Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, June 19, 20258:30 amExhibitor Hall openRegistration Level:
Open Sessions
8:30 am - 3:00 pmYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:00 am[Opening Keynote] Déjà Vu All Over Again: Learning from Cloud's Early Misadventures to Secure Your AI FutureSecurity Advisor, Office of the CISO, Google CloudRegistration Level:Open Sessions
9:00 am - 9:45 amRemember when “lift and shift” was cool? Well, neither do we! Well, history’s repeating itself with AI. Organizations are rushing into AI without clear strategies, falling for the “magic bullet” fallacy, and neglecting security. This session dissects the striking parallels between cloud’s wild west days and today’s AI gold rush, exposing common pitfalls like strategic vacuums and security blind spots. Learn actionable strategies to avoid past mistakes, define clear AI goals, prioritize security from day one, and foster a culture of AI literacy. Let’s make your AI journey optimized, not “oops.”
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:00 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amRitual, Repetition, and Remoteness: Linking Serial Cyber AttacksCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:Open Sessions
10:00 am - 10:45 amSerial cyber offenders often operate behind layers of anonymity, yet their behavioral patterns—like those of traditional serial criminals—leave behind digital signatures. This talk explores how principles from behavioral profiling and case linkage in violent crime investigations can be adapted to identify and attribute serial cyber attacks. By examining the concepts of modus operandi, offender ritual, escalation, victim selection and targeting preferences, we illuminate how repeat offenders reveal themselves across campaigns.
10:00 amKubikle: Awareness Training Like You've Never SeenExecutive Director, National Cybersecurity AllianceRegistration Level:Open Sessions
10:00 am - 10:45 amTired of the same old cybersecurity awareness training? This session introduces “Kubikle,” a groundbreaking YouTube video series that’s transforming how we learn about online threats. Join us for an exclusive conversation with the Managing Director of the National Cybersecurity Alliance, Lisa Plaggemier, the organization behind this innovative approach. We’ll delve into specific “Kubikle” episodes, exploring the comedic yet crucial themes they address and uncovering the creative vision and strategic thinking that brought this unique awareness training to life. Discover how humor and a fresh perspective can make cybersecurity education more engaging and impactful than ever before.10:00 amArtificial Intelligence Acceptable Use PolicyRegistration Level:Open Sessions
10:00 am - 10:45 amSession description to come.
10:45 amNetworking BreakRegistration Level:Open Sessions
10:45 am - 11:00 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:00 amPreventing, Detecting, Responding, and Recovering from a Ransomware AttackSr. Cybersecurity Consultant, Wilson CyberRegistration Level:Open Sessions
11:00 am - 11:45 amRansomware attacks continue to pose a significant and evolving threat to organizations of all sizes. The potential for operational disruption, data loss, financial damage, and reputational harm is immense. This session will provide a comprehensive overview of a multi-layered strategy to effectively combat ransomware.
Join us to explore the critical phases of ransomware defense:
- Prevention: Discover proactive measures to fortify your defenses, including robust security hygiene, employee awareness training, network segmentation, and vulnerability management. Learn how to minimize your attack surface and make your organization a less attractive target.
- Detection: Understand the key indicators of an active ransomware attack. We will discuss the tools and techniques for early detection, such as monitoring for unusual file activity, network traffic anomalies, and endpoint-level behavioral analysis, enabling a swift response.
- Response: Learn how to develop and implement an effective incident response plan specifically tailored for ransomware. This includes crucial steps like containment, eradication, communication strategies, and decision-making regarding ransom demands.
- Recovery: Explore best practices for restoring encrypted data and systems efficiently and safely. We will cover the importance of reliable backups, an orderly restoration process, and post-incident analysis to strengthen future resilience.
This session will equip attendees with actionable insights and best practices to build a resilient cybersecurity posture capable of withstanding, identifying, and quickly recovering from ransomware incidents, ultimately safeguarding your critical assets and ensuring business continuity.11:00 amCybersecurity Hiring: Report Reveals the Tide Is TurningFounder and CEO, CyberSN and Secure DiversityRegistration Level:Open Sessions
11:00 am - 11:45 amIn this session, we will uncover what is truly happening in the cybersecurity talent market by analyzing three years of U.S. job posting data across all 45 cybersecurity functional roles, with an average of 140,000 monthly postings. With 40% of the top 25 cybersecurity functional roles growing from 2023 to 2024, signaling positive trends for 2025, we’ll reveal emerging trends, in-demand positions, and those experiencing volatility, stability, or decline.
Attendees will gain a clear understanding of how the talent landscape is evolving, the impact of the SEC breach reporting rule, and other key factors shaping the cybersecurity job market. They will walk away with actionable insights to help organizations and professionals navigate these challenges and succeed in 2025.
11:00 amRisk Is DangerChief Evangelist, IllumioRegistration Level:Open Sessions
11:00 am - 11:45 amThe Godfather of Zero Trust, John Kindervag, will dive into the foundational concept that risk is inherently dangerous and needs to be mitigated with precision. John will challenge attendees to rethink traditional security approaches and embrace the Zero Trust mindset—where nothing is trusted implicitly, whether inside or outside the network.
11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThe Current Threat LandscapeSr. Director, Threat Research, NetskopeCEO & Founder, Center for Threat IntelligenceResearch Security Officer, Massachusetts Institute of TechnologyRegistration Level:Open Sessions
12:00 pm - 12:45 pmThe cyber threat landscape is rapidly evolving. This panel examines the multifaceted current and emerging cyber threats facing individuals, organizations, and nations. We explore sophisticated attack vectors like AI-driven malware, advanced persistent threats (APTs), ransomware, and social engineering, now amplified by technologies like deepfakes.Discussion will cover the expanding attack surface from IoT proliferation, widespread cloud adoption, interconnected systems, and complex global supply chains. We will also address evolving adversary tactics, including nation-state activities, cybercriminal enterprises, and persistent insider threats. Key themes include the critical need for adaptive and proactive defense, robust threat intelligence sharing, addressing the cybersecurity skills gap, and fostering a more resilient digital ecosystem. Join us for a comprehensive overview of today’s threats and a forward-looking discussion on navigating these complex challenges.12:00 pmCyber Intel BriefingCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:Open Sessions
12:00 pm - 12:45 pmThis presentation will provide a comprehensive overview of the current cyber landscape, focusing on both global and domestic government-related threats and incidents. We will delve into recent high-profile attacks, explore emerging trends, and discuss the evolving tactics employed by cybercriminals and nation-states. Additionally, the presentation will examine the ongoing challenges faced by governments in protecting critical infrastructure, securing sensitive data, and mitigating the risks posed by cyber espionage. By understanding the latest developments in the cyber threat environment, attendees will gain valuable insights into safeguarding government networks and systems.
12:00 pmPredatory AISr. Director, Cyber Security, Acumatica, Inc.Registration Level:Open Sessions
12:00 pm - 12:45 pmThe risks of predatory AI are multifaceted and include both real-world and hypothetical scenarios. One significant concern is the potential for AI to be used in predatory behavior, such as the manipulation of the technical and human behavior element through the exploitation of both types of vulnerabilities. For instance, AI algorithms can predict personal characteristics of users based on simple interactions such as “liking” content on social media platforms, which can then be used to manipulate behaviors. Couple that with the technological aspects and you have a potential worst-case scenario.
This presentation examines the types of AI services promoted as services and the links of those services back to Dark AI. From there, learn how to mitigate these risks through various security solutions for your company and personal interactions.
12:45 pmNetworking BreakRegistration Level:12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmImmersive Cross-Training for Upskilling Your TeamSecurity Architecture Lead, Convenience RetailRegistration Level:Open Sessions
1:00 pm - 1:45 pmSecurity teams are always asked to do more with less. Enter “Immersive Cross-Training,” the name we gave to the program developed to train security team members across functions. The goal is to increase the repertoire of skills for each individual and prepare them with the skills they need to move up if/when new positions open on teams. This strategy also allows the capacity to surge teams cross-functionally when the need arises.
1:00 pmSecuring the Airgap — Wait, It Needs to Be Secured?Sr. Offensive Security Engineer, ConfidentialRegistration Level:Open Sessions
1:00 pm - 1:45 pmAir-gapped systems are often considered the pinnacle of security, but are they truly untouchable? This talk challenges the myth of absolute isolation, exploring real-world breaches – from Stuxnet to electromagnetic and acoustic attacks. Attendees will gain insight into modern threats, including supply chain risks and social engineering, while learning practical strategies to fortify air-gapped environments. Through physical security, procedural controls, and advanced detection methods, this session will reshape how you think about “unhackable” systems. Whether you secure critical infrastructure or simply love cybersecurity, you’ll leave with a deeper understanding of air-gap vulnerabilities and how to defend against them.
Attendees will learn that air-gapped systems are not inherently secure and require continuous vigilance, layered defenses, and proactive threat mitigation to prevent sophisticated breaches.
1:00 pmDefending Against Digital Defamation and Cyber ExtortionAttorney & Founder, Minc LawRegistration Level:Open Sessions
1:00 pm - 1:45 pmThe digital age exposes individuals and organizations to significant reputational risks, with digital defamation and cyber extortion posing increasingly prevalent threats. Malicious actors leverage online platforms to spread false, damaging information or to coerce victims through threats of reputational harm or data exposure. These attacks can lead to severe consequences, including financial loss, damaged credibility, operational disruption, and psychological distress. This work provides essential strategies for actively defending against such online assaults. It examines proactive measures like reputation monitoring, security hardening, and building online resilience. Furthermore, it outlines reactive tactics crucial for incident response, encompassing evidence collection, navigating platform removal processes, exploring technical countermeasures, and understanding potential legal recourses. By addressing the unique challenges posed by both digital defamation and cyber extortion, this overview aims to equip readers with the necessary knowledge to protect their online reputation and respond effectively when targeted.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pm[Closing Keynote] SASE—Are We Nearly There Yet?Field CTO, NetskopeRegistration Level:Open Sessions
2:00 pm - 2:45 pmThe journey to SASE and zero trust isn’t a destination—it’s an ongoing evolution. As organizations modernize their security and networking, many face roadblocks: legacy architectures, fragmented solutions, and uncertainty about the right next steps. Building it right from the start is key to long-term success.
Since 2013, Netskope has been at the forefront of redefining secure access, transforming SASE from a concept into a critical business enabler. This keynote visits the evolution of SASE, from its origins to its future, and explores how organizations can continuously mature their security posture by making the right architecture choices, leveraging deep integration, predictive insights, and strong partnerships.
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- IllumioBooth: n/a
We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others. - NetskopeBooth: n/a
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- Traceable by HarnessBooth: n/a
Traceable is the industry’s leading API Security company that helps organizations achieve API visibility and attack protection in a cloud-first, API-driven world. Traceable is the only intelligent and context-aware solution that powers complete API security—API discovery and posture management, API security testing, attack detection and protection, anywhere your APIs live. Traceable enables organizations to minimize risk and maximize the value that APIs bring their customers. To learn more about how API security can help your business, book a demo with a security expert.
- Dr. Anton ChuvakinSecurity Advisor, Office of the CISO, Google Cloud
Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via the Chronicle Security (an Alphabet company) acquisition in July 2019. He is also a co-host of Cloud Security Podcast (http://www.twitter.com/CloudSecPodcast).
Until June 2019, Dr. Chuvakin was a Research VP and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies (SRMS) team. At Gartner he covered a broad range of security operations and detection and response topics, and is credited with inventing the term "EDR."
He is a recognized security expert in the field of SIEM, log management and PCI DSS compliance. He is an author of books "Security Warrior", "PCI Compliance", "Logging and Log Management" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, honeypots, etc. His blog securitywarrior.org was one of the most popular in the industry.
In addition, Anton taught classes (including his own SANS SEC434 class on log management) and presented at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He worked on emerging security standards and served on the advisory boards of several security start-ups.
Before joining Gartner in 2011, Anton was running his own security consulting practice www.securitywarriorconsulting.com, focusing on SIEM, logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Anton earned his Ph.D. degree from Stony Brook University.
Specialties: Computer forensics, intrusion detection, security information and event management (SIEM, SIM, SEM), security correlation, log management, security standards - CVSS, OVAL, AVDL, CEE, incident response, Unix and Linux security, honeypots, honeynets, security policy and management, writing on security, future security technologies.
- Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.). - Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Larry Wilson, CISSP, CISASr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Deidre DiamondFounder and CEO, CyberSN and Secure Diversity
Deidre Diamond is the founder and CEO of CyberSN, the largest cybersecurity talent acquisition technology and services firm in the U.S., transforming job searching and hiring for the cybersecurity industry. Standardizing all cybersecurity job functions into a common taxonomy of 45 roles, the CyberSN platform allows professionals to make anonymous, public profiles that match with employer-posted job descriptions using the same taxonomy. This innovation is disruptive and solves a serious national security issue. Deidre’s leadership style combines 25 years of experience working in technology and staffing, her love of the cybersecurity community, and a genuine enthusiasm for people. She has led large-scale sales and operations and built high-performance teams at Rapid7 and Motion Recruitment prior to founding her own organizations. She believes a company-culture established on ‘anything is possible’ attitudes and open communication frameworks, along with positive energy, career advancement, and kindness, enables her teams to have fun at work and reach beyond peak performance. She also encourages the use of EQ (Emotional Intelligence) skills: self-awareness, self-regulation, motivation, social skills, and empathy. Deidre has also founded SecureDiversity.org, a non-profit organization working to raise awareness for, and increase the hiring of, women and underrepresented humans in the cybersecurity workforce. She has also spoken at some of the biggest tech summits, conferences, and podcasts in the world including ISC2 Congress, RSA, ISSA International, and Hacker Halted.
- John KindervagChief Evangelist, Illumio
John Kindervag is considered one of the world’s foremost cybersecurity experts. With over 25 years of experience as a practitioner and industry analyst, he is best known for creating the revolutionary Zero Trust Model of Cybersecurity. As Chief Evangelist at Illumio, John is responsible for accelerating awareness and adoption of Zero Trust Segmentation.
Most recently, John led cybersecurity strategy as a Senior Vice President at On2IT. He previously served as Field CTO at Palo Alto Networks and, before that, spent more than eight years as a Vice President and Principal Analyst on the security and risk team at Forrester Research.
In 2021, John was named to the President’s National Security Telecommunications Advisory Committee (NSTAC) Zero Trust Sub-Committee and was a primary author of the NSATC Zero Trust report that was delivered to the President. That same year, he was also named CISO Magazine’s Cybersecurity Person of the Year. John serves as an advisor to several organizations, including the Cloud Security Alliance and Venture Capital firm NightDragon.
- Ray CanzaneseSr. Director, Threat Research, Netskope
Ray is the Director of Netskope Threat Labs, a globally distributed team that specializes in cloud and network-focused threat research. His research background includes malware detection and classification, cloud app security, web security, sequential detection, and machine learning. Although his current focus is cybersecurity, his research has previously spanned other domains, including software anti-tamper and electronic warfare. In addition to his extensive research experience, Ray also has a background in education, teaching multiple math and programming courses during his academic career. He holds a Ph.D. in Electrical Engineering from Drexel University.
- Janet LawlessCEO & Founder, Center for Threat Intelligence
Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge holistic threat intelligence program including assessments, consulting and training. Janet’s former leadership roles at Microsoft and Cisco, creating and managing global programs focused on compliance and security, in addition to her work at a cyber-security start-up, brings a wealth of knowledge in security services. Janet is currently the Chair for ASIS International Puget Sound Chapter, and former Committee Chair for Women in Security. She is Chair Emeritus for the Pacific Coast Analyst Roundtable and a former Board Member for the American Red Cross. She is also a member of InfraGard, the United States Secret Service Cyber Fraud Task Force and the Washington State Fusion Center.
- Roy Wattanasin, ModeratorResearch Security Officer, Massachusetts Institute of Technology
Roy Wattanasin is an information security professional. Additionally, Roy is an avid speaker who has spoken at many conferences and webinars. Roy also enjoys data forensics & incident response and building security in. He is heavily involved with many computer security groups including OWASP Boston, ISSA and the local communities. Roy is also a member of multiple advisory groups. He was an adjunct instructor at Brandeis University as part of the Health and Medical Informatics and is also the co-founder of that program. He is credited for bringing back the Security BSides Boston conference (setting the standards) and enjoys seeing it grow each year and being successful with its new team members.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
With more than 25 years at the forefront of AI, cloud, enterprise technologies, cybersecurity, privacy, and risk management, VJ is a proven leader, trusted advisor, and strategic investor. He has a demonstrated history of building and scaling successful programs for global enterprises and transforming innovative concepts into impactful products.
As a trusted Board advisor and subject matter expert, VJ guides organizations through intricate digital landscapes, fostering both innovation and strategic foresight. He brings particular value to Audit & Risk Management committees, where he rigorously evaluates and audits technology and cybersecurity organizations and programs, ensuring their veracity, efficiency, resilience, and strategic effectiveness.
A sought-after advisor across expert, incubator, and accelerator networks, VJ empowers VC and PE firms with incisive market analysis, competitive intelligence, and opportunity mapping.
VJ currently applies his diverse skills as the Founding Partner of CYFORIX, a strategic defense and technology risk advisory group, and as CEO of TORQE, a specialized firm focused on solution engineering and transformation.
- Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Chris BaroneSecurity Architecture Lead, Convenience Retail
Currently the Lead Security Architect at Wawa, Chris has had multiple roles developing process and evangelizing security functions to the rest of the organization. Chris' undergraduate degree is from Drexel University, and he holds a Master's in Cybersecurity Strategy from George Washington University.
- Sean BehanSr. Offensive Security Engineer, Confidential
- Steve RileyField CTO, Netskope
Steve Riley is a Field CTO at Netskope. Having worked at the intersection of cloud and security for pretty much as long as that’s been an actual topic, Steve offers that perspective to field and executive engagements and also supports long-term technology strategy and works with key industry influencers. A widely-renowned expert speaker, author, researcher, and analyst, Steve came to Netskope from Gartner, where for five years he maintained a collection of cloud security research that included the Magic Quadrant for Cloud Access Security Brokers and the Market Guide for Zero Trust Network Access. Before Gartner, Steve spent four years as Deputy CTO of Riverbed Technology and held various security strategy and technical program management roles at Amazon Web Services for two years and at Microsoft for eleven years. Steve's interest in security began all the way back in 1995, when he convinced his then-employer that it would be a good idea to install a firewall on their brand new internet connection.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn insights and best practices from cybersecurity leaders and solution providers. Sign up for free!
