Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, November 9, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] Privacy & Security by Design & Default: Understanding the Convergence of Law, Policy & Technology
    • session level icon
    Part 1: Trends in the Law: An Overview of the Regulatory & Legal Landscape
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Attendees are eligible to receive 18 CPE credits (including 12 CPEs from the Conference Pass).

    Increasingly, each country, and even each state, is providing unique legal solutions to data privacy and security. For businesses that cross borders, both national and domestic, this creates distinct challenges to building effective solutions. These evolving privacy, security and technology requirements are impacting the growth and innovation within companies, requiring strategic decisions regarding risk, legal liability, and strategic planning.

    Often, the concepts of security and privacy by design and by default are built into these legal requirements. But, understanding the requirements of the law, and translating those requirements into technological solutions can be challenging. This workshop will provide in-depth understanding of those legal requirements, and provide a framework to help the industry incorporate these core concepts of design within technology.

    The course will start with an overview of general privacy and security legal and policy principles, and then will focus on two key laws that are pushing the privacy and security laws: the European Union’s General Data Protection Regulation (“GDPR”) and the California Consumer Privacy Act of 2018 (“CCPA”). Using these laws, we will discuss case studies, and how to communicate, plan, and strategize on products and solutions that incorporate privacy and security requirements.

    The course will include both lecture and hands-on exercises. The goal is for attendees to take away tools and strategies to bring this conversation to their teams and departments.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am

    Participating professional associations and details to be announced.

    9:00 am
    [Opening Keynote] Cybersecurity Collaboration: A Vital Component to U.S. Cyber Resilience
    • session level icon
    speaker photo
    Director, Region 10, DHS Cybersecurity and Infrastructure Security Agency (CISA)
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    The threats against our national cyber defenses are growing increasingly sophisticated and resourced. To adequately protect networks and information, government and industry must utilize their collective strengths, combine their talents, and work together to share threat information and best practices.
    9:45 am
    Networking Break & Professional Headshots
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for solution vendor displays or connect with attendees.

    Get your complimentary professional headshot! A photographer will be onsite Day 1 from 9 a.m. to 2 p.m. in the Exhibitor Hall.

    10:15 am
    Securing the Supply Chain
    • session level icon
    speaker photo
    Deputy CISO, State of Washington
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Session description to come.

    10:15 am
    Learn Why CISOs Are Embracing These Top ASM Use Cases Now
    • session level icon
    speaker photo
    Chief Evangelist, Team Cymru
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    CISOs need a plan of attack for their external digital risks. See how these five use cases will help you embrace ASM and make the most out of your investment:

    • Discovery of all assets
    • Discovery of all vulnerabilities and prioritizing them
    • Exposing shadow IT
    • Measuring M&A risk
    • Monitoring third-party assets

    Hear David Monnier, Chief Evangelist with Team Cymru, review the top five use cases that every security team must embrace now to get the most value out of your ASM journey. We’ll be introducing you to ASM 2.0 and explaining why it should top your future plans to reduce risk exposure.

    Key take-away:
    Learn how a unique blend of Attack Surface Management, Vulnerability Management, Threat Intelligence, and Business Risk Management can benefit your needs. Start the journey today.

    10:15 am
    Conquering Cloud Complexity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Cloud security is hard, not least because cloud platforms change so quickly.  This talk presents several lessons learned from security teams struggling to get their arms around the sprawl of modern infrastructure, using practical analogies from pandemics and earthquakes.

    11:10 am
    Data vs. Systems Protection: The New Cybersecurity School of Thought
    • session level icon
    speaker photo
    CISO, AAA Washington
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    The average individual has had their personal data compromised at least seven times in the past several years. This has spawned industries that are providing products and solutions to help people be made whole again with minimal effort.

    In a time when we are becoming tone deaf to data security breaches, we are acutely aware of breaches that have far greater impact than data confidentiality. Ransomware and denial of service attacks are proving to cause a more harmful impact to organizations than data breaches. Yet, the cybersecurity profession continues to emphasize data protection as its primary concern.

    This session will explore whether cybersecurity professionals and supporting product and solution providers should be changing their emphasis from data protection to systems protection to address the new threat and risk landscape.

    11:10 am
    Securing Your Sensitive Assets in a Cloud-First World
    • session level icon
    speaker photo
    Security, Cyral
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Key take-away: 
    How to rethink database security controls in a cloud-first world.

    For most organizations, data repositories hold our most sensitive, mission critical assets. The advent of the internet introduced new external threats and an ever-growing attack surface, prompting IT teams to start focusing on the protection of data repositories.

    As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:

    • Amount of data created, collected, and stored
    • Number of repositories storing sensitive data across clouds
    • Number of users and applications that need access to dataIn this talk, we’ll address how organizations can avoid top threats facing your data repositories with GitOps and how to safely democratize access to data repositories across clouds.

    Presentation Level: MANAGERIAL (security and business leaders)

    11:10 am
    Insider Threats: A Multi-Pronged Approach to Protecting Your Organization
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Insider threats are a real danger and cannot be overlooked. While deploying the latest secure system to fight against cyber threats is a decent strategy, you must also implement an effective insider threat system for an overall cybersecurity solution. An insider threat program cannot be brought off the shelf, but is a continuous process to identify and detect an incident as it occurs.

    Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)

    12:00 pm
    Lunch Keynote from Cisco
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session title and description to come.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    Online Consumer Privacy Is Too Complicated for Consumers
    • session level icon
    speaker photo
    Business Information Security Officer (BISO), T-Mobile USA
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Are you using basic tools to protect yourself, your company, and your family? The consumer has no idea what personal information they are sharing or how they’re tracked online. Let’s talk about how our industry can address this challenge to protect the consumer from themselves.
    Presentation Level: GENERAL (InfoSec best practices, trends, solutions, etc.)
    1:15 pm
    [Panel] The Current Threat Landscape
    • session level icon
    speaker photo
    Chief Security Strategist, BeyondTrust
    speaker photo
    Sr. Product Manger for Email Threat Protection, Carbonite and Webroot, OpenText Security Solutions
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?

    It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.

    2:30 pm
    The Future of Security Is One
    • session level icon
    speaker photo
    Information Security & Compliance Engineer, Costco Wholesale
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Session description to come.

    2:30 pm
    [Panel] Cloud: Doing More with Less
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm

    The cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.

    2:30 pm
    How to Build an Effective Security Awareness Program
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    3:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    3:45 pm
    The CISO's Journey to a Board Position
    • session level icon
    speaker photo
    Board Member, Cybersecurity Leader, Angel Investor
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm

    CISOs often make solid contributors to boards—be it with public or private companies of varying sizes, non-profits, or with organizations with a cause that is near and dear to their heart—but lots of thought must go into the journey to becoming a board member.

    Takeaways from this session will include:

    • Answering the questions, “Is board work something I want to do?” and “Is it something that plays to my strengths?” (Board positions are typically for CISOs with a knack for governance and big-picture thinking; not for the super technical, for instance.)
    • What every CISO needs to do to prepare to become a board member; it’s a multi-year journey (taking our speaker five years to achieve).
    • You’re ready, you have the experience, so what do you need to do next? (Such as networking and preparing a board bio, which is very different from a resume.)
    3:45 pm
    Finding Your Own Vulnerabilities (Before Attackers & Auditors Do)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm

    Organizations can often struggle to identify and address vulnerabilities in their environment, whether for network devices, servers, workstations, IoT devices and other hosts. This presentation covers a number of “quick wins” in vulnerability management for the wide range of devices seen on corporate and home networks today.

    3:45 pm
    Access Management: How to Control Access in Today’s Technology Environment
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm

    User IDs, long, complicated passwords, data breaches, internal audits, external audits, compliance assessments, hackers, and the list goes on and on. These are just a few things that access management professionals worry about. How do you set up your access management controls to limit the organization’s exposure and decrease the odds something bad will happen?  Come learn proven techniques to control the access management environment.

    3:45 pm
    [PLUS Course] Privacy & Security by Design & Default: Understanding the Convergence of Law, Policy & Technology
    • session level icon
    Part 2: Privacy by Design & by Default: The Legal & Policy Requirements
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm

    Increasingly, each country, and even each state, is providing unique legal solutions to data privacy and security. For businesses that cross borders, both national and domestic, this creates distinct challenges to building effective solutions. These evolving privacy, security and technology requirements are impacting the growth and innovation within companies, requiring strategic decisions regarding risk, legal liability, and strategic planning.

    Often, the concepts of security and privacy by design and by default are built into these legal requirements. But, understanding the requirements of the law, and translating those requirements into technological solutions can be challenging. This workshop will provide in-depth understanding of those legal requirements, and provide a framework to help the industry incorporate these core concepts of design within technology.

    The course will start with an overview of general privacy and security legal and policy principles, and then will focus on two key laws that are pushing the privacy and security laws: the European Union’s General Data Protection Regulation (“GDPR”) and the California Consumer Privacy Act of 2018 (“CCPA”). Using these laws, we will discuss case studies, and how to communicate, plan, and strategize on products and solutions that incorporate privacy and security requirements.

    The course will include both lecture and hands-on exercises. The goal is for attendees to take away tools and strategies to bring this conversation to their teams and departments.

  • Thursday, November 10, 2022
    7:00 am
    Registration open
    Registration Level:
    7:00 am - 4:30 pm

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] Privacy & Security by Design & Default: Understanding the Convergence of Law, Policy & Technology
    • session level icon
    Part 3: Operationalizing Privacy by Design & by Default
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Increasingly, each country, and even each state, is providing unique legal solutions to data privacy and security. For businesses that cross borders, both national and domestic, this creates distinct challenges to building effective solutions. These evolving privacy, security and technology requirements are impacting the growth and innovation within companies, requiring strategic decisions regarding risk, legal liability, and strategic planning.

    Often, the concepts of security and privacy by design and by default are built into these legal requirements. But, understanding the requirements of the law, and translating those requirements into technological solutions can be challenging. This workshop will provide in-depth understanding of those legal requirements, and provide a framework to help the industry incorporate these core concepts of design within technology.

    The course will start with an overview of general privacy and security legal and policy principles, and then will focus on two key laws that are pushing the privacy and security laws: the European Union’s General Data Protection Regulation (“GDPR”) and the California Consumer Privacy Act of 2018 (“CCPA”). Using these laws, we will discuss case studies, and how to communicate, plan, and strategize on products and solutions that incorporate privacy and security requirements.

    The course will include both lecture and hands-on exercises. The goal is for attendees to take away tools and strategies to bring this conversation to their teams and departments.

    8:00 am
    Exhibitor Hall open
    Registration Level:
    8:00 am - 4:30 pm

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 pm

    Participating professional associations and details to be announced.

    9:00 am
    [Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    9:45 am
    Networking Break
    Registration Level:
    9:45 am - 10:15 am

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:15 am
    Encryption and Quantum Computing - Breaking It Down
    • session level icon
    speaker photo
    Security & Privacy Information Systems Leader, Philips
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    This presentation will discuss the current state of encryption and why it won’t be sufficient in the world of Quantum computing. We will look at the life of data and why current encryption models will not be able to meet the life expectancy of the data, which is a measure of how strong your company’s encryption needs to be. We will also look at legacy data that is encrypted at rest and why it is also at risk, and why redoing the encryption of this data using newer encryption models may become mandatory in order to safeguard your data.
    10:15 am
    Multi-Cloud Complexity: It's Not as Difficult as You May Think
    • session level icon
    speaker photo
    Field CISO, Oracle
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Cloud providers have a stake in getting you to use as many of their native services as possible as they all want to capture as much of your cloud spend as possible.  This is certainly true for their core IaaS and PaaS services but is also true when it comes to the security services they offer.  The major cloud providers all offer a range of native security services that can be leveraged to help you secure the workloads you have on that platform.  But let’s face it, most organizations don’t use just a single cloud provider.  So, while these services all do a good job for their platform, they are different from the tools you are currently using to manage your on-premises environment, and they are different from each other.  This can lead to inefficiencies in your security operations model if you elect to use the cloud native security services for each of your providers.  These inefficiencies include duplication of effort and cost; increased staff training time and cost; need for more staff, and most importantly; disparate views of the security posture across your on premises and cloud environments.

    Key session takeaways will include:

    • Strategies for leveraging cloud native tools to your best advantage
    • Integrating cloud tools into your sec ops tools and processes
    • A look at the new gen CSPM tools and how they can help
    10:15 am
    An Enlightened Path to AppSec Nirvana from Code to Cloud
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Key Takeaway:
    You’ll leave with an executable roadmap to improving the security of your applications.

    This session will be high-level and cover the various elements of a comprehensive application security program and how the pieces fit together. We’ll also review the various secure development models to equip you with a choice of standards you can adopt. Finally, we’ll cover sequencing and speed so you can follow a path to achieving your own AppSec nirvana.

    Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)

    11:10 am
    Cyber Insurance for IT Professionals
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Although everyone needs cyber insurance, it’s getting more difficult for anyone to get a policy. At the same time, insurance companies are requiring more and more controls, like multifactor authentication (MFA) and endpoint detection and response (EDR). Not only that, but an IT person often has to complete and sign parts of the complex insurance application. This course will explain why cyber insurance is entering the IT professional’s world and how you can help your organization get the policy it needs.
    11:10 am
    Is Your Defensive Stack Ready For A Targeted Attack?
    • session level icon
    speaker photo
    Sr. Sales Engineer, Pentera
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    This session will focus on automated security validation. Organizations over the years have been following a defense in depth model to protect their critical assets.

    While this strategy makes sense, the tools, processes and procedures surrounding this initiative have grown significantly.
    How confident can organizations be that each layer and the enormous effort undertaking is working effectively?

    Walk away from this session with a better understanding of how continuous security validation, with real life attacker tactics and techniques, will help an organization assure their security readiness across their complete attack surface.

    11:10 am
    Third-Party Risk: Creating and Managing a Program that Works!
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Every organization is concerned with third-party risk. No one wants to be the next Target breach. This session will examine the components of third-party risk management and give you some leading practices on how to develop a workable and sustainable process.

     

    12:00 pm
    Zero B.S. Guide to Zero Trust
    • session level icon
    speaker photo
    CEH, Principal Architect, Cybersecurity, T-Mobile USA
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Key take-away:
    A pragmatic approach for creating a Zero Trust strategy, and how to get started on the journey.

    We’ll cover the main pillars of Zero Trust including Identity, Endpoints, Network, and Data Security. We’ll cover pros and cons of various network security approaches.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Advisory Council – VIP / INVITE ONLY

    12:45 pm
    Networking Break
    Registration Level:
    12:45 pm - 1:15 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    [Panel] 2022 InfoSec State of the Union
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    With high-priority concerns regarding ransomware and the latest in technology dominating the news cycle, what about good old-fashioned cyberattacks? Are those still happening? Social engineering still works and everyone likes a good phish, but what do you need to stay aware of that maybe you put on the backburner? Staying up to date with patching? How secure are those old legacy systems your organization is still using? Are you keeping up with awareness training and those other compliance and privacy projects you must maintain? Are staffing issues reaching our vendor partners?

    Join our experts and bring your questions to this inactive panel. We will shed light and takeaways on the 2022 InfoSec State of the Union and help spark insight and ideas on how to stay ahead of threats.

    1:15 pm
    [Panel] Incident Response!
    • session level icon
    speaker photo
    Chief of Staff and Co-Founder, Expel
    speaker photo
    Sr. Product Manager, Red Canary
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Security teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.

    2:30 pm
    Defining an Organization's Cyber Profile and Identifying Gaps
    • session level icon
    speaker photo
    CISO, Vancouver Clinic
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Session description to come.

    2:30 pm
    Reducing Implicit Trust in Your Cloud Service Provider
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm

    As organizations embark on a cloud-first strategy, they often find they’re placing excessive trust in their cloud service provider to protect the sensitivity of their organization’s assets, especially sensitive data. During this presentation, we provide an overview of how the cloud service provider requires you to participate in a shared security model and how your organization can retain control of your sensitive data encryption. In other words: your data, their cloud! We’ll discuss and show how using newer tools and techniques—that include split trust, ubiquitous data encryption, and contextual access—reduce and mitigate implicit trust in your cloud provider along with allowing you to manage your own encryption and manage access to your data in the cloud.

    2:30 pm
    I.A.M. What I Am: Building a Strong Identity and Access Management Program
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm

    Identity and Access Management has risen from a necessary evil to the “new perimeter” as applications migrate to the cloud. Having the right people aligned to your business processes with sound technology will propel your IAM program from the back office to business enabling function. This presentation will guide you on how to mature your existing identity and access management program, pitfalls to avoid, and tips to get your stakeholders on board.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    Insider Threat: Within Your Walls
    • session level icon
    Adversary Strategies to Infiltrate Your Organization
    speaker photo
    CEO & Founder, Center for Threat Intelligence
    Registration Level:
    • session level iconConference Pass
    3:45 pm - 4:30 pm

    A storm is gaining strength — you don’t know when it will hit, but you know it will. Your adversaries have been planning, studying and waiting. They seek out their best targets to persuade, bribe, extort or send in one of their own. They know your processes, your weaknesses, your strengths and, importantly, what assets you have that they want. It is time to change the game. This course gives you critical knowledge to understand and identify your adversary’s tradecraft to create insiders. In addition, you will learn to identify signs and motivations that may convert loyal employees to dangerous insiders. There is hope. While you can’t convince people not to be insider threats, you can inspire your people to be loyal. Learn how!

    Participants will gain awareness of adversarial tactics, understand signs of the potential “unwitting” insiders and understand core psychological motivations and needs of an insider threat.

    3:45 pm
    Ransomware and the Future of Cyberwarfare
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm

    The use of ransomware as a class of malware has exploded in recent years, causing millions of dollars in damages to organizations across the world—and the damage isn’t slowing down. On the contrary, ransomware as a tool is being adopted by a wide array of perpetrators. This includes nation-states, for cash, and to use the demand for cash to obfuscate activities like espionage and sabotage. Ransomware has become a powerful tool of asset seizure and extortion, being used by criminals, activists, and even sanctioned governments for multiple purposes, including use as a weapon of war. The use of ransomware and its close cousin, wiperware, is only accelerating.

    In this talk, we will examine how the proliferation of ransomware brought us to this point, what it means for current global conflicts, and the implications for the future of cyberwarfare.

    3:45 pm
    [PLUS Course] Privacy & Security by Design & Default: Understanding the Convergence of Law, Policy & Technology
    • session level icon
    Part 4
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm

    Increasingly, each country, and even each state, is providing unique legal solutions to data privacy and security. For businesses that cross borders, both national and domestic, this creates distinct challenges to building effective solutions. These evolving privacy, security and technology requirements are impacting the growth and innovation within companies, requiring strategic decisions regarding risk, legal liability, and strategic planning.

    Often, the concepts of security and privacy by design and by default are built into these legal requirements. But, understanding the requirements of the law, and translating those requirements into technological solutions can be challenging. This workshop will provide in-depth understanding of those legal requirements, and provide a framework to help the industry incorporate these core concepts of design within technology.

    The course will start with an overview of general privacy and security legal and policy principles, and then will focus on two key laws that are pushing the privacy and security laws: the European Union’s General Data Protection Regulation (“GDPR”) and the California Consumer Privacy Act of 2018 (“CCPA”). Using these laws, we will discuss case studies, and how to communicate, plan, and strategize on products and solutions that incorporate privacy and security requirements.

    The course will include both lecture and hands-on exercises. The goal is for attendees to take away tools and strategies to bring this conversation to their teams and departments.

Exhibitors
  • Adaptiva
    Booth:

    Adaptiva’s unrivaled solutions empower complex, enterprise IT teams to manage and secure endpoints with unparalleled speed at massive scale. They eliminate the need for a vast IT infrastructure and automate countless endpoint management tasks for many of the world’s largest organizations and government agencies.

  • AuditBoard, Inc
    Booth:

    AuditBoard is the leading cloud-based platform transforming how enterprises manage risk. Its integrated suite of easy-to-use audit, risk, and compliance solutions streamlines internal audit, SOX compliance, controls management, risk management, and security compliance. AuditBoard’s clients range from prominent pre-IPO to Fortune 50 companies

    looking to modernize, simplify, and elevate their functions. AuditBoard is the top-rated audit management and GRC software on G2, and was recently ranked for the second year in a row as one of the 100 fastest-growing technology companies in North America by Deloitte.

  • BeyondTrust
    Booth:

    BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry’s most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

    The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. We are trusted by 20,000 customers, including 78 of the Fortune 100, and a global partner network.

  • BlackBerry
    Booth:

    BlackBerry provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including more than 175M cars on the road today. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security management, encryption, and embedded systems. BlackBerry’s vision is clear—to secure a connected future you can trust.

    BlackBerry. Intelligent Security. Everywhere.

    For more information, visit BlackBerry.com and follow @BlackBerry.

  • BlueVoyant
    Booth:

    At BlueVoyant, we recognize that effective cybersecurity requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem.

    Accuracy. Actionability. Timeliness. Scalability.

  • Check Point Software Technologies Inc.
    Booth:

    Check Point Software Technologies Inc. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Cisco
    Booth:

    Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.

  • Code42
    Booth:

    Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

  • Critical Start
    Booth:

    Critical Start is a cybersecurity company with a holistic, customer-focused approach. We work with our customers to understand the impact of IT on their business and determine the associated risks. Using this risk profile, we can offer big-picture guidance on the strategies and controls that will enable them to effectively manage risk and improve security. Critical Start is 100% employee owned by a team of experts who are passionate about security, quality and service. For more information on what sets us apart, visit criticalstart.com.

  • Cybercrime Support Network
    Booth: N/A

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • Cyral
    Booth:

    Cyral delivers enterprise data security and governance across all data services such as S3, Snowflake, Kafka, MongoDB, Oracle and more.

    The cloud-native service is built on a stateless interception technology that monitors all data endpoint activity in real-time and enables unified visibility, identity federation and granular access controls.

    Cyral automates workflows and enables collaboration between DevOps and Security teams to operationalize assurance and prevent data leakage.

  • Endace
    Booth:

    Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.

  • Expel
    Booth:

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • Security Journey
    Booth:

    HackEDU’s spring 2022 acquisition of Security Journey brings together two powerful platforms to provide application security education for developers and the entire SDLC team. The two officially became one in August 2022 and are now Security Journey. Two platforms, one path to build a security-first development culture.

  • Illumio
    Booth:

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • InGuardians, Inc
    Booth:

    InGuardians, Inc. is an independent information security consulting company providing high-value services. Our specialties include Red Team Penetration Testing, Hardware and Application Security Assessments, Threat Hunting, Security Architecture Reviews, ICS and IIoT Security, Kubernetes and Public Cloud Security, Incident Response, Custom Training, and more.
    InGuardians strives to assemble the best and the brightest minds in information security. Our aim is to channel the collective talents of our team in providing actionable business-focused information security consulting.

    Established in 2003 by industry veterans, InGuardians brings technical experience and business acumen to your projects. Our information security professionals have authored tools, books, testing frameworks, and training programs.

  • Keysight
    Booth:

    Keysight works with innovators to push the boundaries of engineering to design, emulate, test, and deliver breakthrough electronics. Whether you’re looking to improve product experiences, optimize and secure your network, or get a head start on technologies like 5G, 6G, electric or autonomous vehicles, IoT, or quantum, Keysight accelerates innovation with intelligent insights built on the most accurate measurements to reduce risk and speed time-to-market. Forge ahead with confidence knowing your new technologies have been designed and tested for our increasingly connected and dynamic world.

  • Mimecast
    Booth:

    Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector—email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world.

  • Netography
    Booth:

    Netography is the only company that delivers Security for the Atomized Network. In the Atomized Network, applications and data are scattered across a complex environment consisting of multi-cloud, on-premise, and legacy infrastructure, all being accessed by increasingly mobile and remote workers.

    Netography Fusion®, a pure SaaS, universal platform, provides a single view of complete network visibility for real-time and retrospective attack detection across your entire footprint. Empowering enterprises with full visibility and control, Fusion provides custom threat detections, cloud and network visibility, and threat hunting. No hardware, no software, and nothing to deploy–with time-to-value within minutes.

  • Open Systems
    Booth:

    The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. We are deeply passionate about protecting organizations from that storm.

    We provide a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection. And Mission Control, our integrated NOC and SOC, is staffed by experts, not only in threat hunting and cyber hygiene, but also in the proper configuration and maintenance of the Microsoft security stack. So we can leverage what you already own.

    The combination is changing the lives of our customers, giving them security traditionally reserved for only the largest organizations. We give them “shelter from the storm”. That is our passion.

  • Carbonite and Webroot, OpenText Security Solutions
    Booth:

    Carbonite and Webroot, OpenText Security Solutions, provide comprehensive cyber resilience solutions so businesses can stay up and running in the face of cyberattacks and data loss. Together we offer security, data backup and recovery, and threat intelligence services used by leading vendors worldwide. Learn more at carbonite.com and webroot.com.

  • Pentera
    Booth:

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale.

    Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.

  • Proofpoint
    Booth:

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Recorded Future
    Booth:

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • Red Canary
    Booth:

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • ReliaQuest
    Booth:

    ReliaQuest fortifies the world’s most trusted brands against cyber threats with its platform for proactive security model management. Acting as a force multiplier on an organization’s existing cybersecurity investments, only ReliaQuest’s GreyMatter integrates disparate technologies to provide a unified, actionable view that fills the gaps in enterprise security programs.

  • runZero
    Booth:

    runZero provides an asset inventory and network visibility solution that helps organizations find and identify managed and unmanaged assets connected to their networks and in the cloud. Powered by our research-driven model for fingerprinting, runZero can uncover areas of your network you didn’t even know you had. No credentials needed.

  • Team Cymru
    Booth:

    Team Cymru’s mission is to save and improve human lives.  We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.

    Our business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.

    Community Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.

    Since 2005, our reputation remains unchallenged.

  • TechTarget
    Booth: N/A

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tevora
    Booth:

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • Trend Micro
    Booth:

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • UpGuard
    Booth:

    UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.

  • Women in CyberSecurity (WiCyS)
    Booth:

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Instructor: Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law

    Jordan Fischer leads Octillo Law's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

  • speaker photo
    Patrick Massey
    Director, Region 10, DHS Cybersecurity and Infrastructure Security Agency (CISA)

    Patrick Massey serves as the Regional Director of the DHS Cybersecurity and Infrastructure Security Agency (CISA) Region 10 office in Seattle where he is responsible for assisting private and public sector stakeholders enhance the security and resiliency of critical infrastructure facilities in the states of Alaska, Idaho, Oregon, and Washington.

    Prior to joining CISA in 2016, Mr. Massey served for twenty years with the Federal Emergency Management Agency (FEMA) Region 10 office including as the Director, National Preparedness Division, Regional Integration Branch Chief, Technological Hazards Branch Chief, and as a Hazard Mitigation Specialist. In addition, Mr. Massey served in various operational assignments on numerous disasters throughout the country over his career.

    Prior to joining FEMA, Mr. Massey served as the Assistant State Hazard Mitigation Officer with the Illinois Emergency Management Agency and served as a Planner for a Regional Planning Commission in Illinois.

    Trained as a Nuclear, Biological, and Chemical Officer in the United States Army, Mr. Massey served in a tank battalion in West Germany and in the First Gulf War. Mr. Massey holds several professional certifications to include: CISM, CRISC, and CPP and has earned a B.S. in Electrical Engineering Technology, and an M.S. in Environmental Planning from Southern Illinois University, an M.A. in Security Studies from the Naval Postgraduate School, and an M.A. in Strategic Studies from the United States Army War College.

  • speaker photo
    Steven Fox
    Deputy CISO, State of Washington
  • speaker photo
    David Monnier
    Chief Evangelist, Team Cymru

    David has been with Team Cymru since 2007. Prior, he served in the U.S. Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team Cymru, he has been an engineering leader, a Community Services team member, and a security analyst. David led efforts to secure the firm's intelligence infrastructure and established processes the firm relies on today. Currently, David assists CSIRT teams worldwide and fosters data sharing partnerships.

  • speaker photo
    William Lidster, PhD
    CISO, AAA Washington

    William serves as the leader of AAA Washington’s information security and compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.  William has been with AAA Washington since August of 2017. Other roles that William serves in the company includes coordinating business continuity program activities and leading the company through emerging privacy legislation management.

    In the evenings, William instructs graduate and undergraduate cybersecurity courses at the University of Washington and The Penn State University.
    William completed his Bachelor of Science in Computer Science from the US Military Academy at West Point. He subsequently earned a Masters in Management Information Systems and an MBA from the University of Maryland. In December of 2018, he completed his Doctorate of Philosophy in Cybersecurity and Information Assurance from Capella University.

    Prior to William starting at AAA Washington, he served five years as the Manager of IT Security Engineering at Puget Sound Energy. Prior to that he also served as the regional Chief Information Security Officer for Providence Health and Services. He has also served in similar positions with Alaska USA Federal Credit Union, Chugach Electric Association, and the State of Alaska, Department of Public Safety.

    William served in the US Army from 1990 to 1996 as an officer in the Infantry and is a combat veteran for Operation Desert Storm.

  • speaker photo
    Solomon
    Security, Cyral

    Solomon has over 20 years' experience as a security leader at such companies as Microsoft, IBM, VMware, and Facebook.

  • speaker photo
    Kevin Murphy
    Business Information Security Officer (BISO), T-Mobile USA

    Kevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT security certifications.

  • speaker photo
    Chris Hills
    Chief Security Strategist, BeyondTrust

    Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Chief Security Strategist (America’s) working with Customer, Marketing, and Executives on Thought Leadership, Market Trends, Company Vision and Strategy reporting to the CSO. Chris has held the Deputy CTO and Deputy CISO role since starting with BeyondTrust. Chris is also co-author in the recently released Cloud Attack Vectors book. In his free time, Chris enjoys spending time with his family on the water boating, supporting his son’s football career as a senior, going to the sand dunes and offroading.

  • speaker photo
    Roger Brassard
    Sr. Product Manger for Email Threat Protection, Carbonite and Webroot, OpenText Security Solutions

    Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he and his team are focused on quality and efficacy to continuously evolve our Advanced Email Threat Protection and Email Continuity Service solutions, equipping customers and partners with security solutions that are needed in today's continuously evolving threat landscape.

  • speaker photo
    Panel Discussion
  • speaker photo
    Jenifer Clark
    Information Security & Compliance Engineer, Costco Wholesale

    Experienced Information Security Professional with a demonstrated history of working in the retail industry. Skilled in Operations Management, Sales, Management, Point of Sale (POS) / Fuel Systems, and Inventory Control. Strive to find ways information security can enable and support business and operations teams with solutions. Actively support public/private partnerships with local and federal agencies with emphases on infrastructure, cyber security and community outreach.

  • speaker photo
    Panel Discussion
  • speaker photo
    Vanessa Pegueros
    Board Member, Cybersecurity Leader, Angel Investor

    Vanessa is a cybersecurity leader with over 16 years of security experience. She is currently serving on the Board of Carbon Black (CBLK) and BECU. She also is a venture partner with Flying Fish Partners in Seattle. Vanessa formally worked as the CISO at DocuSign and successfully managed through hyper growth and an IPO in 2018. She also was the SVP of Enterprise Security at US Bank, CISO at Expedia, and has held senior level security roles with Washington Mutual, Cingular, and AT&T Wireless. She has held numerous other roles specifically within the wireless arena, including Network Planning, Architecture & Engineering, Technical Sales, and Product Development.

    She has an MBA from Stanford University, an MS in Telecommunication from the University of Colorado, and a BS in Engineering from UC Berkeley. She holds GSEC, CRISC, CISM, and CISSP security certifications, as well as the Certified Information Privacy Professional Europe (CIPP/E) privacy certification.

  • speaker photo
    Instructor: Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law

    Jordan Fischer leads Octillo Law's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

  • speaker photo
    Instructor: Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law

    Jordan Fischer leads Octillo Law's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Bruce Lobree
    Security & Privacy Information Systems Leader, Philips

    Bruce Lobree has participated in and managed technical security, technical architecture, audit and consulting, teams as a first level manager up to having Global responsibilities at an executive level managing multi-million programs. He has working experience in government, retail, financial, software and utility industries generating cost effective, client focused security solutions, operational models and programs to meet corporate and regulatory requirements. This has included architecting, designing, individually implementing or managing the implementation of physical and logical security systems and controls for reliability and availability. These programs have dealt with implementing various industry standards and regulatory requirements including HIPAA, SOX, PCI, GLBA and ISO 270001 and other National and International control standards. He has also authored books and taught at the University level.

  • speaker photo
    Kurt Hagerman
    Field CISO, Oracle

    Kurt Hagerman is a Field CISO in the North American Cloud Engineering group for Oracle. In this role, he provides cloud security advisory services in support Oracle Cloud Infrastructure and other Oracle cloud-based solutions and applications to C-level executives across multiple industry verticals.

    Prior to Oracle, Kurt served as a CxO Advisor, Cyber Strategy at Coalfire. In this role, he provided strategic cybersecurity advisory services in support of C-level executives of Coalfire customers across multiple industry verticals with a specialization in cloud security strategy. Before Coalfire, Kurt was the Chief Information Security Officer for Armor, a cloud security company, for six years. He stood up Armor’s security and privacy programs including a coordinated compliance program encompassing PCI, HITRUST/HIPAA, SOC 2, ISO 27001, and GDPR.

    Over his 30-year career, Kurt has held a wide range of positions encompassing many IT and security disciplines and has conducted hundreds of security reviews and audits across several industries including the payment space, healthcare, financial services, and higher education. He has spoken and written on information security topics covering cloud security and the payments and health care spaces.

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Janet Rae
    Sr. Sales Engineer, Pentera

    Janet joined Pentera in 2022 and has been in sales engineering roles with various network and data security vendors for the last 20 years.

  • speaker photo
    Aryan Taheri
    CEH, Principal Architect, Cybersecurity, T-Mobile USA

    Aryan is highly unorthodox and has been a key contributor on multiple disruptive efforts including BI Retail Dashboards, Managing & Security Mobile Point of Sale Tablets, and SLT devices. He's created T-Mobile's Zero Trust Strategy, and more recently has been tapped to join a select tiger team to deliver MFA Everywhere for Retail.

  • speaker photo
    Panel Discussion
  • speaker photo
    Yanek Korff
    Chief of Staff and Co-Founder, Expel

    Yanek Korff has served in information technology or security roles for over 20 years. Starting out as a student help desk tech in a musty library basement in college he is now co-founder and Chief of Staff at Expel, a DC-area cybersecurity company that makes security easy to understand, use, and continuously improve.

    Yanek began his professional career as a systems administrator at Bell Atlantic and then Cigital. He moved on to Aol where he transitioned into a management role and eventually became responsible for much of Aol’s security infrastructure. In 2010, he joined Mandiant to build a new managed services business line to help customers mitigate the impact of security breaches conducted by state-sponsored attackers.

    Yanek graduated with a Computer Science degree from William and Mary, a Masters in the Management of Information Technology from the McIntire School of Commerce at the University of Virginia and was the principal author for Mastering FreeBSD and OpenBSD Security, published by O’Reilly.

    Yanek lives with his family in Vienna, Virginia with three dogs and as many fish and corals as he can fit into a 300 gallon saltwater aquarium. When he’s not fully engaged with Expel business, he’s likely on vacation or playing video games. Because he’s apparently still ten years old on the inside.

  • speaker photo
    Sam Straka
    Sr. Product Manager, Red Canary
  • speaker photo
    Panel Discussion
  • speaker photo
    Michael Bray
    CISO, Vancouver Clinic
  • speaker photo
    Janet Lawless
    CEO & Founder, Center for Threat Intelligence

    Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge holistic threat intelligence program including assessments, consulting and training. Janet’s former leadership roles at Microsoft and Cisco, creating and managing global programs focused on compliance and security, in addition to her work at a cyber-security start-up, brings a wealth of knowledge in security services. Janet is currently the Chair for ASIS International Puget Sound Chapter, and former Committee Chair for Women in Security. She is Chair Emeritus for the Pacific Coast Analyst Roundtable and a former Board Member for the American Red Cross. She is also a member of InfraGard, the United States Secret Service Cyber Fraud Task Force and the Washington State Fusion Center.

  • speaker photo
    Instructor: Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law

    Jordan Fischer leads Octillo Law's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
INVEST IN YOUR GROWTH!

Join us for high-quality, affordable cybersecurity training and networking. Sign up today!