googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, September 5, 2017
    9:00 am
    SecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program
    • session level icon
    9 a.m. - 3 p.m. - Earn 12 CPEs!
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Lakeshore C

    Managing a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.

  • Wednesday, September 6, 2017
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    Advisory Council Breakfast: (VIP / INVITE ONLY)
    • session level icon
    Coffee / Breakfast Served
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: Loring
    8:30 am
    RSA: Evolved Requirements: A Business-Driven Security Strategy for Threat Detection & Response
    • session level icon
    speaker photo
    Field CTO, RSA
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Lakeshore C

    Security teams need to evolve to defend against the latest threats. Attackers continue to advance with sophisticated techniques to target and infiltrate organizations. They are evading preventative measures and infiltrating our perimeter-less infrastructures. In parallel, security teams suffer from a skills gap, and adding more and more security tools only adds to the noise for the limited staff trying to find truly significant attacks. Given these challenges, organizations must shift focus from preventative controls that promise to keep the bad guys out to an increased focus on rapid detection and response. To reduce the impact of attacks, security operations need to tie critical asset and identity information into both the detection and response capabilities—focusing their efforts on the threats that matter most.

    8:30 am
    Learn How Behavior Monitoring Can Help Detect the Secret Attack
    • session level icon
    speaker photo
    Chief Information Security Officer, Allianz Life
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Lakeshore B

    Monitoring behavior is something done in many aspects of life to detect when someone is acting “strange”. In this session you will hear about how base-lining and monitoring system and user activity can provide indication of a potential secret attack.

    8:30 am
    When the Levee Breaks – Fixing the Foundations of Your Information Security Program Before the Flood
    • session level icon
    speaker photo
    Director, Threat Informed Defense, U.S. Bank Information Security Services
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Keynote Theater

    This presentation will discuss what many of us in our profession consider the basic building blocks of an effective security program, in addition examining how current technologies can help create the stronger foundation all of us are seeking.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:30 am
    OPENING KEYNOTE: The Evolving Role of CISOs and Their Importance to the Business
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater

    What is a CISO and what do they do? As the leader of cyber defense for an organization, the CISO is rapidly becoming indispensable for an organization’s survival. This presentation is based on interviews with senior level IT professionals at 184 companies in seven countries. The goal of the research is to better understand how CISOs work, what their concerns are, and how they are improving their effectiveness in managing risks to the enterprise.

    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    11:00 am
    Advisory Council Roundtable: Ransomware - Breaking the Criminal Business Model – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Lakeshore C
    11:15 am
    The Dreaded Embedded
    • session level icon
    Examining issues with Med Devices and how we deal with them as part of an information security program.
    speaker photo
    VP & CISO, Fairview Health Services
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Keynote Theater

    How do you make an inanimate object “smart”? You put a chip in it, and then you connect it to the global internet! These chips run what is typically called an embedded operating system – a Windows, unix or Linux variant, or something custom made. Because these chips are embedded in power grid equipment, medical equipment, appliances or even people, updates and patches are problematic. The Internet of Things (IoT) is growing at a rate 10-times that of standard computers. A typical hospital/clinic system may have 4-5 times as many smart connected medical devices as computers. The Dreaded Embedded refers to the proliferation of vulnerabilities associated with these devices. What are the security and privacy concerns of these devices? What about FDA and other regulatory compliance? And how do we deal with these devices as part of an information security program?

    11:15 am
    [Trend Micro] Endpoint Is Not the Only Battleground
    • session level icon
    speaker photo
    Principal Engineer, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Lakeshore B

    We have seen extensive growth in protection capabilities at the endpoint but is that enough? In this session, we will discuss the terminology of “next generation” and explore true end-to-end threat intelligence, how machine learning is applicable, and what it truly means to create a Defense in Depth plan so that internal teams work together to provide a holistic approach to maintain a defensible environment.

    11:15 am
    Wombat: State of the Phish: Understanding End User Behaviors Towards Phishing
    • session level icon
    speaker photo
    Chief Architect, Wombat Security, a division of Proofpoint
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Lakeshore A

    Hear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves and, learn about the most devastating types of phishing emails used and how to prevent them.

    12:15 pm
    LUNCH KEYNOTE: Where Crime-as-a-Service Meets Internet Safety
    • session level icon
    We need to think differently as the Internet of Things creates physical safety issues.
    speaker photo
    EVP & CISO, U.S. Bank
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater

    Organized crime has reached legendary levels of organization and funding. The business model for ransomware has become extremely popular, but has also had some unintended consequences as malware hit the “Internet of Things.” Learn more about the shift we’re starting to see towards discussing Internet Safety vs. Internet Security.

    1:15 pm
    Panel: Phishing and Social Engineering Scams
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Lakeshore A

    Phishing continues to be the #1 attack vector for the bad guys. Why? Simply put: it works. These attacks keep getting more realistic and sophisticated. In the future we should expect nothing less. Criminals will do more homework on their potential victims and possible pose as business leads or clients to gain our trust. What sales person doesn’t want email from a potential client who wants a new solution? Or they may just lay in wait until they’ve collected enough information to strike. Will they actually come to your business and drop thumb drives like pen testers do? Use drones to do their dirty work? Our experts will discuss the current state of affairs and brainstorm possible new scenarios.
    Panelists:
    Dana Torgersen, Malwarebytes
    Erich Kron, KnowBe4
    David Sterz , baramundi
    Moderator: Rick Leib, Three Square Market

    1:15 pm
    Panel: What Will They Think of Next (Emerging Threats)
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    It would seem the more we “build a better mousetrap” the better the threats become. Will machine learning and AI be used against us in the future? Will these and other innovations be hacked and used for gain? Will the Crime as a Business platform take off where business competitors are utilizing these attacks for the upper hand? Perhaps the cars that are being hacked will evolve into driverless vehicles that are hacking companies from inside there own parking lots. What about drones?
    So many questions, let’s see what our experts say on this panel.
    Panelists
    Evan Glaser, Darktrace
    Randy Armknecht, Protiviti
    John Fahey, Comodo
    Moderator:
    Bruce Sussman

     

    1:15 pm
    Darktrace: AI for Cyber Defense
    • session level icon
    AI for Cyber Defense: That Machine Fights Back
    speaker photo
    Cyber Security Account Executive, Darktrace
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Lakeshore B

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.

    Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

    Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.

    In this session, learn:
    • How new machine learning and mathematics are automating advanced cyber defense
    • Why 100% network visibility allows you to detect threats as they happen, or before they happen
    • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
    • Real-world examples of unknown threats detected by ‘immune system’ technology

    2:15 pm
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibitor Floor

    Reboot with coffee and infused water while visiting exhibitors on the exhibitor floor.

    2:30 pm
    Networking Break — Dash for Prizes and CyberHunt winners announced
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibitor Floor

    Be sure to have your badge scanned with participating exhibitors throughout the day. Past prizes have included Kindles, Bose wireless headphones, gift cards, iPads, drones, and more! *Must be present to win.

    3:00 pm
    baramundi Software — Automating Endpoint Management: Patching, Deployment, and System Building Made Easy
    • session level icon
    speaker photo
    Executive Manager, baramundi software USA, Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Lakeshore B

    With increasing demands on IT managers, new ways for handling security and user requirements are needed. This seminar will show you how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures—inside and outside of your network.

    3:00 pm
    GDPR – End-to-End Impact
    • session level icon
    speaker photo
    President, Rimage Corporation; CSRO, Equus Holdings
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Lakeshore A

    Review of how GDPR will impact day-to-day operations and the support service. Direct impact to our ability to process in the EU.

    3:00 pm
    Check Point Software: The State of Cybersecurity – The Past, the Present, and How to Stay One Step Ahead For the Future
    • session level icon
    speaker photo
    Regional Expert, Threat Prevention, Check Point Software Technologies, Inc.
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Lakeshore C

    This presentation will take a brief look at the overall state of cybersecurity and what can be done to prevent attacks, and breaches in the future.

Exhibitors
  • NETSCOUT Arbor
    Booth: 127

    For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.

  • baramundi software USA, Inc.
    Booth: 155

    baramundi Software provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

    The baramundi Management Suite (bMS) combines all important features for Endpoint Management: Patch Management, Software Deployment, OS-Installation, Enterprise Mobility Management, Vulnerability Assessment, and more. bMS optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of the network and endpoints. In doing so, it relieves pressure on IT administrators and ensures that users always have the necessary rights and applications on all platforms and form factors; whether on PCs, servers, notebooks, mobile devices or Macs.

    Over 3,000 customers around the world benefit from nearly two decades of experience and the easy-to-use software solution.

  • Check Point Software Technologies
    Booth: TBD

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Darktrace
    Booth: 115

    Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,500 organizations to protect against threats to the cloud, email, IoT, networks, and industrial systems.

    The company has over 1,200 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.

  • EC-Council
    Booth: TBD

    International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.

  • F5
    Booth: 219

    F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

  • FireEye
    Booth: 100

    FireEye (https://www.fireeye.com/) is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,100 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.

  • Gigamon
    Booth: 227

    Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. 

  • InfraGard Minnesota
    Booth: TBD
  • ISC2 Twin Cities Chapter
    Booth: TBD

    Our mission is to create a safe environment where information security practitioners can openly share expertise and ideas, providing practical, relevant, useful and timely information that, when applied, will develop and promote the ISC2 CISSP CBK®. help support the Information Security and Cyber Security Communities of the Upper Midwest.

    The objectives of this chapter are to:

    • Educate: Provide low cost (or no-cost), high impact educational opportunities for both new and seasoned information security practitioners.
    • Network: Create an environment that encourages relationship building and professional growth via networking and creating Mentorship opportunities
    • Transform: Provide a forum for the free exchange of bold, innovative, transformative ideas to advance the perception and effectiveness of information security.

  • ISACA Minnesota Chapter
    Booth: TBD

    With approximately 1,100 members from over 100 organizations, we are the premier organization for information technology audit and control professionals in Minnesota and surrounding areas.

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IT governance, IS audit, control and security profession throughout the state of Minnesota.

    On our website, you will find a wealth of information about events and volunteer opportunities within our chapter including local job postings. Please be sure to visit the members-only pages for important information about your chapter, special members-only benefits.

  • ISSA Minnesota Chapter
    Booth: TBD

    The Minnesota Chapter of ISSA (MN ISSA) serves the Minneapolis / St. Paul twin cities area, greater Minnesota and western Wisconsin. Our membership, over 170 strong and growing, is drawn from the multitude of large corporations, small businesses, government entities and educational institutions in the area. They span all levels of career growth, from students and entry-level to senior management, and cover all industries – finance, medical, government, education, retail, technology, services, and more. This depth of experience and breadth of knowledge provides a dynamic networking environment and a cadre of great individuals to draw from for education, guidance and thought leadership.

  • Ixia, a Keysight Business
    Booth: 150

    We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.

  • LogRhythm
    Booth: 205

    LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.

  • Optiv-RSA
    Booth: 112
  • Reduxio
    Booth: 138

    Reduxio delivers high-performance enterprise storage solutions with unique data management capabilities enabled by the Reduxio TimeOS™, a new storage operating system. Reduxio TimeOS™ puts data in the middle of its architecture and allows complete virtualization of all types of storage, delivering the most effective storage for the most demanding enterprise applications. Reduxio is backed by C5 Capital Cloud Partners, Jerusalem Venture Partners (JVP), Carmel Ventures, Intel (NASDAQ: INTC), and Seagate Technology PLC (NASDAQ: STX). Learn more at www.reduxio.com and follow us on Twitter and LinkedIn.

  • TechTarget
    Booth: TBD

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Trend Micro
    Booth: 120

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • TrustMAPP
    Booth: 109

    TrustMAPP℠ was developed by a consulting firm on the ground floor of the information security field: Secure Digital Solutions (SDS). Founded in 2005, the firm was one of the first to recognize the strength of using process-level maturity models paired with CMMI maturity scoring, now the accepted best-practice in the industry.

    SDS refined its Maturity Assessment, Profile, and Plan (MAPP) consulting approach over 10 years of real-world engagements. Its consultants first began building the visuals in TrustMAPP for a CIO client who asked for a “clear, quick picture” of his organization’s information security posture and future roadmap investments.

    The highly refined assessment templates, scoring engine, and graphic summaries in TrustMAPP came from a decade of success with SDS clients.

    TrustMAPP is helping security leaders maximize their time and resources while providing 1) fast, accurate assessment across large enterprises; 2) strategic program guidance based on costs and benefits; and 3) communication that resonates with executives and unites the chain of command.

  • Wombat Security Technologies
    Booth: 105

    Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.

  • Zscaler
    Booth: 104

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Laura MacDonald
    Field CTO, RSA

    Laura MacDonald is a Field Chief Technology Officer with RSA, a Dell Technologies business. She is an extended member of the Dell Cyber Security Intelligence and Response Team (CSIRT), working to understand the latest threats in cyber espionage and attacks. With over 20 years’ experience in networking and information security, she consults and educates RSA customers on the evolving threat landscape. Her practitioner insights on advanced incident response teams have gained her trusted advisor status with over 100 RSA customers across many verticals.

  • speaker photo
    Douglas DeGrote
    Chief Information Security Officer, Allianz Life

    Senior Leader with 28+ years experience of delivering solutions and services in cyber security, risk management, enterprise architecture, business continuity, operations, development and program management.

  • speaker photo
    Michael Kearn, CISSP, NSA-IAM
    Director, Threat Informed Defense, U.S. Bank Information Security Services

    As Managing BISO for Community Banking and Consumer Banking lines of business, he regularly consults with technology, risk and business executives as an information security subject matter expert. Mr. Kearn also manages the relationship between Community and Consumer Banking technical leaders, their teams and ISS. Mr. Kearn brings more than nineteen years of varied experience in Information Technology to his current role. Prior to joining US Bank early in 2012, Mr. Kearn held several positions with Wells Fargo & Company, including roles as an IT Auditor, Application Developer, Application Architect and VP of Information Security (ISO). Mr. Kearn has been a featured speaker at many industry events and has taught at the graduate level for nearly ten years.

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Barry Caplin
    VP & CISO, Fairview Health Services

    Barry is the first CISO for Fairview Health Services. He has 35 years in technology/security, an MS in applied mathematics from Virginia Tech, and CISSP, ISSMP, CISA, and CISM certifications. Barry is a frequent speaker on a variety of security, safety and privacy topics. Follow him on Twitter @bcaplin and read his blog http://securityandcoffee.blogspot.com/

  • speaker photo
    Victor Devine
    Principal Engineer, Trend Micro

    Victor Devine has been focused on IT Security for the last 10 years of his 20 year IT career. While playing a big role with securing data centers, endpoint protection and gateways; he joined Trend Micro as a Principle Engineer to expand client education on the importance of IT Security both in and out of the workplace. When he is not talking about security, you will most likely find him on a Disc Golf course.

  • speaker photo
    Kurt Wescoe
    Chief Architect, Wombat Security, a division of Proofpoint

    As Chief Architect at Wombat Security, Kurt is responsible for ensuring Wombat's software and systems are built on a sound foundation. He brings over 10 years of experience in engineering, across multiple industries. He also serves as a faculty member in the School of Computer Science’s master’s program in e-Business at Carnegie Mellon University. Kurt earned his M.Sc. in E-Commerce from CMU, and a B.S. in Computer Engineering from the University of Pittsburgh.

  • speaker photo
    Jason Witty
    EVP & CISO, U.S. Bank

    Jason Witty is the EVP, CISO at U.S. Bancorp, providing singular accountability for information security controls in the company. An award winning CISO, Jason has 23 years of information security and risk management experience and was recently named the 2017 SecureWorld Ambassador of the Year in addition to a “CISO Superhero” at I.S.E. North America in 2015. Jason simultaneously serves as the Vice-Chairman of the Board of Directors at the FS/ISAC, as well as being FBI’s Chicago Infragard Sector Chief for Finance Services.

  • speaker photo
    Craig Kaplan
    Cyber Security Account Executive, Darktrace

    Craig Kaplan is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Financial Services to Healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Kaplan graduated with a bachelor’s degree from the University of Michigan and is based out of Darktrace’s Washington, DC office.

  • speaker photo
    Jonathan Lange
    Executive Manager, baramundi software USA, Inc.

    Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.

  • speaker photo
    Christopher Rence
    President, Rimage Corporation; CSRO, Equus Holdings

    Christopher is President and CEO of Rimage Corporation. He has more than 25 years of experience leading global security and technology transformation for Accenture, FICO, Digital River, and EQ Holdings, with deep expertise in governance and compliance, business continuity and disaster recovery, cloud architecture computing, and sustainability. GDPR, DPO, CIPPE, CRISC, CISO, MBCP

  • speaker photo
    Chris Morris
    Regional Expert, Threat Prevention, Check Point Software Technologies, Inc.

    Chris Morris is the Threat Prevention SME for Check Point's Central United States region. He has been in the IT industry for nearly 20 years, whose experiences include perimeter and endpoint security, network virtualization, disaster recovery, and network design.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes