Click here to view registration types and pricing (PDF)
2017 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, September 5, 2017
    9:00 am
    SecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    SecureWorld PLUS registrants ONLY
    speaker photo
    CISO, Pulte Financial Services
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Lakeshore C

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.

  • Wednesday, September 6, 2017
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Advisory Council Breakfast: Security Risks in the IoT Ecosystem - (VIP / INVITE ONLY)
    • session level icon
    Coffee / Breakfast Served
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: Loring
    8:30 am
    RSA: Evolved Requirements: A Business-Driven Security Strategy for Threat Detection & Response
    • session level icon
    speaker photo
    Field CTO, RSA
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Lakeshore C

    Security teams need to evolve to defend against the latest threats. Attackers continue to advance with sophisticated techniques to target and infiltrate organizations. They are evading preventative measures and infiltrating our perimeter-less infrastructures. In parallel, security teams suffer from a skills gap, and adding more and more security tools only adds to the noise for the limited staff trying to find truly significant attacks. Given these challenges, organizations must shift focus from preventative controls that promise to keep the bad guys out to an increased focus on rapid detection and response. To reduce the impact of attacks, security operations need to tie critical asset and identity information into both the detection and response capabilities—focusing their efforts on the threats that matter most.

    8:30 am
    Learn How Behavior Monitoring Can Help Detect the Secret Attack
    • session level icon
    speaker photo
    Chief Information Security Officer, Allianz Life
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Lakeshore B

    Monitoring behavior is something done in many aspects of life to detect when someone is acting "strange". In this session you will hear about how base-lining and monitoring system and user activity can provide indication of a potential secret attack.

    8:30 am
    When the Levee Breaks – Fixing the Foundations of Your Information Security Program Before the Flood
    • session level icon
    speaker photo
    VP & BISO, US Bank
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Keynote Theater

    This presentation will discuss what many of us in our profession consider the basic building blocks of an effective security program, in addition examining how current technologies can help create the stronger foundation all of us are seeking.

    8:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    This is the time to visit exhibitors participating in Dash For Prizes & CyberHunt for your chance to win prizes!

    9:30 am
    OPENING KEYNOTE: The Evolving Role of CISOs and Their Importance to the Business
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    What is a CISO and what do they do? As the leader of cyber defense for an organization, the CISO is rapidly becoming indispensable for an organization’s survival. This presentation is based on interviews with senior level IT professionals at 184 companies in seven countries. The goal of the research is to better understand how CISOs work, what their concerns are, and how they are improving their effectiveness in managing risks to the enterprise.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable: Ransomware - Breaking the Criminal Business Model – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Lakeshore C
    11:15 am
    The Dreaded Embedded
    • session level icon
    Examining issues with Med Devices and how we deal with them as part of an information security program.
    speaker photo
    VP & CISO, Fairview Health Services
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Keynote Theater

    How do you make an inanimate object “smart”? You put a chip in it, and then you connect it to the global internet! These chips run what is typically called an embedded operating system – a Windows, unix or Linux variant, or something custom made. Because these chips are embedded in power grid equipment, medical equipment, appliances or even people, updates and patches are problematic. The Internet of Things (IoT) is growing at a rate 10-times that of standard computers. A typical hospital/clinic system may have 4-5 times as many smart connected medical devices as computers. The Dreaded Embedded refers to the proliferation of vulnerabilities associated with these devices. What are the security and privacy concerns of these devices? What about FDA and other regulatory compliance? And how do we deal with these devices as part of an information security program?

    11:15 am
    Trend Micro: Endpoint is Not the Only Battleground
    • session level icon
    speaker photo
    Principal Engineer, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Lakeshore B

    We have seen extensive growth in protection capabilities at the endpoint but is that enough? In this session, we will discuss the terminology of “next generation” and explore true end-to-end threat intelligence, how machine learning is applicable, and what it truly means to create a Defense in Depth plan so that internal teams work together to provide a holistic approach to maintain a defensible environment.

    11:15 am
    Wombat: State of the Phish: Understanding End User Behaviors Towards Phishing
    • session level icon
    speaker photo
    Chief Architect, Wombat Security Technologies
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Lakeshore A

    Hear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves and, learn about the most devastating types of phishing emails used and how to prevent them.

    12:15 pm
    LUNCH KEYNOTE: Where Crime-as-a-Service Meets Internet Safety
    • session level icon
    We need to think differently as the Internet of Things creates physical safety issues.
    speaker photo
    EVP & CISO, U.S. Bank
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    Organized crime has reached legendary levels of organization and funding. The business model for ransomware has become extremely popular, but has also had some unintended consequences as malware hit the "Internet of Things." Learn more about the shift we're starting to see towards discussing Internet Safety vs. Internet Security.

    1:15 pm
    Panel: Hazards on the Horizon - Emerging Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Lakeshore A

    Just as in the days of yore, you must have watch guards in the tower scanning the horizon for enemy banners. If you follow cyber threats, then you know that the landscape is constantly changing. From the bring your own device (BYOD) workplace to mobile-malware, social engineering, and everything in between, information security has transformed. In order stay ahead of the ever-changing threats, it is imperative to constantly improve and change security policies. Join industry experts as they discuss the importance of rolling with the changes, and how your company can stop the threat before it gets to the castle gate.
    Panelists:
    Ed Cabrera, Trend Micro
    Kevin Peterson, Zscaler
    Joe Hermes, F5
    Jonathon Lange, baramundi
    Moderator: Skip Hansen

    1:15 pm
    Panel: Manage the Damage - Incident Response
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    Every week we learn about some business, government entity, bank, or healthcare entity in the news that has been hacked. Often times the intruders had been sitting collecting information for months before being discovered. Now more than ever it is crucial for organizations to develop, practice, and fine tune their incident response plans. When do you get law enforcement involved? What about the legal team or PR? Will your busin Wescoeess recover? This panel discussion will tackle these issues as well as your questions on what you need to know after the hack.
    Panelists:
    Kurt Wescoe, Wombat
    Laura MacDonald, RSA
    Daniell Taylor, Schwan's
    Moderator: Milinda Rambel Stone

    1:15 pm
    Darktrace: The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
    • session level icon
    AI for Cyber Defense: That Machine Fights Back
    speaker photo
    Cyber Security Account Executive, Darktrace
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Lakeshore B

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.

    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

    Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.

    In this session, learn:
    • How new machine learning and mathematics are automating advanced cyber defense
    • Why 100% network visibility allows you to detect threats as they happen, or before they happen
    • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
    • Real-world examples of unknown threats detected by ‘immune system’ technology

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win.

    3:00 pm
    baramundi Software: Automating Endpoint Management: Patching, Deployment and System Building Made Easy
    • session level icon
    speaker photo
    Executive Manager, baramundi Software USA
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Lakeshore B

    With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network.

    3:00 pm
    GDPR – End-to-End Impact
    • session level icon
    speaker photo
    Chief Information, Security and Risk Officer CRISC/CIPP/E/DPO/CISO/MBCP, Digital River
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Lakeshore A

    Review of how GDPR will impact day-to-day operations and the support service. Direct impact to our ability to process in the EU.

    3:00 pm
    Check Point Software: The State of Cybersecurity – The Past, the Present, and How to Stay One Step Ahead For the Future
    • session level icon
    speaker photo
    Regional Expert, Threat Prevention, Check Point Software Technologies, Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Lakeshore C

    This presentation will take a brief look at the overall state of cybersecurity and what can be done to prevent attacks, and breaches in the future.

Exhibitors
  • Arbor Networks
    Booth: 127

    Arbor Networks is the leading provider of network security and management solutions for enterprise and service provider networks. Arbor Networks protects enterprises from distributed denial of service attacks and advanced malware using Arbor’s global network intelligence. Arbor's proven solutions help grow and protect customer networks, businesses and brands.

  • baramundi software USA, Inc.
    Booth: 155

    baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,000 customers of all sizes and from every sector benefit from the independent German manufacturer's many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.

  • Check Point Security
    Booth: TBD

    Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.

  • Darktrace
    Booth: 115

    Darktrace is the world’s leading machine learning company for cyber security. Created by mathematicians from the University of Cambridge, the Enterprise Immune System uses AI algorithms to automatically detect and take action against cyber-threats within all types of networks, including physical, cloud and virtualized networks, as well as IoT and industrial control systems. A self-configuring platform, Darktrace requires no prior set-up, identifying advanced threats in real time, including zero-days, insiders and stealthy, silent attackers. Headquartered in San Francisco and Cambridge, UK, Darktrace has 24 offices worldwide.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • F5
    Booth: 219

    F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

  • FireEye
    Booth: 100

    FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000.

  • Gigamon
    Booth: 227

    Gigamon (NYSE: GIMO) provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric™ and GigaSECURE®, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network, and application performance management solutions in enterprise, government, and service provider networks operate more efficiently. As data volumes and network speeds grow and threats become more sophisticated, tools are increasingly overburdened. One hundred percent visibility is imperative. Gigamon is installed in more than three-quarters of the Fortune 100, more than half of the Fortune 500, and seven of the 10 largest service providers.

  • InfraGard Minnesota Chapter
    Booth: TBD
  • (ISC)2 Twin Cities Chapter
    Booth: TBD

    Our mission is to create a safe environment where information security practitioners can openly share expertise and ideas, providing practical, relevant, useful and timely information that, when applied, will develop and promote the (ISC)2 CISSP CBK®. help support the Information Security and Cyber Security Communities of the Upper Midwest.

    The objectives of this chapter are to:

    • Educate: Provide low cost (or no-cost), high impact educational opportunities for both new and seasoned information security practitioners.
    • Network: Create an environment that encourages relationship building and professional growth via networking and creating Mentorship opportunities
    • Transform: Provide a forum for the free exchange of bold, innovative, transformative ideas to advance the perception and effectiveness of information security.

  • ISACA Minnesota Chapter
    Booth: TBD

    With approximately 1,100 members from over 100 organizations, we are the premier organization for information technology audit and control professionals in Minnesota and surrounding areas.

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IT governance, IS audit, control and security profession throughout the state of Minnesota.

    On our website, you will find a wealth of information about events and volunteer opportunities within our chapter including local job postings. Please be sure to visit the members-only pages for important information about your chapter, special members-only benefits.

  • ISSA Minnesota Chapter
    Booth: TBD

    The Minnesota Chapter of ISSA (MN ISSA) serves the Minneapolis / St. Paul twin cities area, greater Minnesota and western Wisconsin. Our membership, over 170 strong and growing, is drawn from the multitude of large corporations, small businesses, government entities and educational institutions in the area. They span all levels of career growth, from students and entry-level to senior management, and cover all industries – finance, medical, government, education, retail, technology, services, and more. This depth of experience and breadth of knowledge provides a dynamic networking environment and a cadre of great individuals to draw from for education, guidance and thought leadership.

  • Ixia
    Booth: 150

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks.
    Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • LogRhythm
    Booth: 205

    LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

  • Optiv-RSA
    Booth: 112
  • Reduxio
    Booth: 138

    Reduxio delivers high-performance enterprise storage solutions with unique data management capabilities enabled by the Reduxio TimeOS™, a new storage operating system. Reduxio TimeOS™ puts data in the middle of its architecture and allows complete virtualization of all types of storage, delivering the most effective storage for the most demanding enterprise applications. Reduxio is backed by C5 Capital Cloud Partners, Jerusalem Venture Partners (JVP), Carmel Ventures, Intel (NASDAQ: INTC), and Seagate Technology PLC (NASDAQ: STX). Learn more at www.reduxio.com and follow us on Twitter and LinkedIn.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Trend Micro
    Booth: 120

    As a global leader in cloud security, Trend Micro develops Internet content security and threat management solutions that make the world safe for businesses and consumers to exchange digital information. With more than 20 years of experience, we're recognized as the market leader in server security for delivering top-ranked client, server, and cloud-based security solutions that stop threats faster and protect data in physical, virtualized, and cloud environments.

  • TrustMAPP
    Booth: 109

    TrustMAPP℠ was developed by a consulting firm on the ground floor of the information security field: Secure Digital Solutions (SDS). Founded in 2005, the firm was one of the first to recognize the strength of using process-level maturity models paired with CMMI maturity scoring, now the accepted best-practice in the industry.

    SDS refined its Maturity Assessment, Profile, and Plan (MAPP) consulting approach over 10 years of real-world engagements. Its consultants first began building the visuals in TrustMAPP for a CIO client who asked for a “clear, quick picture” of his organization’s information security posture and future roadmap investments.

    The highly refined assessment templates, scoring engine, and graphic summaries in TrustMAPP came from a decade of success with SDS clients.

    TrustMAPP is helping security leaders maximize their time and resources while providing 1) fast, accurate assessment across large enterprises; 2) strategic program guidance based on costs and benefits; and 3) communication that resonates with executives and unites the chain of command.

  • Wombat Security Technologies
    Booth: 105

    Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

  • Zscaler
    Booth: 104

    Zscaler's Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Pulte Financial Services

    Alex Wood is currently the CISO for Pulte Financial Services and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the University of Denver.

  • speaker photo
    Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security including financial services, health care, pharmaceutical, telecom and Internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, Cambridge, Massachusetts, and attended the doctoral program in system sciences at Carnegie Mellon University, Pittsburgh, Pennsylvania. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona, Tucson, Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Laura MacDonald
    Field CTO, RSA

    Laura MacDonald is a Field Chief Technology Officer with RSA, a Dell Technologies business. She is an extended member of the Dell Cyber Security Intelligence and Response Team (CSIRT), working to understand the latest threats in cyber espionage and attacks. With over 20 years’ experience in networking and information security, she consults and educates RSA customers on the evolving threat landscape. Her practitioner insights on advanced incident response teams have gained her trusted advisor status with over 100 RSA customers across many verticals.

  • speaker photo
    Douglas DeGrote
    Chief Information Security Officer, Allianz Life

    Senior Leader with 28+ years experience of delivering solutions and services in cyber security, risk management, enterprise architecture, business continuity, operations, development and program management.

  • speaker photo
    Mike Kearn
    VP & BISO, US Bank

    As BISO for the Consumer Banking division, Mr. Kearn advises technology, risk and business executives as an information security subject matter expert. Mr. Kearn also manages the relationship between those leaders, their teams and Information Security Services. Mr. Kearn brings more than eighteen years of varied experience in Information Technology to his current role.

  • speaker photo
    Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security including financial services, health care, pharmaceutical, telecom and Internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. Dr. Ponemon was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, Cambridge, Massachusetts, and attended the doctoral program in system sciences at Carnegie Mellon University, Pittsburgh, Pennsylvania. Dr. Ponemon earned his Bachelors with Highest Distinction from the University of Arizona, Tucson, Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Barry Caplin
    VP & CISO, Fairview Health Services

    Barry is the first CISO for Fairview Health Services. He has 35 years in technology/security, an MS in applied mathematics from Virginia Tech, and CISSP, ISSMP, CISA, and CISM certifications. Barry is a frequent speaker on a variety of security, safety and privacy topics. Follow him on Twitter @bcaplin and read his blog http://securityandcoffee.blogspot.com/

  • speaker photo
    Victor Devine
    Principal Engineer, Trend Micro

    Victor Devine has been focused on IT Security for the last 10 years of his 20 year IT career. While playing a big role with securing data centers, endpoint protection and gateways; he joined Trend Micro as a Principle Engineer to expand client education on the importance of IT Security both in and out of the workplace. When he is not talking about security, you will most likely find him on a Disc Golf course.

  • speaker photo
    Kurt Wescoe
    Chief Architect, Wombat Security Technologies

    As Chief Architect at Wombat Security, Kurt is responsible for ensuring Wombat's software and systems are built on a sound foundation. He brings over 10 years of experience in engineering, across multiple industries. He also serves as a faculty member in the School of Computer Science’s master’s program in e-Business at Carnegie Mellon University. Kurt earned his M.Sc. in E-Commerce from CMU, and a B.S. in Computer Engineering from the University of Pittsburgh.

  • speaker photo
    Jason Witty
    EVP & CISO, U.S. Bank

    Jason Witty is the EVP, CISO at U.S. Bancorp, providing singular accountability for information security controls in the company. An award winning CISO, Jason has 23 years of information security and risk management experience and was recently named the 2017 SecureWorld Ambassador of the Year in addition to a “CISO Superhero” at I.S.E. North America in 2015. Jason simultaneously serves as the Vice-Chairman of the Board of Directors at the FS/ISAC, as well as being FBI’s Chicago Infragard Sector Chief for Finance Services.

  • speaker photo
    Craig Kaplan
    Cyber Security Account Executive, Darktrace

    Craig Kaplan is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Financial Services to Healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Kaplan graduated with a bachelor’s degree from the University of Michigan and is based out of Darktrace’s Washington, DC office.

  • speaker photo
    Jonathan Lange
    Executive Manager, baramundi Software USA

    Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.

  • speaker photo
    Christopher Rence
    Chief Information, Security and Risk Officer CRISC/CIPP/E/DPO/CISO/MBCP, Digital River

    As Digital River’s chief information, security and risk officer, Christopher Rence leads the company’s information technology (IT) organization. With more than 20 years of IT-related experience, he brings a wealth of technical and systems expertise to the position at Digital River.

  • speaker photo
    Chris Morris
    Regional Expert, Threat Prevention, Check Point Software Technologies, Inc.

    Chris Morris is the Threat Prevention SME for Check Point's Central United States region. He has been in the IT industry for nearly 20 years, whose experiences include perimeter and endpoint security, network virtualization, disaster recovery, and network design.

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store