Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, November 7, 2018
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Advisory Council Breakfast – (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    8:00 am
    SecureWorld Plus Part I
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus Part I
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus Part I
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    New CISO: First 90 Days
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    This interactive presentation will walk through the stages we go through as the new head of information security in our company from the days preceding “Day One.” Checklists and ideas are shared to help you lift as many stones as possible while inspiring confidence in executive leadership.

    8:30 am
    A New Framework for Overcoming Common Security Challenges
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    This session will focus on challenges typically encountered in managing security operations teams like budget, talent management, and reducing noise. Often times, these challenges directly connect to tangible gaps in mission/vision/strategy. We will introduce a framework and approach for managing these challenges.

    8:30 am
    IoT Defense: A Holistic Approach
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    Reviewing the current state of IoT devices, their cloud endpoints and the connection between them to understand the threat landscape and where our focus needs to be in the years ahead.

    8:30 am
    GDPR and the SMB World
    • session level icon
    Controlled concern is more productive than pure panic.
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    The European Union’s General Data Protection Regulation (GDPR) will go into effect on May 25, 2018. Think GDPR doesn’t apply to your organization? Think again. There are very few businesses that the GDPR will not apply to. The scope is expansive and affects businesses regardless of where they are globally located. If any part of your business touches a person in the EU – be ready! Just like the Y2K era, companies small and large have a lot of work to do in preparation. For businesses that already have a strong security and privacy program, there may be changes required to achieve full compliance. Unfortunately, SMBs are finding that there is a lot more work to do before the deadline arrives. In this session, we will cover this topic and explain how the harmonizing of privacy laws will impact your business.

    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    9:30 am
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm

    Advisory Council – VIP / INVITE ONLY

    11:15 am
    And the Clouds Break: Continuity in the 21st Century
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm

    The promise of cloud computing was a utility; always up, always on. But we’ve seen many outages. Time to dust off the continuity handbook, and revisit recovery for the twenty-first century. This session covers business impact analysis, business continuity, disaster recovery in utility computing and Cloud services. After all, the clouds break.

    11:15 am
    A Comprehensive Framework for Securing Open Source Software
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    We all understand the benefits of using open source software, but are not necessarily comfortable relying solely on the meritocracy of open source communities to keep that software secure. This talk will establish a framework for securing both the consumption and contribution of open source code. Within the context of the framework we will explore long standing software security techniques and newly emerging technologies and solutions.

     

    11:15 am
    Forensic Analysis of a Ransomware Attack
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    Given the number of institutions hit and the amount of media generated, ransomware is a huge threat. But what does ransomware actually do to a system? For this presentation, we’ll disable any anti-ransomware, anti-malware, and threat emulation so that we can see what an attack does when encrypting a system.

    11:15 am
    The Expanded Scope of the Computer Fraud & Abuse Act (It's Not Just For Hackers Anymore)
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    As the federal Computer Fraud and Abuse Act (CFAA) turns 33 years old, it is increasingly being applied not just to external hackers, but also to current and former employees, competitors, vendors and even customers. Information Technology attorney Kathy Ossian will discuss recent civil and criminal actions under the CFAA and the impact of its expanded scope on businesses.

    11:15 am
    GDPR – End-to-End Impact
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm

    Review of how GDPR will impact day-to-day operations and the support service. Direct impact to our ability to process in the EU.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm

    Advisory Council – VIP / INVITE ONLY

    12:15 pm
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Privacy Considerations for the Information Security Professional
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Privacy can be a confusing topic, particularly in the U.S. From his experience building a federally compliant privacy program, Michael will cover basic components of a privacy program, opportunities to incorporate privacy into existing security work, and practical examples of privacy tools. Challenges you may encounter will also be discussed.

    1:15 pm
    Panel: Beware the Highwaymen: Rise of the Cyber Criminal
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Modern civilization has always been plagued by various classes of criminals. Travelers would hire guards to protect their caravans from hijackers. Thieves came up with various ploys to trick travelers on the road. In today’s day and age the advent of interconnected devices, allowing for portability of corporate secrets, has given rise to a completely different class of nefarious actors. Cyber criminals range from those bent on stealing your personal information to “cyber terrorists” who have the capability to inflict harm on a much wider scale. Uninhibited by current laws, they are very effective given the speeds of networks, lack of appropriate security controls, and the anonymous nature of the attacker. Making matters worse, the crime may be perpetrated by entities outside of the legal jurisdiction where the unlawful act took place. This panel will explore the tools these criminals use, what can be done to prevent them, and how to safeguard your data.
    Panelists:
    Carol Sun, InfoSec Institute
    Ron Winward, Radware
    Justin Woody, FireEye
    Eric Thomas, ExtraHop
    Moderator: Mike Metzler

    1:15 pm
    Panel: Hazards on the Horizon - Emerging Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Just as in the days of yore, you must have watch guards in the tower scanning the horizon for enemy banners. If you follow cyber threats, then you know that the landscape is constantly changing. From the bring your own device (BYOD) workplace to mobile-malware, social engineering, and everything in between, information security has transformed. In order stay ahead of the ever-changing threats, it is imperative to constantly improve and change security policies. Join industry experts as they discuss the importance of rolling with the changes, and how your company can stop the threat before it gets to the castle gate.
    Panelists:
    Jon Clay, Trend Micro
    Kellen Christensen, Dasher Technologies
    Hariom Singh, Qualys
    Tom Gallo, Symantec
    Gary Southwell, CSPi
    Moderator: Dan Lohrmann

    1:15 pm
    Encrypting the Human Mind
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    The human mind is the weakest link in cyber space. We will show what to look for to be safe online.

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    3:00 pm
    Panel: Manage the Damage - The Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Every week we learn about some business, government entity, bank, or healthcare entity in the news that has been hacked. Often times the intruders had been sitting collecting information for months before being discovered. Now more than ever it is crucial for organizations to develop, practice, and fine tune their incident response plans. When do you get law enforcement involved? What about the legal team or PR? Will your business recover? This panel discussion will tackle these issues as well as your questions on what you need to know after the hack.
    Panelists:
    Imry Linden, CyberArk
    Peter McNaull, LogRhythm
    Karthik Krishnan, Aruba Networks
    Andrew Cook, Delta Risk
    Bill Shelton, ThinAir
    Moderator: Jean Pawluk

    3:00 pm
    A Comprehensive Framework for Securing Open Source Software
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    We all understand the benefits of using open source software, but are not necessarily comfortable relying solely on the meritocracy of open source communities to keep that software secure. This talk will establish a framework for securing both the consumption and contribution of open source code. Within the context of the framework we will explore long standing software security techniques and newly emerging technologies and solutions.

     

    3:00 pm
    Rethinking Network Security With a Software-Defined Perimeter
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Traditional network security is failing us. This session introduces a new, open network security model, the Software-Defined Perimeter. This architecture, published by the Cloud Security Alliance, verifies and secures all user access to network resources, improving security and compliance for both on-premises and cloud environments.

    3:00 pm
    IoT and Blockchain in Healthcare
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    Tens of billions of connected devices will form the smart homes, cities and user experience of the future. The “Internet of Things” is a rich opportunity for IT Leaders but also presents some headaches, particularly when we think of medical and consumer devices in Healthcare. Hear the unique perspective from one of the nations largest healthcare providers on how they plan to step up to the challenge and how one notorious upstart technology, the “Blockchain”, can potentially benefit the “Smart Hospital.”

    3:00 pm
    SecureWorld Plus Part II
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    SecureWorld Plus Part II
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    3:00 pm
    SecureWorld Plus Part II
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
  • Thursday, November 8, 2018
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    SecureWorld Plus Part III
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus Part III
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:00 am
    SecureWorld Plus Part III
    • session level icon
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    8:30 am
    Cloudy Days Ahead: Security Implications of the Expansion of IIoT/IoT in Industrial Control Environments
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    In recent years, business drivers requiring access to more near real time or real time data has compelled organizations to increase connectivity within their industrial control environments. That connectivity is not only to enterprise networks, however, as there has been an expansion of IIoT (Industrial Internet of Things) capability within these control environments, and a subsequent movement of data into the cloud for further enrichment. What does this mean for a domain that already has significant security challenges? This presentation will examine some of those challenges and what implications there are as IIoT continues to expand.
    8:30 am
    10 Steps to Mastering Cybersecurity for Parents
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    8:30 am - 9:15 am

    Kids do what their parents do. So, parents need to practice good cyber hygiene and then teach those habits to their kids. They also need to enforce healthy boundaries on Internet usage. We’ll explore specific risks to kids using the Internet along with specific things parents should be doing to minimize those risks. These lessons are drawn from my experience both at work and at home and are based on what we do with our family.

    8:30 am
    Data Breach Digest – Perspective is Reality
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am

    Data breaches are complex affairs. Response activities are proportionately complex involving various stakeholders with slightly different perspectives. This presentation covers the 2017 “Data Breach Digest – Perspective is Reality”; a compendium of data breach scenarios told from different stakeholder points of view covering their decisions, actions and crucial lessons learned.

    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    9:30 am
    OPENING KEYNOTE:
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm

    Advisory Council – VIP / INVITE ONLY

    11:15 am
    GDPR: A Check-In on Readiness, Rollout, and Watch-outs
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    The EU General Data Protection Regulation (GDPR) becomes enforceable on May 25, 2018. While well-executed GDPR compliance can empower trust and transparency between individuals and organizations, the depth and complexity of implementation can place significant pressures on IT security. This presentation discusses GDPR readiness, rollout, and watch-outs.

    11:15 am
    Infosec Heresies: What We’re Doing Isn’t Working
    • session level icon
    It’s time to question your own authority.
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    Stop writing policies that no one reads or enforces. Stop paying for security tools that don’t demonstrably reduce risk. Stop saying “no” to everyone. Maybe a bit of information security heresy is just what we need to reverse the trend of information security failures in our organizations.

    11:15 am
    Navigating the Alternative Facts of Malware Prevention
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm

    This presentation, given by an individual not linked to any anti-malware vendor, is the result of over two years of research covering several dozen tools in the anti-malware space, in an effort to find the ideal tool for our corporate environment. It is intended to be an in-depth focus on the evolution of the space, the tools, and the technologies behind them, with a “no holds barred” approach to presenting our evaluation methodology and results.

    11:15 am
    Internet of Things Security and You
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm

    IoT is older than you may imagine and each new advance came with a set of security issues. Learn from history, incidents and controls. Modern IoT is complex; architectures have many common emergent issues but it is possible to make good decisions if you understand the trade-offs.

    11:15 am
    Gaining Better Visibility Into Risk – The Future of GRC
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm

    In this session we will be discussing the general achievements and failings that clients have experienced utilizing GRC platforms and processes, where the market is headed, and how integration of different data sources and risk correlation techniques are starting to be utilized to get a better picture of risk.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm

    Advisory Council – VIP / INVITE ONLY

    12:15 pm
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:15 pm
    How to Perform a Data Privacy Impact Assessment
    • session level icon
    Now I know how to do a DPIA!
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    A practical guide to performing a Data Privacy Impact Assessment, including a fully completed DPIA example and a template you can use.

    1:15 pm
    ABCs of GDPR
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    With the upcoming May 2018 effective date for GDPR compliance, it is important to understand the basics of responsible information management. Organizations must focus on people and process, not just technology, to implement and evidence their compliance. This is an organization-wide issue and requires partnership among IT and diverse business functions. Accountability can leverage a risk-based approach, but compliance by accident will not work.

    1:15 pm
    Panel: Close the Front Gate: Identify all Travelers
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    One of the first lines of defense for a castle was the front gate or portcullis. When the need arose, they would simply close the gate and stop everyone from entering. Castle guards would stop each traveler and determine their identity and if they were a threat before letting them in. Sort of like today’s network access control and firewalls. Identity or the perception of one’s identity was all that mattered and a smart spy or thief would gain access to the castle with only minor delays. Our experts will discuss your options for defending your castle.
    Panelists:
    Michael Stuyt, SailPoint
    Gina Osmond, Venafi
    Michael Feiertag, tCell
    David Hawkins, Centrify
    Moderator: Bruce Lobree

    1:15 pm
    Panel: The Court Jester Has the Crown Jewels (Ransomware)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    Way back in the day if you wanted to get someone to bend to your will you could just kidnap the princess or steal the Crown Jewels. Kingdoms would do just about anything to get these things back. It was probably a bit easier to grab the princess and leave a note with your demands. The exchange of coin for the princess was a risky maneuver but worth the reward if you escaped. Now it just takes one foolish click to become a victim of ransomware. Sadly, they are not easily caught when you make the trade with bitcoin. This panel will talk about the current schemes happening with ransomware and how you can try to keep the Crown Jewels safe.
    Panelists:
    Donald Meyer, Check Point Security
    Ryan Peters, Bluvector
    Mat Gangwer, Rook
    Ed Metcalf, Cylance
    Brian Lain, Lastline
    Moderator: Jake Bernstein

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibitor Floor

    Be sure to have exhibitors scan your badge for a chance to win prizes. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win

    3:00 pm
    Access Management – How to Control Access in Today’s Technology Environment
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    User ids, long complicated passwords, data breaches, internal audits, external audits, compliance assessments, hackers, and the list goes on-and-on. These are just a few things that access management professionals worry about. How do you setup your access management controls to limit the organizations exposure, and decrease the odds something bad will happen. Come learn proven techniques to control the access management environment.

    3:00 pm
    Being Risk Aware in Cloud Adoption
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    In spite of the benefits to be realized in Cloud, organizations are uneasy about the risks. It is important for organizations to be risk-aware since the impact could easily pass on to the existing /future clients. How can organizations exploit the risk in order to successfully adopt cloud?

    3:00 pm
    Do You Have a Security Doctrine? Going from Compliance Frameworks to Defense
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm

    The questions that every security leader struggles to answer are “How secure are we?” and “What do I do first?”. In addition, security leaders are under a lot of pressure to show quick wins while knowing full well that everything they do will be heavily scrutinized and challenged, and ultimately, they will pay the price for things that are not under their control. To that end many security leaders take the approach of checking the compliance frameworks boxes frameworks (NIST, ISO, etc.), and while this approach may provide a blanket to cover one’s back side it is ineffective against real world adversaries.

    In this session, Yaron Levi, CISO of Blue Cross and Blue Shield of Kansas City, will share his company’s vision and approach for building a security practice that is based on defense against real adversaries not just compliance.

Exhibitors
  • Bay Pay Forum
    Booth:

    The BayPay Forum, a Silicon Valley-based international network composed of over 14,000 payment and commerce executives, entrepreneurs and investors from thousands of different companies, serves as a forum to connect members in identifying and understanding the emerging trends and innovations in the industry.

  • CIOReview
    Booth:

    CIOReview is a technology magazine that talks about the enterprise solutions that can redefine the business goals of enterprises tomorrow. It is the leading source that shares innovative enterprise solutions developed by established solutions providers, upcoming hot enterprises and is a neutral source for technology decision makers. Published from Fremont, California, CIOReview is an excellent platform for the enterprise to showcase their innovative solutions.

  • Cloud Security Alliance (CSA)
    Booth:

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • CTIN
    Booth:

    CTIN has been providing high tech crime fighting training since 1996 in the areas of high-tech security, investigation, and prosecution of high-tech crimes for both private and public sector security and investigative personnel and prosecutors. CTIN sponsors training from experts world-wide for the benefit of private organizations and law enforcement agencies.

  • Cyber-Ark Software
    Booth:

    Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments.

  • Dasher Technologies
    Booth:

    Dasher Technologies, Inc. ® is a premier IT solution provider that delivers expert technical resources along with trusted account executives to architect and deliver complete IT solutions and services to help our clients execute their goals, plans and objectives.

  • DirectDefense
    Booth:

    Founded in 2011, DirectDefense offers security services that are unmatched within the industry. Our core strength is our deep experience in performing assessments for a wide array of networks, platforms, and applications. Our seasoned consultants are focused on providing world-class security services to our clients.

    Regardless of industry – financial, insurance, retail, hospitality, healthcare, education, gaming, technology, or energy and utilities, our wealth of knowledge and experience can assist you in achieving your security testing and strategy goals.

  • Duo
    Booth:

    Duo was founded with the belief that security can only be effective if it is easy to use. Through that vision, Duo has built a world-class security platform that is actually enjoyable to use. Duo supports thousands of customers and millions of users in organizations like Accenture, Boston Medical, Emblem Health, Facebook, Toyota, Twitter, Virginia Tech, Yelp and others, and enjoys the highest NPS score in the industry.

  • EC-Council
    Booth:

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • Fidelis Cybersecurity
    Booth:

    Fidelis Cybersecurity protects the world’s most sensitive data by equipping organizations to detect, investigate and stop advanced cyber attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis Network and Fidelis Endpoint, customers can get one step ahead of any attacker before a major breach hits. To learn more about Fidelis Cybersecurity, please visit www.fidelissecurity.com and follow us on Twitter @FidelisCyber

  • Institute of Internal Auditors (IIA)
    Booth:

    Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession’s global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.

  • InfraGard – Evergreen / WA chapter
    Booth:

    InfraGard is a partnership of individuals representing businesses, academic institutions, state and local law enforcement agencies, and communities who are dedicated to collaborating and sharing information to prevent hostile acts against the United States.

    The Evergreen InfraGard Members Alliance area of operation is Washington State and over 600 members. As part of the Western Region, we work closely with the IMAs in Los Angeles, San Diego, Oregon, and Idaho. Our chapter’s mission is, “To protect Washington State’s Infrastructure and critical services by providing a secure platform and trusted community to share experiences and information.”

  • ISACA
    Booth:

    As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

  • (ISC)2
    Booth:

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation – The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

  • ISSA Puget Sound Chapter
    Booth:

    ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. Join today.

  • Malwarebytes
    Booth:

    Malwarebytes provides anti-malware and anti-exploit software designed to protect users against zero-day threats that consistently escape detection by traditional endpoint security solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That’s why large Enterprise businesses worldwide, including Disney, Dole, and Samsung, trust Malwarebytes to protect their mission-critical data. For more information visit www.malwarebytes.com/business

  • New Tech Seattle
    Booth:

    Seattle’s largest ongoing monthly event with more than 5,600 members. New Tech Seattle is the place where you’ll always make great connections, enjoy great food and drinks, learn about new companies doing cool things, laugh, smile, and have a fun night out. And most importantly, you’ll discover the people, partners, organizations, and resources to help you to build your dreams.

    It’s your community, we just love it and give everyone a place to play together. New Tech Seattle happens on the 2nd or 3rd Tuesday of every month. You can also join us on the 1st or 2nd Tuesday of every month at New Tech Eastside if you spend more time in Kirkland, Bellevue, Redmond, and the surrounding cities.

  • Northwest Tech Alliance (NWTA)
    Booth:

    The Northwest Tech Alliance (NWTA) is an independent technology association dedicated to bringing together some of the brightest minds from the technology industry.
    NWTA events are focused on helping attendees:
    · Network with other technology industry professionals
    · Provide education and information relative to the latest technologies and industry trends
    · Generate opportunities for personal, professional and business growth
    · Promote the Puget Sound area as a desirable place to start and grow successful technology companies
    · Learn about local food/chefs, wineries, breweries, and distilleries
    · Support local businesses and give back to the community
    · Build lifelong relationships

  • Okta
    Booth:

    Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

  • Online Trust Alliance (OTA)
    Booth:

    The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users’ security, privacy and identity. OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.

  • Radware
    Booth:

    Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware’s solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.

  • SSH Communications Security
    Booth:

    As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture and save on operational costs. SSH Communications Security is headquartered in Helsinki and has offices in the Americas, Europe and Asia. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. For more information, visit www.ssh.com

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Trend Micro
    Booth:

    As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we’re recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

Return to Agenda
Keynote Speakers
Speakers
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store
17th Annual Conference

Don't miss out! Join us for high-quality, affordable cybersecurity training and networking. Sign up today!