googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 14, 2022
    12:00 pm
    [PLUS Course] CIS Top 18 Critical Controls
    • session level icon
    speaker photo
    Adjunct Professor, Cybersecurity, Washington University in St. Louis
    Registration Level:
    • session level iconSecureWorld Plus
    12:00 pm - 2:00 pm
    Location / Room: Room 105

    An in-depth review of the top 18 security controls from the Center for Internet Security (CIS): https://www.cisecurity.org/controls

    Two-hour course offering two CPE credits. Purchase a PLUS Pass for $400, which includes full conference access (Conference Pass).

    Learning Objectives:

    • Understanding the CIS Critical Security Controls and Maturity levels
    • Understanding how to self-assess your Cybersecurity Maturity Baseline
    • Understanding how to define your Cybersecurity Maturity roadmap
    • The hidden benefits of Cybersecurity Maturity Metrics
  • Thursday, September 15, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:30 pm
    Location / Room: Registration Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    InfraGard Chapter Meeting [Open to all attendees]
    • session level icon
    Special screening of the FBI film "Made in Beijing"
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: Keynote Theater

    Chapter meeting will include a screening of the FBI film, “Made in Beijing: The Plan for Global Market Domination.” More details to come.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    speaker photo
    Sr. Lead, Global Cybersecurity Services, Mars
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: Room 105

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:00 am
    [Breakfast Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    speaker photo
    Cybersecurity Specialist, Missouri Information Analysis Center, Missouri Office of Homeland Security
    speaker photo
    Assistant to the Special Agent in Charge, United States Secret Service - St. Louis Field Office
    speaker photo
    VP, Chief Information Security Officer, Sound Physicians
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    How to Build an Effective Security Awareness Program
    • session level icon
    speaker photo
    Manager, Cybersecurity Engineering, Leonardo DRS
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Room 230
    10:15 am
    [Panel] The Current Threat Landscape
    • session level icon
    speaker photo
    Sr. Product Marketing Manager, Automox
    speaker photo
    Sr. Product Manager – Email Threat Protection, OpenText Cybersecurity
    speaker photo
    Director, Threat Research & Intelligence, Proofpoint
    speaker photo
    Sr. Security Consultant, Critical Start
    speaker photo
    Systems Engineer, https://www.linkedin.com/in/askiahowell/
    speaker photo
    Instructor - Cybersecurity, Webster University
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Room 240

    If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?

    It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.

    10:15 am
    Threat Analysis Report: LockBit 2.0 - 3.0 — All Paths Lead to Ransom
    • session level icon
    speaker photo
    Channel Sales Engineer, Cybereason
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Room 231

    A deep dive into the tools and techniques utilized in specific case studies involving the Lockbit ransomware group. A general discussion around the current state of ransomware with a focus on Lockbit; advanced techniques being utilized, data exfiltration, data extortion, and evolving tools. Suggestions for defensive stance, next steps for ransomware protection, and resources to stay informed and up to date.

    11:10 am
    Cybersecurity Insurance: Have You Thought About…
    • session level icon
    speaker photo
    CISO | Manager, IT Operations, Missouri Employers Mutual
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Room 241
    11:10 am
    The Coming Cyberspace Cold War with Russia
    • session level icon
    speaker photo
    Chief Security Advisor, SentinelOne
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Room 231

    There’s a very good reason Russia has not deployed their latest cyber weapons against Ukraine. They’re saving them for the United States in what may be the beginning of a modern cold war played out in cyberspace. NATO has declared cyber to be an operational domain, and subject to Article 5 in case of a “massive” cyber attack. But what does “massive” mean? Russia will play the fringes in the gray space of policy to conduct low-intensity warfare, using their tools and tactics refined against adversaries like Ukraine. The result? Unrestricted warfare against our critical infrastructure, espionage operations targeting the software supply chain, and new cyberweapons.

    12:00 pm
    [Lunch Keynote] Demystifying Zero Trust and Its Role in Cybersecurity
    • session level icon
    speaker photo
    Cyber Hero, ThreatLocker
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.

    12:00 pm
    Advisory Council Roundtable Lunch – (VIP / Invite Only)
    • session level icon
    Reporting to the Board from an InfoSec POV
    speaker photo
    Adjunct Professor, Cybersecurity, Washington University in St. Louis
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Room 105

    Roundtable discussion moderated by Andrew Wilder. For Advisory Council members only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    [Panel] Cloud: Doing More with Less
    • session level icon
    speaker photo
    Senior Regional Security Principal, Insight
    speaker photo
    Head of Research, Threat Intelligence Division, Radware
    speaker photo
    Principal Architect, Sales Engineering, Imperva
    speaker photo
    Vice President of Security, Code42
    speaker photo
    CISO, Navvis Healthcare
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Room 240

    The cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.

    1:15 pm
    [Panel] Incident Response!
    • session level icon
    speaker photo
    Service Sales Manager, BlackBerry
    speaker photo
    Director, Incident Response, Semperis
    speaker photo
    Senior Sales Engineer, Mimecast
    speaker photo
    SVP of Engineering, Fastly
    speaker photo
    Director, Security Operations, NTP
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    Security teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.

    2:30 pm
    Nature of Hybrid Workforce CISO Panel
    • session level icon
    speaker photo
    Sr. Director, BISO, Equifax
    speaker photo
    CISO, Navvis Healthcare
    speaker photo
    SVP, Information Security, CitiBank
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Room 240
    2:30 pm
    How Cybersecurity Is Helping Solve Business Problems
    • session level icon
    speaker photo
    CISO, Veterans United Home Loans
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Room 230
    Budgets are tight, attackers are plentiful. What’s a cybersecurity professional to do in these challenging times? We will talk about where cybersecurity started and how we got to this point in history. Then we will talk about how cybersecurity professionals are working to solving business problems. When you come to this session, be prepared to share one quick story of how you have helped solve a business problem at your organization. Let’s share and learn from each other!
    3:15 pm
    Happy Hour & Casino
    • session level icon
    Sponsored by Automox, Keysight, and Critical Start
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:30 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beer, wine, and soda. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    Enjoy the competitive fun at blackjack and craps tables!

    Generously sponsored by:

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [Closing Panel] Demystifying Cybersecurity in the Boardroom
    • session level icon
    speaker photo
    Associate CISO, Washington University in St. Louis
    speaker photo
    VP & CISO, Quickbase
    speaker photo
    CISO, Forrest T. Jones & Company
    speaker photo
    Director, IT Security, Caleres, Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Keynote Theater

    Have you ever walked into your company’s board room to give an update and feel like you’re speaking a different language? You probably are–to them. Unfortunately, this is a common occurrence many cybersecurity professionals face along with their day-to-day InfoSec tasks and challenges. Join us for a panel discussion where local InfoSec leaders will share their experiences reporting to the board, different tactics they’ve used that have been successful when communicating risk, and tips for making your security team stand out amongst other business units. Open to all levels of professionals.

Exhibitors
  • ACFE St. Louis Chapter
    Booth: N/A

    The Greater St. Louis Area Chapter was formed in 2002. A group of local area CFE’s petitioned the National ACFE Headquarters with an official request for chapter designation. The National ACFE organization granted the request. The Greater St. Louis Area Chapter #105 became incorporated in March 2003. Our chapter consists of fraud detection and prevention professionals in the St. Louis area. While many of our members hold the Certified Fraud Examiner (CFE) designation, it certainly is not a requirement for chapter membership. We welcome anyone who works in the field or is interested in fraud investigation and prevention. The ACFE is the world’s largest anti-fraud organization and premier provider of anti-fraud training and education. Together with more than 85,000 members, the ACFE is reducing business fraud worldwide and inspiring public confidence in the integrity and objectivity within the profession.

  • Arctic Wolf Networks
    Booth: 710

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Armis, Inc
    Booth: 400

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Automox
    Booth: 750

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • BlackBerry Corporation
    Booth: 740

    BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.

  • Code42
    Booth: 320

    Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

  • Critical Start
    Booth: 230

    Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.

  • Cybereason
    Booth: 620

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • CyberUp
    Booth: N/A

    Our mission is to close the cybersecurity skills gap by training the workforce of today and inspiring the workforce of tomorrow.

  • Fastly
    Booth: 510

    Expectations for websites and apps are at an all-time high. If they aren’t fast, secure, and highly personalized, users take their business elsewhere. But today’s most innovative companies are thriving by meeting this challenge head on: they’re choosing Fastly and an investment in their developers.

    With Fastly’s powerful edge cloud platform, developers get the tools they need to build the most groundbreaking apps — all optimized for speed, security, and scale — so businesses can effectively transform to compete in today’s markets. Together, we’re building the future of the web.

  • Gateway Cyber Fraud Task Force (CFTF)
    Booth: N/A

    Cyber Fraud Task Forces (CFTFs), the focal point of U.S. Secret Service cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • Imperva
    Booth: 520

    Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.

  • InfraGard St. Louis
    Booth: 700

    InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.

  • Insight
    Booth: 130

    Insight is a comprehensive solutions integrator that helps organizations transform technology, operations, and service delivery to meet challenges and future-proof the business. With a client-focused approach to delivery, we recommend the most appropriate solutions to drive digital transformation and modernization for innovation. As clients look for ways to optimize data for better business, empower speed and scale of service, and drive next-gen security, Insight delivers expertise that is grounded, unbiased, and refreshingly straightforward.

  • ISC2 St. Louis Chapter
    Booth: 310

    As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.

  • Keysight
    Booth: 110

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Mimecast
    Booth: 330

    Mimecast empowers our customers to help mitigate risk and manage complexities across a threat landscape driven by cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.

  • Okta
    Booth: 600

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Carbonite and Webroot, OpenText Security Solutions
    Booth: 120

    Carbonite and Webroot, OpenText Security Solutions, provide comprehensive cyber resilience solutions so businesses can stay up and running in the face of cyberattacks and data loss. Together we offer security, data backup and recovery, and threat intelligence services used by leading vendors worldwide. Learn more at carbonite.com and webroot.com.

  • Palo Alto Networks
    Booth: 100

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Proofpoint
    Booth: 410

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Radware
    Booth: 730

    Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.

  • Recorded Future
    Booth: 140

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • Red Canary
    Booth: 530

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • RiskRecon
    Booth: 720

    RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
    easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
    solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
    enabling organizations to efficiently operate scalable, third-party risk management programs for
    dramatically better risk outcomes. Request a demo to learn more about our solution.

  • Semperis
    Booth: 220

    Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

  • SentinelOne
    Booth: 210

    SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.

  • Sonatype
    Booth: 300

    Every day, developers rely on millions of third party and open source building blocks – known as components – to build the software that runs our world. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations don’t have to make the tradeoff between going fast and being secure. More than 120,000 organizations use Sonatype’s Nexus solutions to support agile, Continuous Delivery, and DevOps practices globally

  • Saint Louis University Workforce Center
    Booth: 500

    The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber SecurityProject ManagementAgileAnalyticsSoftware Engineering and more.

  • TechTarget
    Booth: N/A

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: 630

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS St. Louis Metropolitan Affiliate
    Booth: 610
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Andrew Wilder, Moderator
    Adjunct Professor, Cybersecurity, Washington University in St. Louis

    Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.

  • speaker photo
    Brian Lourie, Moderator
    Sr. Lead, Global Cybersecurity Services, Mars

    Brian Lourie is a Business Information Security Senior Lead for Mars. He supports a wide variety of business units like Mars Wrigley, Kind, VetSource and Blue Pearl to name a few. Prior to joining Mars, Brian spent 20 years with General Electric as the Global DR Leader for GE Capital RE and running their VM program. He spent five years as a board member on the St. Louis Scott/AirForce ISC2 regional chapter and was president for three of those years. Brian is also a member of Infragard and the St. Louis FBI citizens academy.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Angela Robinson
    Cybersecurity Specialist, Missouri Information Analysis Center, Missouri Office of Homeland Security
  • speaker photo
    Brian Cockrill
    Assistant to the Special Agent in Charge, United States Secret Service - St. Louis Field Office

    I have been with the Secret Service for 20 years and am currently assigned to the St. Louis Field Office where I manage our cyber-enabled financial crime investigations and Gateway Cyber Fraud Task Force (CFTF). CFTFs are the focal point of Secret Service cyber-investigative efforts and were developed to increase the resources, skills, and vision by which state, local, and federal law enforcement agencies partner with prosecutors, private industry and academia to optimize a unified effort to combat cybercrime and enhance cyber-attack responses.

    In this role, I coordinate Secret Service-sponsored cybercrime training for our state and local task force officers and direct the joint operations budget that supports task force operations. I’m also responsible for coordinating CFTF outreach events which bring together our law enforcement and public and private sector partners for information sharing and training.

    Prior to this assignment, I served on the Presidential Protective Division in Washington, DC. In this capacity, I lead advance teams in building the physical security plans for foreign and domestic trips of the First Family.

  • speaker photo
    Moderator: Jericho Simmons, CISM
    VP, Chief Information Security Officer, Sound Physicians

    Jericho has provided technology and security services within the education, government and healthcare industries for the last 19 years.

    His aspiration is to shift the mindsets of people to “Security in Practice”. Which in turn will significantly reduce the distraction of malicious actors so the organization may focus on positive business outcomes.

    “Start with People – Wisdom, Understanding, Counsel, Strength and Knowledge are critical to make an impact”

  • speaker photo
    Diego Maldonado
    Manager, Cybersecurity Engineering, Leonardo DRS

    Cybersecurity professional with over 30 years of experience with the U.S. Naval Service, Federal Civil Service serving in several roles as an IT Specialist, Information Systems Security Program Manager, Chief Information Security Officer (CISO) and Privacy Officer; In the Commercial space with IBM, The Newberry Group and other technology related companies in various roles covering the Program and Project Management, Datacenter operations, Network & Systems Engineering & Integration, Research & Development.
    Currently serving as Manager Cybersecurity engineering @Leonardo DRS supporting the U.S. Defense industry in the engineering, integration, testing and delivery of cybersecurity compliant solutions.
    Diego is Project Management and CISSP credentialed.

  • speaker photo
    Gina Geisel
    Sr. Product Marketing Manager, Automox

    Gina is a Product Marketing Manager at Automox with over 20 years' experience in cybersecurity, endpoint management, and data storage. Gina develops messaging and content that resonates directly with our customers' challenges and is constantly seeking new ways to communicate how technology can make their lives easier.

  • speaker photo
    Roger Brassard
    Sr. Product Manager – Email Threat Protection, OpenText Cybersecurity

    Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he and his team are focused on quality and efficacy to continuously evolve our Advanced Email Threat Protection and Email Continuity Service solutions, equipping customers and partners with security solutions that are needed in today's continuously evolving threat landscape.

  • speaker photo
    Wesley Drone
    Director, Threat Research & Intelligence, Proofpoint
  • speaker photo
    Brian Roye
    Sr. Security Consultant, Critical Start

    Cybersecurity professional with 20+ years of experience in solutioning and supporting across operations, client delivery, architecture, sales engineering, and management. Focus has been around security services, especially managed services and consulting as delivered from the provider. Experiences in working with clients from all industries and organizational sizes spanning small, medium, and enterprise. Currently, leveraging skills and knowledge as a Senior Security Consultant at Critical Start in support of client pre-sales technical solution and design needs, with an emphasis on Managed Detection and Response services.

  • speaker photo
    Askia Howell
    Systems Engineer, https://www.linkedin.com/in/askiahowell/

    Before joining Palo Alto Networks, Askia graduated from MIT with a Bachelor's in Electrical Engineering in 2004. Since then, Askia has executed roles as an Account Manager, Sales Engineer, Systems Engineer, and a Consultant. Askia is an IEEE Member, CISSP certified since 2015, and has earned several technical certifications from multiple manufacturers including Palo Alto Networks, Cisco, HPE/Aruba, and Brocade.

    As a bootstrapped founder of his consulting company in 2013, Askia led a team that built and secured Next Generation Networks and Zero Trust Networks by integrating multiple technologies for a variety of public and private organizations across the United States.

    In his personal time, Askia enjoys spending time with his wife and children, watching or playing sports, and fishing.

  • speaker photo
    Doug Menendez, Moderator
    Instructor - Cybersecurity, Webster University

    After retiring in 2019 with nearly 40 years of industry experience, Doug joined the faculty at Webster University as a fulltime instructor in Webster’s National Center of Academic Excellence in Cyber Defense (CAE-CD).

    Doug is a dedicated teaching professional with demonstrated success in on-line, hybrid and in-person classroom techniques using a variety of delivery modalities. Working to promote diversity, equity and inclusion in the cybersecurity space and committed to providing a powerful, transformative student experience. Passionately advancing the next generation of cybersecurity, IT audit and risk management professionals.

    He is on the Board of Directors of CyberUp, A St. Louis-based nonprofit organization that focuses on cybersecurity apprenticeships and youth education programs. Doug is also on the Executive Committee of GHECC, the Gateway Higher Education Cybersecurity Consortium. He holds an MBA from Saint Louis University, and is a Certified Internal Auditor (CIA) and Certified Information Systems Auditor (CISA).

  • speaker photo
    Adam Gates
    Channel Sales Engineer, Cybereason

    With over 25 years of experience in technology, Adam Gates serves as a technical member of Cybereason Sales Engineering Team providing support for customers and partners in North America. Prior to Cybereason, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, Malwarebytes, and Mimecast. Adam lives in Dallas, TX, with his teenage son and squirrel obsessed Golden Retriever who has 28 dog years in perimeter security experience.

  • speaker photo
    Tim Myers
    CISO | Manager, IT Operations, Missouri Employers Mutual

    Tim is currently serving as the CISO and IT Operations Manager at Missouri Employers Mutual. He is a seasoned professional with over 25 years’ experience in the Security and IT Operations space. His experience includes roles in the energy sector, consulting, wholesale/retail, and the insurance industry. Tim is a proponent of a defense in depth strategy that starts with a standard that is relevant to your industry. He is active in his local cyber security peer group and in the St Louis Cybersecurity Collaboration Forum.

  • speaker photo
    Morgan Wright
    Chief Security Advisor, SentinelOne

    Morgan is an internationally recognized expert on cybersecurity strategy, cyberterrorism, national security and intelligence. He currently serves as Chief Security Advisor for SentinelOne, Senior Fellow at The Center for Digital Government, and is the chief technology analyst for Fox News and Fox Business. Morgan's landmark testimony before Congress on Healthcare.gov changed how the government collected personally identifiable information. Previously Morgan was a Senior Advisor in the US State Department Antiterrorism Assistance Program, the Senior Law Enforcement Advisor for the 2012 Republican National Convention, taught behavioral analysis at the National Security Agency and spent a year teaching the FBI how to conduct internet investigations. In addition to 18 years in state and local law enforcement as a highly decorated state trooper and detective, Morgan has developed solutions in defense, justice and intelligence for the largest technology companies in the world including Cisco, SAIC, Unisys and Alcatel-Lucent/Bell Labs.

  • speaker photo
    Chad Maskill
    Cyber Hero, ThreatLocker

    Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infinity Ward, as well as numerous municipalities throughout the U.S. and countless SMBs. Previously, he worked with local government in designing and sourcing emergency apparatus and can still parallel park a Ladder Truck.

  • speaker photo
    Andrew Wilder, Moderator
    Adjunct Professor, Cybersecurity, Washington University in St. Louis

    Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.

  • speaker photo
    Mark Hickey
    Senior Regional Security Principal, Insight
  • speaker photo
    Daniel Smith
    Head of Research, Threat Intelligence Division, Radware

    Daniel is the Head of Research for Radware’s Threat Intelligence division. He helps produce actionable intelligence to protect against botnet-related threats by working behind the scenes to identify network and application-based vulnerabilities. Daniel brings over ten years of experience to the Radware Threat Intelligence division. Before joining, Daniel was a member of Radware’s Emergency Response Team (ERT-SOC), where he applied his unique expertise and intimate knowledge of threat actors’ tactics, techniques, and procedures to help develop signatures and mitigate attacks proactively for customers.

  • speaker photo
    Luke Babarinde
    Principal Architect, Sales Engineering, Imperva

    Luke Babarinde is a Principal Solutions Architect at Imperva with over 15 years of experience in cybersecurity. He is passionate about building effective solutions to assist organizations seeking to holistically address data challenges of which security is critical.

  • speaker photo
    Tommy Todd
    Vice President of Security, Code42

    Tommy Todd is Vice President of Security at Code42 with over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, Tommy served in security roles at Symantec, Ionic Security, and Optiv, as well as many other firms. Throughout his career, he has acted as a leader, mentor, engineer, architect, and consultant to solve difficult data protection challenges. Tommy is passionate about data—both consumer and commercial—and strives to improve the security posture in organizations he works with.

  • speaker photo
    Montez Fitzpatrick
    CISO, Navvis Healthcare

    Montez is Chief Information Security Officer at Navvis Healthcare. With nearly two decades of cybersecurity experience, Montez has worked across numerous industries including healthcare, finance, gaming, and non-profit. Montez also helps shape young minds coming up as the next generation of cybersecurity experts through public speaking and community outreach.

  • speaker photo
    Gregg Yurchak
    Service Sales Manager, BlackBerry
  • speaker photo
    Jeff Wichman
    Director, Incident Response, Semperis

    Jeff Wichman has over 20 years of experience in information security, primarily focused on the Digital Forensics and Incident Response (DFIR) lifecycle. He has worked hundreds of incident response investigations, from relatively small business email compromises (BEC) to large-scale ransomware incidents.

  • speaker photo
    Brad Allen
    Senior Sales Engineer, Mimecast

    Brad has been married to his wife Mary for 17 years, and they have three boys: Carter age 15, Sam age 13, and Miles age 11. Brad and his family are an adventurous bunch, having flown and camped all over the US and several other countries as they love to travel and experience other cultures. Brad’s love for travel started when he joined the U.S. Air Force in 1999, where he was stationed in Aviano, Italy, for 3.5 years, and in Sembach, Germany, for 1.5 years. He has over 20 years of experience working in just about every facet of the IT field, and he’s excited to open a new chapter in his career by joining Mimecast as a sales engineer.

  • speaker photo
    Laura Thomson
    SVP of Engineering, Fastly

    Laura Thomson is the vice president of engineering at Fastly, makers of an edge cloud platform. She ended up in this position after a 12-plus-year stint at Mozilla, where she rose through the ranks and ended up as the senior director of engineering for Firefox engineering operations. She also worked as a lecturer at RMIT University and co-founded a web design agency, where she worked for eight years. Laura has written several best-selling software development books and is on the board of trustees at the Internet Society.

  • speaker photo
    Matt Fagala, Moderator
    Director, Security Operations, NTP

    Matt Fagala has over 20 years of experience in IT Operations. The majority of his career has been spent working for financial institutions and small to medium sized businesses in the St. Louis region. Like many, his career started at an early age with an interest in computer games and tinkering with computer hardware. After starting his first technical support role in college, he quickly moved on to engineering roles and eventually into cyber security. In recent years his passion has been defending small to midsize organizations and their staff from attacks. Matt believes in both continuous awareness training and an ever evolving layered defense strategy to meet the needs of the quickly evolving attack surface of today's organizations.

    Matt is the Director of Security Operations at NTP Cyber Security where he manages the Security Operations Center team. NTP utilizes their custom designed ARGISS platform to offer a range of managed security services to organizations nationwide.

  • speaker photo
    Michelle Sickbert
    Sr. Director, BISO, Equifax

    Michelle is the Business Information Security Officer.

  • speaker photo
    Montez Fitzpatrick
    CISO, Navvis Healthcare

    Montez is Chief Information Security Officer at Navvis Healthcare. With nearly two decades of cybersecurity experience, Montez has worked across numerous industries including healthcare, finance, gaming, and non-profit. Montez also helps shape young minds coming up as the next generation of cybersecurity experts through public speaking and community outreach.

  • speaker photo
    John Newcomer
    SVP, Information Security, CitiBank

    John Newcomer is currently Senior Vice President of Information Security at CitiBank, a top-10 national mortgage lender. He has eight years of experience in the information security field, with 17 years prior in IT.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Happy Hour
  • speaker photo
    Kevin Hardcastle
    Associate CISO, Washington University in St. Louis

    Kevin Hardcastle, Chief Information Security Officer (CISO) for Washington University in St. Louis, is a member of the CIO Leadership team and serves a key role in University leadership, working closely with senior administration, academic leaders and the campus community. The CISO is responsible for the development and delivery of a holistic information security strategy to optimize the security posture through collaboration with campus-wide resources, facilitate information security governance, advise senior leadership on security direction and direct program functions of risk and incident management, compliance, information security operations, and information security policy development and education.

  • speaker photo
    Rebecca Harness
    VP & CISO, Quickbase

    Rebecca Harness is VP & Chief Information Security Officer for Quickbase. Rebecca has an established 25-year career in information technology with the past twelve years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technology startups over the course of her career, and serves as President of ISACA St. Louis. Rebecca is an alumnus of Hastings College, holds several technology and security certifications, and recently received a Master of Science in Information Security Engineering (MSISE) from SANS Technology Institute.

  • speaker photo
    Shawn Heckmaster
    CISO, Forrest T. Jones & Company

    Shawn Heckmaster, Chief Information Security Officer for Forrest T. Jones & Company in Kansas City, MO has over 30 years of progressive information technology and security experience. He has worked across multiple private and government sectors, from the Department of the Army, Department of Defense, Black & Veatch and the Jones family of companies. He is experienced in security program establishment and building, with focuses on ISO, FedRAMP, NIST, Insider Threat Program Management and Third Party Vendor Management.

  • speaker photo
    Tami Spellman, Moderator
    Director, IT Security, Caleres, Inc.

    Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes