googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, November 9, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Executive Advisory Board Breakfast
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    8:00 am
    Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    Handling & Managing Security Incidents
    • session level icon
    speaker photo
    President, CISSP, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    Using Statistical Process Control (SPC) to Measure Network Traffic and Identify Threats
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief Engineer of Information Security, Mitre Corp
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    Cybersecurity Assessments and Planning: The Attorney's Role
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 pm
    8:30 am
    Protecting Payments with PCI
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief Technology Officer, PCI Security Standards Council
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 202
    8:30 am
    Realistic Risk Management Using CIS 20 Critical Security Controls
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Microsoft, Director of Security Program Management
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: The Cost and Consequences of the Insider Threat: What the Latest Ponemon Institute Research Reveals
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Executive Advisory Council Roundtable: Identity is the New Firewall - VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Edgar Allan Poe: Paradox, Enigma, Genius
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    President, CISSP, O'Leary Management Education
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    HiTrust as a Compliance Framework
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Information Security, Landmark Health
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    Trend Micro: The Endpoint is not the Battle Ground
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Principal Engineer, Trend Micro, Inc.
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    Juniper / Virtual Armor: Detect. Enforce. Adapt.
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Network Consulting Engineer, Juniper Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    12:00 pm
    Advisory Council Roundtable: Find the Talent, Keep the Talent - VIP / INVITE ONLY
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Radware The Current Economics of Cyber Attacks
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: After the Hack
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 am
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    1:15 pm
    Arbor Networks: Is Your Organization Prepared to Stop The Modern Day DDoS Attack?
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Product Marketing, Arbor Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    3:00 pm
    Venafi: Securing Trust – Defending Against Next-generation Attacks
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director Customer Support, Venafi
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 am
    3:00 pm
    Cybersecurity Defense Update
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Business Information Security Officer (BISO), T-Mobile USA
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    Improving Your Incident Response Process Through Lessons Learned From Treating Trauma in Individuals
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Board Member, Cybersecurity Leader, Angel Investor
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    Panel: Locking Down the Endpoints
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 4:00 pm
    3:00 pm
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    SecureWorld Plus: Handling & Managing Security Incidents
    • session level icon
    speaker photo
    President, CISSP, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    Slack Space: Human Behavior in Healthcare Settings and Cybercrimes as a Service
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Risk & Threat Analyst, UW Medicine IT Services & Security
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    5:00 pm
    Optiv Happy Hour
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    5:00 pm - 8:00 pm
  • Thursday, November 10, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    8:00 am
    InfraGard Chapter Meeting - Chapter Business and 2017 Strategic Goals (Open to All Attendees)
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    PCI Environments, AWS
    speaker photo
    Chapter President, Evergreen InfraGard
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:00 am - 9:00 am
    8:00 am
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus: Handling & Managing Security Incidents
    • session level icon
    speaker photo
    President, CISSP, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    End to End Cybersecurity Due Diligence
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Engineer, Amazon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    Data Breach Digest - Scenarios from the Field
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Cybersecurity Technologist, CISO, and Threat Intelligence Professional
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    Gaining Better Visibility into Risk- The Future of GRC
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Managing Director, Grant Thornton
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    Making the Case to Executives and Boards
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    The Fine Line Between Security and Surveillance
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    VP & CISO, F5 Networks
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private Partnership
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable: Security Awareness - VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    11:15 am
    Producing Cybersecurity and Information Assurance Professionals
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Executive Director, Center for Information Assurance and Cybersecurity, University of Washington
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    IoT - A Vision for the Future
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Founder & President, AgeLight Advisory & Research Group
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    Palo Alto Networks: Change the Game: Leverage Multi-Method Prevention at Your Endpoints
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Global Director, Systems Engineering, CSS, Palo Alto Networks
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    Wombat Security: The Top 8 Security Risks Beyond the Phish
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Product Manager, Wombat Security
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    11:15 am
    ForcePoint: Ransomware - The Theory and Practice of Exploiting the Kill Chain
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CISO, Forcepoint
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    12:00 pm
    Advisory Council Roundtable Lunch: Ransomware-Crime is a Service - VIP / INVITE ONLY
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    12:15 pm
    LUNCH KEYNOTE: Optiv - Cloud Ready? 7 Tips to Weather the Storm
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief Strategy Officer, Remediant
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    1:15 pm
    Panel: Emerging Threats
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: You've Got Humans on Your Network
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    1:15 pm
    Tavve: The Red Headed Step Children- ICMP, SNMP and Other Network Management Protocols
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Senior Sales Engineer, Tavve
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    1:15 pm
    Cylance: The Merits of Applying Machine Learning to Complex Cybersecurity Problems
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Enterprise Sales Manager, Cylance
    speaker photo
    Senior Sales Engineer, Cylance
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    2:15 pm
    Conference Dessert & Coffee Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    2:30 pm
    Dash for Prizes & CyberHunt Winners
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    Behavioral Analytics in Security: What Your Vendor Says vs Reality
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Security Monitoring & Analytics, Microsoft
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    Cyber Incident Response at the Executive Level
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    3:00 pm
    Validation of Asymmetric Cyber Resiliency
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Program Manager, Pacific Northwest National Lab
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
Exhibitors
  • NETSCOUT Arbor
    Booth: 224

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • Centrify
    Booth: TBD

    Centrify provides unified identity management across data center, cloud and mobile environments. Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
    Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent.

  • Checkmarx Inc.
    Booth: 304

    Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.

  • Cisco
    Booth: TBD

    Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

  • Cloud Security Alliance (CSA)
    Booth: TBD

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • CloudTalk Meetup
    Booth: TBD

    CloudTalk Meetup’s is a community oriented group aimed at furthering the education in cloud computing. Our mission is to educate technology professionals in this fast paced technology as well as to promote cloud computing vendors and product developers in the local development community. Our meetup has over 700 registered cloudies with disciplined in dev/ops, IT Operations, Product Development and Business/Marketing. The forum provides a great place for professionals to collaborate, share ideas, foster creative brainstorming.

    We hold monthly local events and webinars with presentations delivered by a cloud computing vendor and industry experts that gives detailed technical overview of platforms, tools and industry best practices covering cloud, big data, IT, DR, telecom, security, mobile, social web…. The presentation can be followed with hands-on labs where attendees can experience the technology on their own. Some of the big cloud computing vendors who presented at our meetups are Microsoft Azure, Amazon AWS, VMWare’s CloudFoundry, Citrix’ CloudStack, RedHat’s OpenShift, CenturyLink CLC , IBM Cloud. We have big data companies such as Elasticsearch and DataMeer; DR and Data virtualization companies like DataGardens and Actifio.

  • Column Information Security
    Booth: TBD

    Column Information Security is an information security consultancy and solutions provider for enterprise, public sector and government organizations. We ensure mitigation of risk through strategic planning, building and operating security systems and programs, and implementation of industry leading technologies including SailPoint, CyberArk and Veracode. For more information, visit www.columninfosec.com

  • CTIN
    Booth: TBD

    CTIN has been providing high tech crime fighting training since 1996 in the areas of high-tech security, investigation, and prosecution of high-tech crimes for both private and public sector security and investigative personnel and prosecutors. CTIN sponsors training from experts world-wide for the benefit of private organizations and law enforcement agencies.

  • Cyphort
    Booth: 206

    Cyphort is the next generation APT defense solution for the enterprise. Cyphort provides a single pane of glass across perimeter and laterally moving threats, correlates threat signals before and after an incident while eliminating noise from false alerts and red herrings.

  • Druva
    Booth: TBD

    Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in today’s mobile and distributed enterprise. Druva’s award-winning inSync and Phoenix solutions prevent data loss and address governance, compliance, and eDiscovery needs on laptops, smart-devices and remote servers.

  • Electronic Crimes Task Force
    Booth: TBD

    The role of the U.S. Secret Service has gradually evolved since the agency’s 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation’s financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service’s mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals – all of whom recognize new opportunities to expand and diversify their criminal portfolio.

  • Fidelis Cybersecurity
    Booth: 204

    Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy.

    By integrating bi-directional network traffic analysis across your cloud and internal networks with email, web, endpoint detection and response, and automated deception technology, the Fidelis Elevate platform captures rich metadata and content that enables real-time and retrospective analysis, giving security teams the platform to effectively hunt for threats in their environment. Fidelis solutions are delivered as standalone products, an integrated platform, or as a 24×7 Managed Detection and Response service that augments existing security operations and incident response capabilities. Fidelis is trusted by Global 1000s and Governments as their last line of defense. Get in the hunt. For more information go to www.fidelissecurity.com.

  • Gemalto
    Booth: 308

    Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centers to devices and across networks. As the global leader in cloud and data protection, our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day.

  • Gigamon
    Booth: TBD

    Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. 

  • GuidePoint Security LLC
    Booth: TBD

    GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com

  • Institute of Internal Auditors (IIA)
    Booth: TBD

    Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession’s global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA
    Booth: TBD

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • International Information Systems Security Certification Consortium, Inc., (ISC)²®
    Booth: TBD

    Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.

    We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.

  • ISSA New England
    Booth: TBD

    The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.

    Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.

    Visit the National Headquarter’s website at www.issa.org.

  • Malwarebytes
    Booth: 334

    Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations, simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives. Visit us at www.malwarebytes.com/business.

  • NETSCOUT
    Booth: 420

    NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.

  • New Tech Seattle
    Booth: TBD

    Seattle’s largest ongoing monthly event with more than 5,600 members. New Tech Seattle is the place where you’ll always make great connections, enjoy great food and drinks, learn about new companies doing cool things, laugh, smile, and have a fun night out. And most importantly, you’ll discover the people, partners, organizations, and resources to help you to build your dreams.

    It’s your community, we just love it and give everyone a place to play together. New Tech Seattle happens on the 2nd or 3rd Tuesday of every month. You can also join us on the 1st or 2nd Tuesday of every month at New Tech Eastside if you spend more time in Kirkland, Bellevue, Redmond, and the surrounding cities.

  • Northwest Tech Alliance (NWTA)
    Booth: TBD

    The Northwest Tech Alliance (NWTA) is an independent technology association dedicated to bringing together some of the brightest minds from the technology industry.
    NWTA events are focused on helping attendees:
    · Network with other technology industry professionals
    · Provide education and information relative to the latest technologies and industry trends
    · Generate opportunities for personal, professional and business growth
    · Promote the Puget Sound area as a desirable place to start and grow successful technology companies
    · Learn about local food/chefs, wineries, breweries, and distilleries
    · Support local businesses and give back to the community
    · Build lifelong relationships

  • Online Trust Alliance (OTA)
    Booth: TBD

    The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users’ security, privacy and identity. OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.

  • Optiv
    Booth: 112

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • Palo Alto Networks
    Booth: 418

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Presidio
    Booth: TBD

    Presidio is the premier provider of digital transformation; solutions built on agile secure infrastructure deployed; in a multi-cloud world with business analytics.

  • Qualys, Inc.
    Booth: 312

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.

  • Radware
    Booth: 200

    Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.

  • Sirius
    Booth: TBD

    Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.

  • Spirent Communications
    Booth: TBD

    As a leader in test, measurement, assurance, and security solutions for next-generation devices and networks, Spirent empowers cyber security champions to tame the complexity of balancing security with high availability business demands. We provide expert guidance and methodologies to help our customers find clarity in the face of complexity, overcome the challenges of a fast-approaching future, and ultimately deliver on their promise to their own customers.

  • Structured
    Booth: TBD

    Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For nearly 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.

  • Tavve’s ZoneRanger
    Booth: TBD

    Tavve’s ZoneRanger is an application-layer proxy firewall for management protocols. This edge solution eliminates the need for open firewall ports and their corresponding firewall rules. The ZoneRanger is vendor independent supporting SNMP, ICMP, Syslog, Netflow, TACACS+, and numerous other management protocols. Current ZoneRanger environments support an extensive list of management applications, including Splunk, ArcSight, Solarwinds, HPNA, CA Unicenter. The ZoneRanger is installed at two of the top 10 banks in the US, as well as numerous financial institutions and credit card companies around the world

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tempered Networks
    Booth: TBD

    Tempered Networks meets the cyber security and connectivity needs for organizations who require uncompromised protection for business critical infrastructure. Our solution ‘cloaks’ critical systems, communications and endpoints, effectively rendering them invisible to all but trusted devices. Unlike traditional security solutions, our platform includes centralized orchestration of policies to reduce manual errors.

  • Thales
    Booth: TBD

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatTrack
    Booth: TBD

    ThreatTrack specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by businesses, enterprises and government agencies around the world. ThreatTrack develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats.

  • Trend Micro
    Booth: 210

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • Varonis Systems, Inc.
    Booth: 418

    Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.

  • Venafi
    Booth: TBD

    Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

    With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms;  four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.

    For more information, visit: www.venafi.com.

  • Veriato
    Booth: 320

    Veriato provides User Behavior Analytics and User Activity Monitoring solutions.

    Over 36,000 organizations worldwide trust Veriato to gain insight into human activity on their network.

    Veriato’s award-winning solutions include Veriato Recon (behavioral analytics based insider threat detection),

    Veriato 360 (enterprise-grade User Activity Monitoring), and Veriato Investigator (employee investigation tool).

  • Washington Technology Industry Association
    Booth: TBD

    As one of the oldest and largest statewide technology trade associations in North America, we’re passionate about promoting Washington as a desirable place to start and grow successful technology companies amid a strong and connected community. WTIA is the place to connect to Washington’s technology industry.

  • Wombat Security Technologies
    Booth: TBD

    Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

  • Zscaler
    Booth: 220

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.

  • speaker photo
    Omar Chaudhry
    Chief Engineer of Information Security, Mitre Corp

    Omar Chaudhry is currently pursuing a Doctor of Philosophy (Ph.D.) in Systems Engineering at The George Washington University. He is also the Chief Engineer of Information Security at The MITRE Corporation. Omar is a cybersecurity practitioner with almost 15 years of experience in operational security and compliance.

  • speaker photo
    Jake Bernstein, Esq.
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP

    Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.

  • speaker photo
    Troy Leach
    Chief Technology Officer, PCI Security Standards Council

    : Troy Leach is the Chief Technology Officer for the PCI Security Standards Council. In his role, Mr. Leach partners with Council representatives, Participating Organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject matter expert on payment security and holds advanced degrees from Syracuse University in network management and information security.

  • speaker photo
    Andrew Baze
    Microsoft, Director of Security Program Management

    Andrew Baze is a principal security analysis program coordinator in Microsoft's Cloud and Enterprise Security group, assessing and improving security capability across Microsoft's online services and infrastructure. He enjoys applying his 15+ years of engineering, risk management and security analysis experience to help organizations better understand and improve their security.

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.

  • speaker photo
    Kate Wakefield
    Director of Information Security, Landmark Health

    Kate Wakefield has sixteen years of Infosec experience including retail, telecommunication, and over ten years in healthcare. Special interests include Privacy, Risk Assessment,IT audit, and Compliance. She has been using HiTRUST as a compliance framework since 2015. Kate holds CIPT and CISSP certifications and served on the local ISSA Board.

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Craig Schippers
    Principal Engineer, Trend Micro, Inc.

    Craig Schippers is a CISSP Certified Principal Sales Engineer at Trend Micro. He has worked in the Security Industry for approximately 17 years assisting customers with their Infrastructure Security needs. He lives in the Kettle Falls, WA.

  • speaker photo
    Bill Kine
    Network Consulting Engineer, Juniper Networks
  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    Tom Bienkowski
    Director, Product Marketing, Arbor Networks

    Tom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he’s a Director of Product Marketing focusing on Arbor’s industry leading DDoS Protection solution.

  • speaker photo
    Mark Miller
    Director Customer Support, Venafi

    Mark Miller has been working with security software products for over 16 years. Before that and without realizing it he was preparing for his computer software career by playing games in DOS and Windows. He grew up as a middle child in a large family teaching him how to work with all personality types. His main focus over his career so far has been creating and leading strong teams to solve difficult product issues. Over time, some of the roles he has helped fill are Support, IT, Training, Development, QA, Sales Engineering, and Professional Services. Today he is the Director of World Wide Support at Venafi and considers himself lucky to get to work with some of the best talent in the industry.

  • speaker photo
    Kevin Murphy
    Business Information Security Officer (BISO), T-Mobile USA

    Kevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT security certifications.

  • speaker photo
    Vanessa Pegueros
    Board Member, Cybersecurity Leader, Angel Investor

    Vanessa is a cybersecurity leader with over 16 years of security experience. She is currently serving on the Board of Carbon Black (CBLK) and BECU. She also is a venture partner with Flying Fish Partners in Seattle. Vanessa formally worked as the CISO at DocuSign and successfully managed through hyper growth and an IPO in 2018. She also was the SVP of Enterprise Security at US Bank, CISO at Expedia, and has held senior level security roles with Washington Mutual, Cingular, and AT&T Wireless. She has held numerous other roles specifically within the wireless arena, including Network Planning, Architecture & Engineering, Technical Sales, and Product Development.

    She has an MBA from Stanford University, an MS in Telecommunication from the University of Colorado, and a BS in Engineering from UC Berkeley. She holds GSEC, CRISC, CISM, and CISSP security certifications, as well as the Certified Information Privacy Professional Europe (CIPP/E) privacy certification.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.

  • speaker photo
    Carla Hough
    Risk & Threat Analyst, UW Medicine IT Services & Security
  • speaker photo
    Jordan Wiseman
    PCI Environments, AWS
  • speaker photo
    Eddy Cruz
    Chapter President, Evergreen InfraGard
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.

  • speaker photo
    Alejandro Villegas
    Security Engineer, Amazon

    Seasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001

  • speaker photo
    Joan Ross
    Cybersecurity Technologist, CISO, and Threat Intelligence Professional

    Joan Ross is a respected industry thought leader who develops advanced security strategies, publishes and speaks on implementing threat intelligence. Joan is a former Chief Security Officer for two technology companies, coming up the security ranks as an encryption engineer and cloud security architect. As an early CISSP holder from back in the 1990’s, she maintains a number security and privacy certifications and earned her Masters of Science degree in design and engineering focusing on incident response with the U.S. Coast Guard.

  • speaker photo
    Adam Schrock
    Managing Director, Grant Thornton
  • speaker photo
    Mary Gardner
    VP & CISO, F5 Networks

    Mary Gardner’s background provides a wealth of security, compliance, and risk management expertise from a variety of industries, including healthcare, finance, and transportation/logistics. She joined F5 as chief information security officer (CIS)) from Seattle Children’s, where she served as CISO. She has also held security leadership positions at Fred Hutchinson Cancer Research Center, Port of Seattle, JPMorgan Chase, and Washington Mutual.

    Gardner holds a B.S. from Trinity University. She is also a Certified Information Systems Security Professional (CISSP) and member of the Executive Women’s Forum. Gardner is based in Seattle at F5’s corporate headquarters.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Barbara Endicott-Popovsky
    Executive Director, Center for Information Assurance and Cybersecurity, University of Washington

    Barbara Endicott-Popovsky, Ph.D., is Executive Director of the Center for Information Assurance and Cybersecurity at the University of Washington, recently re-designated by NSA/DHS as a Center of Academic Excellence in Cyber Defense Education, headquartered at UW Bothell, and a Center of Academic Excellence in Research, headquartered at the APL (Applied Physics Lab). She is a Principal Research Scientist at APL; an Affiliate Professor at UW Bothell’s Department of Computer Science and Systems and UW Seattle’s Department of Urban Planning and Management for the Master of Infrastructure Planning and Management, and adjunct faculty at University of Hawaii Manoa’s Department of Information and Computer Science. She was named Department Fellow at Aberyswyth University Wales (2012). Her academic career follows a 20-year career in industry marked by executive and consulting positions in IT architecture and project management.

  • speaker photo
    Craig Spiezle
    Founder & President, AgeLight Advisory & Research Group

    Craig Spiezle is the founder and managing partner of AgeLight Advisory Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mindset to stewardship. Craig is the Charmain emeritus of the Online Trust Alliance, an initiative of the Internet Society. He frequently briefs international policy makers driving awareness of best practices by both the public and private sectors and importance of internet governance. Craig has championed security best practices to help protect consumers while promoting innovation and the role of meaningful self-regulation. Prior to OTA, Craig spent over a decade at Microsoft focused on security and privacy enhancing technologies and standards. Craig chairs the Online Trust & Integrity Council and is on the board of the Identity Theft Council, editorial board of SC Magazine and a member of InfraGard, the IAPP and the APWG.

  • speaker photo
    Kevin Kin
    Global Director, Systems Engineering, CSS, Palo Alto Networks
  • speaker photo
    Chris Luedde
    Product Manager, Wombat Security
  • speaker photo
    David Barton
    CISO, Forcepoint

    David Barton is the Chief Information Security Officer for Forcepoint, responsible for securing the company and sharing key learnings with customers. Barton brings to his role more than 20 years of experience in security leadership across a variety of sectors, including telecommunications, healthcare, software development, finance and government. Prior to joining the company in 2015, he spent three years as the Head of Information Security at Hireright, where he was responsible for securing the company’s information and physical assets on a global scale. Barton holds an MBA from the University of Missouri – Kansas City and a bachelor’s degree in Management Information Systems from Simpson College. He is also a Certified Information Systems Security Professional (CISSP).

  • speaker photo
    JD Sherry
    Chief Strategy Officer, Remediant

    JD Sherry is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cybersecurity, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private, and hybrid clouds emphasizing security architecture best practices to meet strict compliance standards.

    Over the last decade, he has established himself as a trusted senior advisor for the protection of Payment Card Industry (PCI), Health Information Privacy Act (HIPAA), and Personally Identifiable Information (PII) data. JD interfaces regularly with TV/media/press to provide expert insight on the state of cybersecurity and how individuals and organizations can adequately protect themselves from loss. JD has held Top Secret clearance and has an MBA/IT degree from Jones University and a B.S. degree from the University of Nebraska.

  • speaker photo
    Chuck Craft
    Senior Sales Engineer, Tavve

    Chuck's role at Tavve is making customers successful in moving network protocols such as SNMP, Syslog and Netflow into and out of the DMZ. He draws on over 30 years of IT/computer experience; 24 years (NNM 3.31) of that in network and systems management working for HP resellers and vendors.

  • speaker photo
    Brent McKinnon
    Enterprise Sales Manager, Cylance
  • speaker photo
    Patti Sauder
    Senior Sales Engineer, Cylance
  • speaker photo
    Santosh Kandala
    Director, Security Monitoring & Analytics, Microsoft

    Santosh Kandala is a passionate security leader with diverse experience in the areas of behavioral analytics, security monitoring, incident response, cloud scale detection, digital forensics, ethical hacking and investigations. When is he is not finding needles in the haystack, you will see him running half marathons in the trails around Puget Sound.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Nick Multari, PhD
    Program Manager, Pacific Northwest National Lab

    Nick Multari provides programmatic and technical guidance to cybersecurity research programs at the Pacific Northwest National Lab (PNNL). Prior to joining PNNL, he led the trusted cyber technology group at Boeing Research and Technology. He received his PhD in Computer Science from the University of Texas at Austin

secure world app
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes