise from false alerts and red herrings.

  • Darktrace
    Booth: 216

    Darktrace is the world’s leading AI company for cyber defense. With over 7,000 deployments worldwide, the Enterprise Immune System is relied on to detect and fight back against cyber-attacks in real time. The self-learning AI takes one hour to install, works across the cloud, SaaS, corporate networks, IoT and industrial systems, and protects against the full range of cyber-threats and vulnerabilities, from insider threats and ransomware, to stealthy and silent attackers. Darktrace has 800 employees and 40 offices worldwide, with headquarters in San Francisco, and Cambridge, UK.

  • Dasher Technologies
    Booth: 104

    Dasher Technologies, Inc. ® is a premier IT solution provider that delivers expert technical resources along with trusted account executives to architect and deliver complete IT solutions and services to help our clients execute their goals, plans and objectives.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Electronic Crimes Task Force
    Booth: TBD

    The role of the U.S. Secret Service has gradually evolved since the agency’s 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation’s financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service’s mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals – all of whom recognize new opportunities to expand and diversify their criminal portfolio.

  • ExtraHop
    Booth: 109

    ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com

  • Gigamon
    Booth: 208

    Gigamon is leading the convergence of network and security operations to reduce complexity and increase efficiency of security stacks. Our GigaSECURE® Security Delivery Platform is a next generation network packet broker that makes threats more visible – across cloud, hybrid and on-premises environments, deploy resources faster and maximize the performance of security tools.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • Intsights
    Booth: 213

    We are an intelligence driven security provider offering a subscription-based service which delivers rapid, accurate cyberthreat intelligence and incident mitigation in real time.

  • (ISC)2
    Booth: TBD

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

  • ISACA Willamette Valley
    Booth: TBD

    The Willamette Valley Chapter of ISACA represents IT Security, Audit and Compliance Professionals in the Oregon/SW Washington region. This chapter is one of more than 180 international chapters. The chapter is represented by a member-elected board of directors as well as volunteer committees formed for special purposes. Members benefit from discounted materials developed by ISACA International, regular continuing professional education, and excellent opportunities to network with professionals in the field. The chapter hosts luncheon programs and coordinates technical seminars designed to provide networking and professional education opportunities, and serves as a conduit for information from the International ISACA organization.

  • ISSA Portland
    Booth: TBD

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. The primary goal of the ISSA is to promote management practices that will ensure the confidentiality, integrity, and availability of information resources. The ISSA facilitates interaction and education to create a more successful environment for global information systems security and for the professionals involved. Members include practitioners at all levels of the security field in a broad range of industries such as communications, education, healthcare, manufacturing, financial, and government.

  • Ivoxy
    Booth: 100

    At IVOXY Consulting, getting a piece of our minds gives you peace of mind. Our mission is to accelerate the understanding and adoption of innovative data center technologies. Our experienced and friendly engineers will provide the knowledge needed to get the most out of your data center environment and personnel.

  • Optiv
    Booth: 213

    Optiv is the largest holistic pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational institutions plan, build and run successful security programs through the right combination of products, services and solutions related to security program strategy, enterprise risk and consulting, threat and vulnerability management, enterprise incident management, security architecture and implementation, training, identity and access management, and managed security.

    Created in 2015 as a result of the Accuvant and FishNet Security merger, Optiv has served more than 12,000 clients of various sizes across multiple industries, offers an extensive geographic footprint, and has premium partnerships with more than 300 of the leading security product manufacturers.

  • Proofpoint
    Booth: 120

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Qualys, Inc.
    Booth: 205

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.

  • SentinelOne
    Booth: 116

    SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.

  • Shield4uc
    Booth: 221

    For a quarter of a century the veteran industry leaders at Shield have been at the forefront of secure messaging solutions.
    Partnering with a select group of elite companies to offer leading-edge tools and solutions, that address the growing cyber-security threats on the world today.
    Whether it is compliant industries such as health, insurance, finance, legal, or any company where sensitive data is kept or used.
    Shield is there to help companies to communicate and secure data, faster, smarter and easier .

  • Structured
    Booth: 109

    Structured is a leading information technology consultancy and systems integrator that has partnered with hundreds of clients throughout the U.S. to maximize the value of IT.

    For two decades, Structured consultants have collaborated with CIOs and IT departments to develop and implement technology strategies that drive measurable improvements throughout the organization.

  • Symantec
    Booth: 217

    Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter and LinkedIn.

  • Synopsys
    Booth: 125

    Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.

  • Tanium
    Booth: 201

    Tanium was founded to deliver a new and innovative approach to endpoint management and security that delivers instant visibility and responsiveness that does not slow down as the enterprise environment scales. Tanium is empowering the largest enterprises in the world to gather critical information globally from every endpoint and drive remediating action in seconds, including the distribution of patches, applications, and tools – all from a single server.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales e-Security
    Booth: 122

    Thales e-Security is the leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. We ensure that the data belonging to companies and government entities is both secure and trusted in any environment – on-premise, in the cloud, in data centers or big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged user control and high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales e-Security is part of Thales Group.

  • Trend Micro
    Booth: 100

    As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we’re recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

  • Zscaler
    Booth: 117

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Karen Freeman Worstell
    Founder, Managing Principal , W Risk Group LLC

    Karen Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.
    She provided cyber security support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, developed the first computer security manual for the Boeing Company, and led research in secure distributed computing for Boeing’s Research and Technology Division in the 1980s and 90s. From there she had senior and C-level roles in security and IT Risk Management for companies like Union Carbide, SRI Consulting, Bank of America, AT&T Wireless, Microsoft and Russell Investments. She was the CEO for AtomicTangerine, the SRI International spinoff focused on security that served international Fortune 100 companies in security strategy and major technology implementations. She co-chaired major security events for SRI International, Forbes.com, and Georgetown University Law Center.
    She held positions at NIST for OSI security architecture, the security subcommittee of the Aerospace Industries Association, US Department of Commerce Security and Privacy Advisory Board, and the security subcommittee of NSTAC and has been a featured speaker at events for SecureWorld, IIA, ISSA, ISACA, AusCERT, Security Conference Israel, and RSA.

    She is the author of “Governance and Internal Controls for Cutting Edge IT” published by ITG, the chapter "The Role of the CISO" in the Computer Security Handbook 5th and 6th editions (Wiley) and co-author of "Evaluating the E-Discovery Capabilities of Outside Law Firms” by Pike & Fisher.
    Her technical expertise spans Identity and Access Management, Intrusion Detection and Response, and integration of security into IT and business processes for “seamless security.” She is a huge fan of "not putting steel doors on grass shacks.” Today she focuses on changing perceptions about security to reduce the growing gap between emerging technology and security and pursues her passion for matching cyber talent in leadership roles for enterprises who are serious about cyber security.

    Karen tweets at https://twitter.com/karenworstell and blogs at karenworstell.com.

  • speaker photo
    Preston Perich
    Regional Director, SentinelOne
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; USAF (Ret.), CEO, Cedric Leighton Associates

    Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.

    Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

  • speaker photo
    Shreyas Kumar
    Sr Security Strategist II, Uber Technologies Inc.

    Shreyas Kumar is a Senior Security Strategist II at Uber. He leads Uber's payments security and Vendor security globally. He is a member of Cloud Technical SIG of PCI. He is also a visiting Professor of Computer Science at San Jose State University. Previously he has worked at Adobe and Oracle. He holds multiple security certifications. He has spoken in multiple international conferences and has been a invited speaker at Universities. Shreyas holds a MS degree in Computer Science from Texas A&M University and a Bachelors degree from IIT Roorkee.

  • speaker photo
    Jeff Korte
    Director Community Institutions & Associations, Financial Services - Information Sharing & Analysis Center

    Jeffrey is a former banking security practitioner possessing over 24-years’ experience in the financial services sector and ten security domains. As a BSO and ISO, he specialized in developing cybersecurity and fraud programs. He currently manages a council with FS-ISAC assisting over 3,800 members achieve cyber-security maturity.

  • speaker photo
    Thomas Pace
    Principal Consultant - Incident Response, Cylance

    Thomas Pace has an extensive background in building incident response programs, policies, procedures and playbooks at multiple top-tier organizations. Thomas has 11 years of security experience in various fields including physical security, intelligence gathering and analysis, sensitive site exploitation, incident response, intrusion analysis, and endpoint and network forensics. Thomas also has extensive experience in conducting assessments against various NIST special publications such as 800-53 and 800-171.

    At Cylance, Thomas serves as a Principal Consultant where he acts as a technical lead on various projects sold and delivered, and also creates processes and methodologies to better assist Cylance’s client base. Thomas conducts incident readiness assessments, security tool assessments, and responds to incidents as needed. Thomas is also currently an Adjunct Professor at Tulane University where he has developed a portion of the Homeland Security Studies program curriculum centered on cybersecurity. Thomas also currently provides guidance and expertise to the New Orleans cloud security community as the Louisiana Cloud Security Alliance Co-Chair.

    Prior to Cylance, Thomas served as a Senior Cybersecurity Engineer at Fluor Federal Petroleum Operations, a Department of Energy contractor supporting the Strategic Petroleum Reserve worth billions of dollars. In this role, Thomas was the lead incident response official and was responsible for ensuring all incidents were appropriately identified, contained and remediated in a timely manner and reported to proper authorities if necessary. Additionally, Thomas was responsible for conducting intrusion analysis and threat hunting on a daily basis to ensure the organization was not breached. While conducting a multitude of analyses based on intrusions and incidents, Thomas built a multitude of playbooks and processes so junior technical personnel could also conduct analyses in an efficient manner.

    Thomas served in the United States Marine Corps as an infantryman and intelligence specialist. During this time, Thomas deployed to both Iraq and Afghanistan as part of the Marine Corps.

    Thomas holds an M.S. in Information Science with a concentration in Information Assurance. Thomas also possesses multiple certifications such as GIAC GCIH, GCFA, GCIA, GICSP and GCWN. Thomas also is a Sourcefire certified professional, CISSP, and possesses CNSS 4011, 4012, 4013, 4014 and 4015.

  • speaker photo
    Ray Espinoza
    Vice President of Information Security, Atmosera

    Ray Espinoza is an expert delivering complex InfoSec capabilities and strategies. He is responsible for all security and compliance initiatives and customer solutions.

  • speaker photo
    Jared Cheney
    Senior Vice President of Client Operations, Atmosera

    Jared Cheney excels at delivering a consistent and outstanding customer experience. He oversees networking, computing, storage, application services, monitoring, and a 24x7x365 Technical Assistance Command Center (TACC).

  • speaker photo
    Lance Howard
    Deputy Cyber Security Director, Portland General Electric

    Lance Howard has been in the Utility industry for 15 years, beginning in a security operation center and most recently the Manager of Security Assurance of a local Utility company. He has also held positions that have included risk assessments, security architecture and design.

  • speaker photo
    Alejandro Villegas
    Security Engineer, Amazon

    Seasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001

  • speaker photo
    Julie Villegas
    Teleion Consulting
  • speaker photo
    Wayne Machuca
    Doctor & Professor, Information Systems and Technology Management, Mt. Hood Community College

    Dr. Machuca is the PI and lead instructor for the AAS / CyberSecurity & Networking degree at Mt. Hood Community College in Gresham, OR. MHCC has the only cyber security Associates degree in Oregon. It was awarded CAE-2Y by DHS and NSA. MHCC will award Cyber 40 graduates in 2017.

  • speaker photo
    Bill Lapp
    Sr. Director, Sales Engineering, Zscaler

    As the Leader for Solution Engineering and Architecture at Zscaler Bill Lapp is responsible for all pre-sales engineering efforts in North and South America. His primary focus is assisting large enterprises to rethink how they approach network and business transformation through the use of security and policy.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store