Speaker Directory
  • speaker photo
    Christopher Hass
    Director of Information Security and Research, Automox
  • speaker photo
    Julia Voo
    Cyber Fellow, Harvard Kennedy School, Belfer Center for Science and International Affairs

    Julia Voo is a Cyber Fellow and leads the team behind Belfer's National Cyber Power Index. She was formerly the Research Director for the China Cyber Policy Initiative.

    Her areas of research concern geotech strategy including the Digital Silk Road, industrial policy, and technical standards for strategic technologies.

    Voo has re...

  • speaker photo
    Tony Anscombe
    Chief Security Evangelist, ESET

    Tony Anscombe is Global Security Evangelist and Industry Partnerships Ambassador for EST, where he serves to increase ESET’s public awareness initiatives and strengthen relationships with new and existing partners.

    Anscombe joined ESET from Avast (which acquired his former employer AVG) where he held the title of Senior Security Evange...

  • speaker photo
    Tom Utley
    Sr. Presales Systems Engineer, Arctic Wolf

    Tom Utley is a senior presales systems engineer with Arctic Wolf Networks based out of the Charlotte area. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer and solution archite...

  • speaker photo
    Allan Liska
    Sr. Security Architect, Recorded Future

    Allan Liska is a senior security architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security pos...

  • speaker photo
    Michael Doyle
    Principal Consultant, Secure Development Practice Lead, Synopsys
  • speaker photo
    Dwayne Dreakford
    Solutions Architect, Sonatype
  • speaker photo
    Richard Melick
    Sr. Technical Product Marketing Manager, Automox

    Richard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.

  • speaker photo
    Etay Maor
    Chief Security Officer, IntSights

    Etay Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in...

  • speaker photo
    Gina Scinta
    Sr. Solutions Architect, Thales

    Gina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the IT profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data usin...

  • speaker photo
    Rick Holland
    CISO and VP of Strategy, Digital Shadows

    Rick has more than 15 years' experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently co-chair ...

  • speaker photo
    Chris Goettl
    Sr. Director, Product Management, Ivanti

    Chris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events...

  • speaker photo
    Lee Psinakis
    Cloud Security Sales Specialist, Check Point Software Technologies

    Lee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.

    Before joining Check Point, Lee held Sales, Management and Business...

  • speaker photo
    Eric Skinner
    VP, Market Strategy, Trend Micro
  • speaker photo
    Tim O'Connor
    Manager of Knowledge Services, Cadre Information Security

    Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including PCI-QSA, CISA, CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written...

  • speaker photo
    James Ellis
    Detective First Lieutenant, Commander, Michigan Cyber Command Center (MC3), Michigan State Police

    Detective First Lieutenant Jim Ellis is the commander of the Michigan State Police Cyber Section within the Intelligence Operations Division. He leads a cyber team of 56 MSP members located at 7 offices throughout Michigan. He has oversight over the Michigan Cyber Command Center (MC3), Computer Crimes Unit (CCU), and the Michigan region of th...

  • speaker photo
    Edward Roberts
    Director of Product Marketing, Imperva

    Edward Roberts leads Product Marketing for Imperva Advanced Bot Protection. Prior to Imperva he led marketing at Distil Networks and has over twenty years of experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Softw...

  • speaker photo
    Ran Rosin
    Director, Product Management, Imperva

    Ran Rosin Joined Imperva two years ago and is currently leading the Cloud Data Security solution. Prior to joining Imperva, Ran founded and lead two start-ups in the area of mobile Application and IoT.

  • speaker photo
    Phillip Wylie
    Sr. Red Team Lead, Kimberly-Clark Corporation

    Phillip Wylie is the Senior Red Team Lead for a global consumer products company, Adjunct Instructor at Dallas College, and The Pwn School Project founder. With over 22 years of experience, he has spent the last eight plus years as a pentester. His passion for mentoring and education inspired him to start teaching and to found The Pwn School ...

  • speaker photo
    Tod Beardsley
    Research Director, Rapid7

    Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, ...

  • speaker photo
    Glenn Kapetansky
    Sr. Principal & CSO, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...

  • speaker photo
    Thomas Blade
    Presales System Engineer, Arctic Wolf
  • speaker photo
    Ryan Gritt
    Solutions Architect, ReliaQuest
  • speaker photo
    Myla Pilao
    Director, Technology Marketing, Trend Micro
  • speaker photo
    Susan St. Claire
    CxIAST Evangelist and SME, Checkmarx
  • speaker photo
    Eric Wolff
    Sr. Product Marketing Manager, Cloud and App-layer Data Protection, Thales Cloud Security

    Eric Wolff is a Senior Product Marketing Manager for Thales application-layer data protection and solutions for public cloud security. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications, a...

  • speaker photo
    Jonathan Nguyen-Duy
    VP, Global Field CISO Team, Fortinet
  • speaker photo
    Kevin Dillaway
    Cloud Security Architect, Optiv
  • speaker photo
    Sami Laine
    Director, Technology Strategy, Okta
  • speaker photo
    Kelsey Nelson
    Sr. Product Marketing Manager, Okta

    Kelsey Nelson is a Senior Product Marketing Manager at Okta, leading workforce IT and security solutions, including getting beyond the buzzword of "Zero Trust." Prior to joining Okta, she led product and business communications at tech startups varying from enterprise software to edtech to consumer music hardware, and prior to that taught sec...

  • speaker photo
    David Masson
    Director of Enterprise Security, Darktrace

    David Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various u...

  • speaker photo
    Susan Hanson
    Vice President, Human Resources, Provation Medical

    Susan has over 20 years of healthcare experience in Human Resources and Compliance. Susan joined the Provation team in 2017 and brings her experience of building and growing high-performing teams with a dynamic, results-oriented culture and strong leadership. Susan also has experience in healthcare compliance specifically in HIPAA and HITECH ...

  • speaker photo
    Paul Lanzi
    Co-Founder & COO, Remediant

    Paul Lanzi, is the co-founder and COO of Remediant. Remediant is a cybersecurity startup focused on delivering a new approach Privileged Access Management. Paul and his co-founder at Remediant, Tim Keeler, worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At eac...

  • speaker photo
    Mark Spencer
    Regional Sales Manager and Account Executive, AccessIT Group
  • speaker photo
    Adam Waltman
    Sr. Manager, Sales Engineering, Malwarebytes
  • speaker photo
    Eddie Doyle
    Global Security Strategist, Check Point Software Technologies

    Edwin Doyle communicates with international leaders in cybersecurity, cyber forensics, and cyber law enforcement, across the world. Taking best practices for threat mitigation from the industry’s finest CISOs and from police and military cyber command, Edwin’s responsibilities include sharing cyber defense tactics with media, government agenc...

  • speaker photo
    Moderator: Tom Brennan
    CIO/CTO, Mandelbaum Salsburg P.C.
  • speaker photo
    Andre Alves
    Cloud Security Architect, Trend Micro

    Andre Alves has been helping companies to achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a certified AWS Solutions Architect and Hybrid Cloud Security trainer.

  • speaker photo
    Nathan Wenzler
    Chief Security Strategist, Tenable, Inc.
  • speaker photo
    Martyn Crew
    Director of Product Marketing Management, Gigamon
  • speaker photo
    Gurinder Bhatti
    Sr. Sales Engineer, Okta
  • speaker photo
    Somer Hernandez
    Solutions Architect, ReliaQuest
  • speaker photo
    John Davies
    Sr. Presales Systems Engineer, Arctic Wolf
  • speaker photo
    Dean Gross
    Identity and Security Architect, Insight Cloud + Data Center Transformation
  • speaker photo
    Kazbek Khumush
    Trend Micro
  • speaker photo
    Brian Rossmeisl
    Sr. Security Architect, AccessIT Group
  • speaker photo
    Bob Pacheco
    Principal Risk Management Architect, Eurofins
  • speaker photo
    Joseph Acosta
    Director, Security Operations, Delta Risk
  • speaker photo
    Marc Keating
    Security Evangelist, Arctic Wolf
  • speaker photo
    Richard Schunk
    Major Accounts Systems Engineer, Palo Alto Networks
  • speaker photo
    Mike Lloyd
    CTO, RedSeal Networks

    Dr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-...

  • speaker photo
    James Sheldrake
    Enterprise Sales Engineer, Egress Software Technologies Ltd
  • speaker photo
    Kevin Romero
    Sales Engineer, ReliaQuest
  • speaker photo
    Kevin Kennedy
    Sr. Sales Engineer, Malwarebytes
  • speaker photo
    Nick DeLena
    Principal, IT Risk Assurance & Advisory, DGC (DiCicco, Gulman & Company)
  • speaker photo
    Mark Ostrowski
    Head of Engineering, East US, Check Point Software Technologies
  • speaker photo
    Davitt J. Potter
    Director, MSSP and Channels, Americas, Digital Shadows

    Born and raised in the Black Hills of South Dakota, Davitt has over 25 years of experience in the OEM, VAR & MSSP channels realm. From starting as a field services engineer fresh from school at the South Dakota School of Mines and Technology, and eventually defining and managing IT operations and strategy for numerous companies in a CTO capac...

  • speaker photo
    Michael Lopez
    Director of Cloud Services, AccessIT Group

    Mike Lopez, Director of Cloud Services at AccessIT Group, has a history of designing cloud architecture with a security focused approach for government and fortune 500 clients. He has worked with private and public cloud environments including AWS, Azure, Oracle, and Google Cloud. Mike leads AccessIT Group’s Cloud practice by helping its cust...

  • speaker photo
    Marc Ybarra
    Distinguished Solutions Engineer - North America, Alert Logic
  • speaker photo
    Erika Barber
    Director of Compliance and Privacy, Boston Medical
  • speaker photo
    Gillian Lockwood
    Enterprise Information Security Program Administration and Governance, Partners Healthcare
  • speaker photo
    Brian Carey
    Manager, Advisory Services, Rapid7

    Brian Carey is a Rapid7 Manager of Advisory Consulting, specializing in: Security Program Assessments, Security Program Development, Risk Management, Vulnerability Management Program Development, Security Awareness and Policy Development. Before joining Rapid7 Brian was Information Security Director and interim Security Officer at LafargeHolc...

  • speaker photo
    Adam Winn
    Product Manager, Cisco Umbrella, Cisco

    Adam Winn is the platform product management lead for Cisco Umbrella. He got into cloud security product management in 2013 and never looked back. In 2016, he joined OpenDNS shortly before it was rebranded as Cisco Umbrella. He is a life-long California resident and a fan of live music (and can't wait for it to come back).

  • speaker photo
    Yuk Fai Chan
    Co-Leader, OWASP Toronto Chapter

    Yuk Fai Chan is Co-Leader of the OWASP Toronto chapter, where he actively promotes software security within the Toronto community. Professionally, Yuk Fai is a Co-Founder at Proack Security Inc., a Toronto-based information security consulting firm. He specializes in application security, penetration testing, threat modelling, security incide...

  • speaker photo
    Bobby Modha
    Security Consultant, Security Compass

    Bobby Modha is a Security Consultant with Security Compass. He specializes in security assessments in the application security space including web application, APIs and mobile app penetration testing. In his spare time, Bobby enjoys working on personal projects such as developing scripts and participating in capture-the-flags.

  • speaker photo
    Keyaan Williams
    Founder and Managing Director, CLASS, LLC
  • speaker photo
    Melvin Crum
    Chief Informatics Officer, Centers for Disease Control & Prevention
  • speaker photo
    Jeremy Castleman
    Cloud Security Specialist, Check Point Software Technologies

    Jeremy Castleman is the Cloud Security Specialist supporting the Cloud Team for Check Point Software Technologies. Jeremy brings 15 years of experience in technology sales, marketing, business development and cloud migration services in the partner ecosystem. He has worked in multiple countries around the world, in various markets, and across...

  • speaker photo
    Achint Sehgal
    Global Head of Solutions Engineering, OneTrust

    Achint Sehgal, CIPP/E, CIPM, serves as a Global Head of Solutions Engineering for OneTrust Vendorpedia—a purpose-built software designed to operationalize third-party risk management. In his role, Sehgal advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, fra...

  • speaker photo
    Ernest Dunn
    Regional Partner – Mid Atlantic, GuidePoint Security
  • speaker photo
    Moderator: Eric Mims
    Director, Enterprise IT Security & CISO, University of Houston
  • speaker photo
    Greg Thompson
    CISO & VP, Manulife
  • speaker photo
    Robert Wong
    Executive Vice-President, Chief Information Officer, Toronto Hydro

    Robert Wong is EVP & CIO at Toronto Hydro, responsible for information technology, operational technology, cyber security, and telecommunications. Robert was also Chief Risk Officer, responsible for corporate enterprise risk management, strategic planning, corporate governance, and business continuity.
    Robert is on the Board of Directo...

  • speaker photo
    Lois Tullo
    Executive in Residence, Global Risk Institute; CFRO/CCO, Novera Capital, Risk Management Faculty, Schulich School of Business, York University
  • speaker photo
    GuidePoint Security
  • speaker photo
    Nick Ritter
    CISO, First Financial Bank

    Nick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost...

  • speaker photo
    Kai Pfiester
    Founder & Chief Security Architect, Black Cipher Security
  • speaker photo
    James Goepel
    Treasurer and Member, Board of Directors, Cybersecurity Maturity Model Certification (CMMC) Accreditation Body

    James Goepel is Treasurer and Member, Board of Directors for the CMMC-AB. He is also an adjunct professor of Cybersecurity at Drexel University and CEO of Fathom Cyber, a trusted agent for senior management and developer of defensible cybersecurity strategies. Jim earned his BSECE from Drexel and his JD and LLM degrees from George Mason Unive...

  • speaker photo
    Edward Ettorre
    Operational Risk Consultant, Wells Fargo

    Ed is an Operational Risk Consultant working within the Technology Information Security group. He has been with Toastmasters International (TMI) since 1997 and has multiple certifications from TMI. Ed is a resourceful, creative, and solution-oriented person who was frequently able to come up with new and innovative approaches to his assigned ...

  • speaker photo
    Devon Campbell
    Digital Forensic Examiner, TransPerfect Legal Solutions

    Devon Campbell is a Digital Forensic Examiner at TransPerfect Legal Solutions in the Forensic Technology and Consulting division. Devon has experience conducting forensic examinations of mobile devices, computers, social media data, cloud-based data, and email data. Prior to joining TransPerfect Legal Solutions, Devon earned her Master's degr...

  • speaker photo
    Christina Griffin
    IT Security and Risk Manager, Chatham Financial

    Cybersecurity professional specializing in risk management and information security. She holds an MBA, a master’s in information technology leadership, and also has a CISSP certification. She has professional experience working in both higher education and finance industries and is currently employed as an IT Risk and Security Manager at Chat...

  • speaker photo
    Tedrick Housh
    Partner, Lathrop GPM LLP

    Tedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the ...

  • speaker photo
    Steve Hengeli
    Attorney at Law, Polsinelli

    With a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technolog...

  • speaker photo
    Nan L. Grube
    Consulting Attorney, PBL Consulting

    Owner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandabl...

  • speaker photo
    Moderator: Scott Laliberte
    Chapter President, ISSA Delaware Valley Chapter

    Scott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Scott also leads Protiviti’s Emerging Technology practice where he enables clients to leve...

  • speaker photo
    Brice Taylor
    Special Agent, FBI
  • speaker photo
    Jason Patel
    Chief Technology Officer, Ensighten

    As Chief Technology Officer Jason leads the Product and Engineering teams at Ensighten. Being part of Ensighten’s development team over six years ago when the Tag Management Platform was first designed gives him a unique perspective and experience on all our solutions; he has hence been influential in designing and implementing the majority o...

  • speaker photo
    Sunny Notani
    Special Agent, United States Secret Service

    Sunny Notani has worked as a Special Agent for the United States Secret Service for 18 years. SA Notani was initially assigned to the New York Field Office (NYFO) for eight years. During his time in the NYFO, SA Notani specialized in Financial Institution Fraud, Electronic Crimes, Network Intrusions, and Social Engineering. SA Notani was assi...

  • speaker photo
    RJ Sudlow
    IT Advisory Manager, Dixon Hughes Goodman LLP
  • speaker photo
    Steve Magowan
    Director, Data Protection and Resiliency, Royal Bank of Canada

    Steve Magowan is Director of Data Protection with the Royal Bank of Canada. A Veteran of the Canadian Airforce, since retiring Steve has spent the past 20 years engaged in a wide assortment of Risk Focused, Data Protection, Security Architecture & Enterprise Risk Management initiatives.

    Including the remediation of active security...

  • speaker photo
    Moderator: MJ Couldridge
    Director, Business Development, Canadian Cyber Threat Exchange

    MJ Couldridge is the Director of Business Development for the Canadian Cyber Threat Exchange. The CCTX is Canada’s threat sharing hub for all companies doing business in Canada. It provides analysis and enables collaboration of cyber security insights impacting Canada. Providing both a cross-industry and by-industry context, it serves small, ...

  • speaker photo
    Sabrina Stanich
    Cybersecurity Manager, Darktrace

    Sabrina Stanich is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from financial services to manufacturing, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting an...

  • speaker photo
    Will Mishra
    Cybersecurity Manager, Darktrace

    Will Mishra is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autono...

  • speaker photo
    Taylor Lehmann
    CISO, athenahealth

    Taylor Lehmann is the VP and Chief Information Security Officer at athenahealth, a healthcare information technology organization with headquarters in Watertown, MA and operations around the world. Taylor has been in information security and risk management for over 15 years. He was most recently the CISO at Wellforce, an eastern MA-based, Tu...

  • speaker photo
    Myles Kellerman
    Chief Cybersecurity Analyst, Alpine Security

    Myles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many ...

  • speaker photo
    Lauren Provost
    Professor, Computer Science, Western Governors University

    Dr. Lauren E. Provost is an ethical hacker, author and professor. She directs The Ethical Hackers Cybersecurity organization, a virtual community for educators and industry providing comprehensive planning and risk management updates, network and cloud security knowledge and information on other cybersecurity topics such as general penetratio...

  • speaker photo
    Sam Rastogi
    Product Marketing Director, Illumio

    Sam Rastogi is a veteran of the security industry with 18+ years experience marketing leading security products at Illumio, Palo Alto Networks, Cisco Systems, HP Enterprise, McAfee, Juniper Networks, and Oracle. Sam is a Product Marketing Director at Illumio, where he is responsible for leading go-to-market and marketing activities for zero t...

  • speaker photo
    Leland Dean
    VP, Global Corporate Security, Bank of New York Mellon

    Leland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).

    Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal ...

  • speaker photo
    Nathan Wilcox
    Sr. Security Architect, GuidePoint Security
  • speaker photo
    Patrick Keenan
    Principal Security Engineer, GuidePoint Security

    Splunk Master Flex

  • speaker photo
    Torry Crass
    Cyber Security Advisor, N.C. State Board of Elections

    Torry Crass currently serves as a Cyber Security Advisor at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.

    Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry...

  • speaker photo
    Brian Neesby
    CIO, N.C. State Board of Elections

    Brian Neesby is the CIO of the State Board of Elections. Prior to this role, he was the Chief Data Officer. Brian has served as a fact witness, been deposed several times, and executed declarations on behalf of the State Board concerning his knowledge of North Carolina’s Statewide Voter Registration Database. He investigated data discrepanc...

  • speaker photo
    Michael Dickerson
    Director, Mecklenburg County Board of Elections

    Michael Dickerson is currently the Director of Elections for Mecklenburg County and has held this position since 1998.
    Prior to coming to Charlotte, Mr. Dickerson was with the Federal Election Commission as a Deputy Assistant Staff Director. Mr. Dickerson spent 14 years at the Federal Election Commission.

    Currently he is a membe...

  • speaker photo
    Karen Brinson Bell
    Executive Director, N.C. State Board of Elections

    Karen Brinson Bell was appointed executive director of the State Board of Elections on May 13, 2019, and began her tenure on June 1. As the state’s chief elections official, she leads about 70 full-time employees at the state agency, which is charged with administering elections and overseeing the 100 county boards of elections, as well as ca...

  • speaker photo
    Moderator: Patrick Gannon
    Public Information Officer, N.C. State Board of Elections

    Patrick Gannon has been the public information officer at the State Board of Elections since October 2016, just before the presidential election. He came to the State Board after a 17-year career in journalism, most recently as editor of The Insider State Government News Service and syndicated columnist covering state politics for the Capitol...

  • speaker photo
    Moderator: Boris Vishnevsky
    Board Member and Technology Strategist, Cloud Security Alliance - Delaware Valley (CSA-DV)

    Boris Vishnevsky, MBA, CISSP, DIA is a board member and advisor of the Cloud Security Alliance- Delaware Valley Chapter, Distinguished IT Architect of the Open Group and is a frequent speaker and presenter, taking part in review panels and advising innovative Cyber Security Companies. Mr. Vishnevsky is a solutions principal advising companie...

  • speaker photo
    Marc Tabago
    Solutions Engineer, Trend Micro

    As a Solutions Engineer, Marc Tabago works with enterprises to solidify and strengthen their digital security policies against malicious threat actors. However, he believes that having a concrete digital security posture starts at the use case level, driven and experienced by its users and not simply read off a PowerPoint slide. Once the dust...

  • speaker photo
    Justin Bourgeois
    Sales Engineer, Mimecast

    Justin Bourgeois is a Solution Engineer at Mimecast. He has a background in implementation project management, IT consulting and has spent his off time programming as a hobby. Justin’s main responsibility is educating people about the ever-evolving threat landscape that not only threatens their infrastructure but also their partners and the g...

  • speaker photo
    Joe Zurba
    CISO, Harvard Medical School

    In his role as the leader of Information Security at Harvard Medical School, Joe Zurba has been responsible for defining and building capabilities to meet the requirements of an extraordinarily diverse community of clinical and research faculty, students, and staff. Joe develops strategy, improves capabilities, and manages risk for all inform...

  • speaker photo
    Michael Anaya
    Supervisory Special Agent, Cyber, FBI (Prior)

    Michael F. D. Anaya is the Head of Global Cyber Investigations for DEVCON. Before DEVCON, he spent approximately 14 years with the FBI. He began his career as a Special Agent in the FBI’s Los Angeles field office, addressing complex cyber matters–he led numerous investigations including one that resulted in the first federal conviction of a U...

  • speaker photo
    Tony Howlett
    CISO, SecureLink

    Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP and GNSA certifications, and a B.B.A in Management Information Systems. Tony is curre...

  • speaker photo
    Ian Woolley
    Chief Revenue Officer, Ensighten

    Ian’s impressive background and management expertise in digital marketing and advertising are fueling his success in driving adoption of Ensighten’s solutions worldwide. Ian started his career at Dun & Bradstreet Europe before working at Interpublic Group’s Draft Digital as Managing Director. After building his own premium publisher business,...

  • speaker photo
    Samara Williams
    Threat Intel Engineer, Cardinal Health

    Samara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about ...

  • speaker photo
    Melisa Ozcan
    Cybersecurity Account Executive, Darktrace

    Melisa Ozcan is a Cyber Security Account Executive at Darktrace, the world’s leading AI company for cyber defense. At Darktrace, Melisa works with leading organizations in a range of industries from private equity to media and entertainment to deploy and operationalize cutting edge technologies. During Melisa’s tenure at Darktrace, the compan...

  • speaker photo
    Kelley Misata
    CEO, Sightline Security

    Dr. Kelley Misata, CEO of Sightline Security, President and Executive Director of OISF (Suricata), and former Director of Communication of The Tor Project - a cyber and information security executive with 15+ years of experience in cyber and information security, marketing, and communications. Expert in bridging the gap between technical and ...

  • speaker photo
    Sergeant Michael Davis
    Cyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center Unit

    Sgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Ho...

  • speaker photo
    Michael Butterfield
    Regional Architect - Mid-Atlantic, Check Point Software Technologies

    Michael Butterfield is Security Architect at Check Point, where he supports 30+ engineering teams responsible for hundreds of customers across the Mid-Atlantic. He is primarily focused on helping enterprises design, consolidate, and integrate security controls into emerging technology platforms. Over an 18-year career in cybersecurity, Michae...

  • speaker photo
    Andrew Hoover
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Andrew Hoover is a Senior Engineer with the CERT Division of Carnegie Mellon University’s Software Engineering Institute. As a member of the Cybersecurity Assurance Team, he performs risk and resilience management work for a variety of organizations, mostly relating to critical infrastructure protection. Andrew has 16 years of experience in i...

  • speaker photo
    Katie Stewart
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Katie Stewart is a senior member of the technical staff within the CERT® Division at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. She has more than 15 years of experience advising clients in engineering, information technology, and telecommunications industries. Katie’s current research int...

  • speaker photo
    Juan Marin
    Sales Engineer Manager, IntSights

    A cybersecurity professional and avid technologist advocate with 10 years of experience in effective cyber-security practices, advanced threat prevention, malware and incident response; Juan has worked with the likes of McAfee/Intel Security and Trend Micro in the past, fulfilling technical sales, advisory and customer success roles, and toda...

  • speaker photo
    John Amaral
    Head of Product, Cloud Security, Cisco

    John Amaral is the Head of Product for Cisco Cloud Security. In this role, he is responsible for product management, planning and strategy for Cisco's leading cloud security offerings including Cisco Umbrella and Cisco Cloudlock. John joined Cisco through the acquisition of Cloudlock, where he was Head of Product; responsible for product deve...

  • speaker photo
    Stacy Harper
    Partner, Spencer Fane LLP

    Stacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and ...

  • speaker photo
    Moderator: Benjamin Agner
    Sr. Manager, Global Security, Aflac Subsidiary Security
  • speaker photo
    Rick Doten
    CISO, Carolina Complete Health, VP, Information Security, Centene Corp.

    Rick is CISO of Carolina Complete Health, a state healthcare plan for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industrie...

  • speaker photo
    Dr. Atefeh (Atty) Mashatan
    Founder & Director, Cybersecurity Research Lab, Ryerson University

    Dr. Atefeh (Atty) Mashatan is the Founder and Director of the Cybersecurity Research Lab at Ryerson University. SC Magazine recognized her as one of top five Women of Influence in Security globally in 2019. She joined the School of Information Technology Management of Ryerson University in 2016 focusing on Information Systems Security, Crypto...

  • speaker photo
    Rob Dalzell
    Vulnerability Management, Global Bank

    Rob Dalzell is a cybersecurity professional with over 30 years of information technology experience and 10 years of cybersecurity experience. He currently works in Cyber Security Defense for a global financial institution helping to transform the way it manages cyber security vulnerabilities. Rob has thrived in the following cybersecurity bas...

  • speaker photo
    James Keegan
    Director, Information Security, Essent Guaranty, Inc.
  • speaker photo
    Tammy Klotz
    CISO, Covanta

    Prior to Covanta, Tammy was responsible for the cybersecurity program at Versum Materials, which included Information Risk Management, Plant Cybersecurity, as well as IT Security, Risk & Compliance activities. She was with Versum since their start-up in October 2016 and was responsible for standing up all security services required for the ne...

  • speaker photo
    ACP Local Chapter
  • speaker photo
    Pete Murphy
    IT Advisory Executive, CareSource

    Pete Murphy is a well-established leader, builder and collaborator with high standards for personal integrity and a bias for action. He has demonstrated senior level leadership experience building, growing, improving and operating business systems and processes as a CIO, CTO, CISO, Risk Leader and Data and Analytics executive.
    He speci...

  • speaker photo
    Joshua Cloud
    Director of Information Security, NFI

    Joshua Cloud is currently serving as the director of information security for NFI. He has over 20 years of infrastructure and security leadership experience spanning professional services, manufacturing, retail, and logistics industries in countries all over the world. Cloud is a transformational security leader with a business focus who evan...

  • speaker photo
    Paul Ihme
    Co-Founder & President of Consulting Services, Soteria

    Paul is an accomplished Security Professional with 14 years of experience in multiple information technology domains, specializing in computer network exploitation, computer network defense and security incident response. His expertise includes planning, coordinating and performing offensive computer operations.
    Paul leads the firm’s ma...

  • speaker photo
    Douglas Jambor
    Sr. Cybersecurity Manager - IT Advisory, Dixon Hughes Goodman LLP

    Douglas has 13 years of penetration testing experience in the information technology field, focusing on information systems security and information security risk management. He is DHG’s cybersecurity subject leader and manager over all of the firm’s technical cybersecurity services, which includes internal, external, wireless and web applica...

  • speaker photo
    Trend Micro
  • speaker photo
    Kevin Dreyer
    IT Director & CISO, Maple Reinders Group

    Kevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the...

  • speaker photo
    Jana White
    COO, Alpine Security

    Jana White is the Chief Operating Officer of Alpine Security. Jana has an extensive background in banking, compliance, and loss prevention and serves as one of the virtual CISOs for Alpine Security clients. Jana has degrees in criminal justice and cybersecurity and is certified as a crime scene evidence technician. She also holds many cyber...

  • speaker photo
    Olivera Zatezalo
    Chief Security Officer, Huawei Canada

    Olivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada’s operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Olivera is best known for creating value through collaborative leadership style, agi...

  • speaker photo
    Kenrick Bagnall
    Detective Constable, Coordinated Cyber Centre (C3), Toronto Police Service, Former VP of IT at Capital G Bank

    Kenrick has been a member of the Toronto Police Service since April of 2006 and currently serves as an investigator in the Coordinated Cyber Centre (C3) section of Intelligence Services. Before this Kenrick spent 20 years in the Information Technology industry primarily in the financial services sector, holding positions of Senior Network Ana...

  • speaker photo
    Tamika Puckett
    Chief Risk Officer, City of Chicago

    As the City of Chicago’s newly appointed Chief Risk Officer, Ms. Puckett is responsible for implementing and managing the city’s enterprise risk management governance framework, to include the implementation of policies and procedures to identify and manage organizational risks. A career risk manager, Ms. Puckett possesses over 15 years of ex...

  • speaker photo
    Tanya Tipper-Luster
    IT Audit/Advisory Professional, Wyndham Destinations

    Tanya Tipper-Luster has spoken at cyber conferences such as the (ISC)2 Security Congress and was featured as a cybersecurity expert in the Orlando Business Journal. She is a Cybersecurity Audit thought leader and visionary. She represents the alignment of emerging technology, critical business processes and key cybersecurity controls to infl...

  • speaker photo
    Robert Ryba
    Sr. IT Audit / Advisory, Wyndham Destinations

    Robert Ryba has spoken at cyber conferences such as the (ISC)2 Security Congress. He is a Certified Public Accountant and Certified Information Systems Auditor with an Internal Audit and Cybersecurity background. As a millennial who is deeply passionate about information technology, he is motivated to learn why millennials are so indifferent...

  • speaker photo
    Ethan Strayer
    Sr. IT Advisory Analyst, Wyndham Destinations

    Ethan Strayer has spoken at cyber conferences such as the (ISC)2 Security Congress. Ethan is a Certified Information Systems Auditor, Cybersecurity and Information Technology (IT) Governance Risk and Compliance professional. He supports the Company's risk tolerance while also improving the IT posture of the organization. Ethan specializes in...

  • speaker photo
    Chris Turley
    Leader, RISC Education & Awareness, FIS

    I lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previo...

  • speaker photo
    Brian Coleman
    Associate CIO, Information Security Officer , University of Massachusetts Medical School

    Brian is a seasoned leader, Chief Information Security Officer, and IT executive. His experience spans Insurance, Financial Services, Health Care, and Cloud Security. His specialty is optimizing Information Security and Risk Management / Compliance organizations, his passion is employee mentorship, continuous improvement and process developme...

  • speaker photo
    Donna Ross
    SVP & CISO, Radian Group

    Donna L. Ross was appointed to her current position as Senior Vice President, Chief Information Security Officer in July 2016. In this role she is responsible for Radian’s information security program and business compliance, as well as the enterprise project management and initiative governance programs.

    Donna is a senior security and...

  • speaker photo
    Moderator: Nancy Hunter
    VP & CISO, Federal Reserve Bank of Philadelphia

    Nancy Hunter is the VP, CISO and Data Privacy Security Officer at the Federal Reserve Bank of Philadelphia. With more than 25 years of experience in technology including 15 years in Information Security, Nancy joined the Federal Reserve Bank in 2017 where is accountable for Information Security Operations and Consulting, Information Risk Mana...

  • speaker photo
    Mark Eggleston
    VP, Chief Information Security and Privacy Officer, Health Partners Plans
  • speaker photo
    Joshua Sorenson
    Sr. Director, Global Security, Equifax

    Joshua is a Global Information Security Leader with 14 years of professional experience. Joshua currently serves as Equifax's Senior Director of Global Mainframe Security where he has responsibility for transforming zSeries platform security around the world. Prior to joining Equifax, Joshua served in security leadership roles, leading transf...

  • speaker photo
    Ted Demopoulos
    Principal, Demopoulos Associates

    Ted Demopoulos’ professional background includes over 35 years of experience in Information Security and Business, including over 30 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent...

  • speaker photo
    Joel Lowe
    Director of Physical and Cyber Security, Red Ventures

    Joel Lowe has more than 14 years of experience in remediating threats, vulnerability management, risk management, data privacy, and information security programs. These programs focus on overseeing private data protection, corporate governance, risk management strategy, Certification & Accreditation, Incident Response, forensics and executive...

  • speaker photo
    Canadian Cyber Threat Exchange (CCTX)

    The Canadian Cyber Threat Exchange (CCTX) is a sharing hub and collaboration organization that provides insight into cyber events directly impacting Canadian business, along with mitigation options and tools to combat identified threats. Learn about the CCTX and enjoy a special, CCTX-hosted guest presentation. Details available soon.

  • speaker photo
    Ken E. Sigler
    Board of Advisors, University of Detroit Mercy, Center for Cybersecurity and Intelligence Studies

    Ken Sigler has served as a full-time faculty member of the Computer Information Systems program at the Auburn Hills Michigan campus of Oakland Community College since 2001, while his primary research is in the area of cybersecurity education, policy, and management; software management; and software assurance. Ken serves as the Liaison for th...

  • speaker photo
    Daniel Goldenberg
    Director, IT Infrastructure, Barton Associates

    Dan is a business results-focused information technology leader with a background in information security, infrastructure, and technical operations; experiences range from fledgling start-ups to enterprise corporate environments.

  • speaker photo
    Tammy Moskites
    Ponemon Institute Distinguished Fellow, Career CISO & Former CISO, Time Warner Cable; CEO & Founder, CyAlliance

    Tammy is the CEO and Founder of CyAlliance. She is a strategic advisor to companies, vendors and startups by leading, building and scaling security offerings while providing CISO as a Service and virtual CISO (vCISO) services for companies worldwide. With her 30 years of experience, she is noted by her peers to be a results-driven and passion...

  • speaker photo
    Moderator: Bobby Singh
    CISO and CTO, Toronto Stock Exchange
  • speaker photo
    Adam Karcher
    Cyber Special Agent, FBI

    Special Agent Adam Karcher has been with the FBI for over 16 years running cyber investigations and operations across the full spectrum of criminal and national security programs. SA Karcher's experience spans local field investigations to national and international strategic engagement against the most sophisticated cyber threats. His curren...

  • speaker photo
    Matt Donato
    Co-Founder & Managing Partner, HuntSource

    Matt Donato is a Co-Founder & Managing Partner of HuntSource- the preeminent Executive Search and Talent Solutions firm with a niche focus in Cyber Security & Data Intelligence. Matt possesses fifteen years of experience in executive recruiting, talent solutions, workforce planning, and talent management. He is a thought leader and recruiting...

  • speaker photo
    Helen Oakley
    Leader in Cybersecurity

    Helen Oakley is a cybersecurity enthusiast, researcher and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s “Canadian Women in Cybersecurity” conference. Helen holds a lea...

  • speaker photo
    (ISC)2 Local Chapter

    The International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization."

  • speaker photo
    Joe Provost
    Information Security, Avidia Bank

    Joe's been in cyber since the internet was a piece of string tied between two soup cans! He's a former Army warrant officer (network warfare), MIT Lincoln Laboratory IAM, IBM (XForce Cyber Range) “The Cave” member, teaches professional ED at MIT with the Geospatial Cyber Security group, and has a Masters in Cyber from Utica College. His forme...

  • speaker photo
    Michael Meyer
    Chief Risk and Innovation Officer, MRS BPO, LLC

    Michael Meyer, MPSTM, CISSP, CIPP/US, CIPM, FIP, CISM, CRVPM II, CRISC, CISA, is the Chief Risk and Innovation Officer of MRS BPO. He is responsible for overseeing the company’s enterprise innovation, risk management and security initiatives for its Fortune clients. Michael has been with MRS for over 20 years and previously served in the Chie...

  • speaker photo
    Don McKeown
    Information Security Manager, Wolters Kluwer Health

    Don McKeown is currently an information security manager for a provider of healthcare solutions that facilitate effective clinical decisions. There he developed and teaches a threat modeling course, teaches code scanning, contributes to corporate application security advisory committees, and consults for technical and product teams. Previousl...

  • speaker photo
    Doug Graham
    Chief Security and Privacy Officer, Lionbridge

    Doug is the Chief Security and Privacy Officer at Lionbridge Technologies, a global leader in localization and data training. He has over 20 years of global experience in the enterprise security space and brings a balance of leadership, customer focus, and technical expertise to the table. He previously served as CSO of Nuance Communications ...

  • speaker photo
    Ben Schwering
    CISO, Premiere, Inc.
  • speaker photo
    Gabriel Doncel
    Director, Information Security, Drexel University

    Gabriel Doncel joined Drexel University in 2019 where is currently Director of Information Security. He is also part of the University of Delaware and Wilmington University Adjunct Faculty. As a member of the Information Security team at Drexel, and working closely with the campus community and outside parties, his focus is to protect the peo...

  • speaker photo
    Margarita Rivera
    VP, Information Security, Risk & Compliance, LMC (a Lennar Company)

    An Information Security Executive with over 15 years of experience, Margarita Rivera has thrived her entire career on solving complex problems. Margarita has dedicated her professional journey to building Information Security Risk, Compliance and Privacy Programs and continues to do so as the Head of Information Security at LMC, a Lennar Corp...

  • speaker photo
    Brendan Campbell
    AVP, Global Technology Governance & Control, Manulife

    Brendan Campbell is currently the leader for Manulife’s Global Technology Governance & Control function and has prior experience across audit, risk management, information security. He is a part of the Global Technology Executive team and is responsible for leading the execution of risk activities globally. In addition, he is responsible for ...

  • speaker photo
    Mike Ste. Marie
    Election Security Partnership Program Manager, Secretary of the Commonwealth of Massachusetts

    Mike has over 15 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a...

  • speaker photo
    Adel Danesh
    CISO, Analytics 4 Life

    Adel Danesh has over 20 years of experience in IT and information security. Over the course of his professional career, he has been holding information security leadership roles in various organizations and spearheaded mission critical security and infrastructure projects. In his current job, Adel is a CISO at Analytics For Life, a medical re...

  • speaker photo
    Dominique West
    Sr. Cloud Security Consultant, EY, Instructor, Georgia Institute of Technology

    Dominique West is a senior consultant for Ernst & Young based in Atlanta, GA. She has eight years of experience in Information Technology, five of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries...

  • speaker photo
    Daniel Pepper
    Partner, BakerHostetler

    Dan Pepper is a partner on BakerHostetler's Privacy and Data Protection team. Utilizing 25 years of comprehensive experience in information technology, data privacy, and cybersecurity law, Dan advises clients on proactive data security practices, data breach incident response, and regulatory compliance. He frequently handles security incident...

  • speaker photo
    Michael Effiong
    Head of Cybersecurity, Tango Networks

    Michael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas,...

  • speaker photo
    Arif Hameed
    Sr. Director, Client Security, Equifax

    Arif Hameed is Senior Director at Equifax, where he leads a team that handles client cybersecurity due diligence activities including questionnaires, audits, remediation support, security schedules, etc. Prior to his role at Equifax, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third Party Cyber Risk, and IT ...

  • speaker photo
    Imran Ahmad
    Partner/ Attorney, Blake, Cassels & Graydon LLP

    Imran has a business law practice with a specialization in technology, cybersecurity, and privacy law. As part of his cybersecurity practice, Imran works closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk alloca...

  • speaker photo
    J. Zhanna Malekos Smith
    Reuben Everett Cyber Scholar and Researcher, Duke University Center on Law & Technology

    J. Zhanna Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of ...

  • speaker photo
    Larry Snyder
    Associate Professor, Bloomsburg University of Pennsylvania

    Professor Larry Snyder has nearly two decades of experience in law enforcement, fraud, and auditing in the US Army and a variety of industries, and 15 years in the field of cybersecurity education. Larry believes that cybersecurity strategists must have a broad understanding of the cyber issues facing organizations, as well as the skills need...

  • speaker photo
    Ryan Hausknecht
    Instructor, University of North Carolina at Charlotte

    Ryan Hausknecht specializes in red teaming as a Security Consultant at SpecterOps and is an instructor for cybersecurity at UNC Charlotte. He is a former Forensic Consultant, Information Security Analyst, and Penetration Tester who has dealt with clients ranging from local government to enterprise-sized businesses. Ryan graduated Summa Cum La...

  • speaker photo
    Stephen Purpura
    Founder, [Stealth Mode]

    Stephen Purpura is an American entrepreneur and an applied machine learning researcher. He has co-founded four companies that focus on evolving the future of work, including Context Relevant (renamed Versive and acquired by eSentire) and SkyEye LLC (also acquired). He holds degrees from Harvard University’s Kennedy School of Government and th...

  • speaker photo
    Karen Holmes
    VP and CISO, TrueBlue Inc.

    Karen Holmes is the Vice President and CISO at True Blue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating an innovative atmosphe...

  • speaker photo
    Tom Bechtold
    Digital Event Director, SecureWorld
  • speaker photo
    Garrett Whitney
    CIO, Delta Dental of Washington

    Garrett Whitney is the Chief Information Officer at Delta Dental of Washington, the largest dental benefits provider in Washington State. He developed a passion for technology at an early age by learning to program Pascal, C, and 8086 Assembly languages prior to graduating high school. Garrett is a veteran of the United States Navy, specializ...

  • speaker photo
    Kat Jungck
    Principal Enterprise Security Architect, F5 Networks

    Kat is an experienced cybersecurity practitioner with a background in both enterprise cybersecurity and secure product development with deep domain experience in cloud security, identity and access management, and secure product development. Kat enjoys working with local cybersecurity chapters and programs to recruit and develop the next gen...

  • speaker photo
    Brian Shea
    Director of Security - GRC, Microsoft

    Brian is an IT Executive with 25 years of experience from IT Operations and Support, Security, through Compliance, Risk Management, and Technology Innovation. As part of his tenure at Microsoft he has been supporting Supply Chain security and compliance for the last 7 years including hardware supply chain, software supply chain, and vendor /...

  • speaker photo
    Sean Ventura
    CISO, Atmosera

    Sean has over 30 years of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Chief Information Security Officer at Atmosera, implementing and maintaining the company’s security posture, while providing security and compliance expert advisory to Atmoser...

  • speaker photo
    Michael Ray
    Manager, IT Security & Risk, Puget Sound Energy
  • speaker photo
    Mukesh Dixit
    CTO, WA State Department of Labor and Industries

    Chief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...

  • speaker photo
    Austin McBride
    Threat Data Scientist, Cisco Umbrella

    Austin McBride is a Threat Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. His current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets...

  • speaker photo
    Monica Dubeau
    Director, Privacy Program, IBM Security
  • speaker photo
    Jay Wilson
    CISO, Healthgrades
  • speaker photo
    Burak Serdar
    Co-Founder, ConsentGrid

    Burak is one of the co-founders and the technical lead at Cloud Privacy Labs. He has more than 25 years of experience as a software engineer and recently left his position at Red Hat as Principal Software Applications Engineer. His work includes large scale back-end applications for distributed environments and open-source tools for enterpris...

  • speaker photo
    Jaymin Desai
    Offering Manager, Third-Party Risk, OneTrust

    Jaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficie...

  • speaker photo
    Clint Sowada
    Director of Product Security, Collibra

    As the Director of Product Security at Collibra, Clint Sowada is responsible for delivering secure applications and protecting customer’s data. He has been in the security industry for nearly a decade and has proven track record in building secure SDLC programs at companies that range from endpoint protection to large scale cloud service prov...

  • speaker photo
    Ashish Popli
    Director of Product Security, Privacy & Compliance, UiPath

    Ashish thrives on pragmatism, innovation and building teams that deliver a promise. He started his career over 20 years ago, as a computer scientist in upstate NY, and since then has been learning the 'art of impossible', by wearing multiple hats, including writing code, conducting pen tests, finding and fixing security bugs, building and shi...

  • speaker photo
    Dr. Ben Edwards
    Sr. Data Scientist, Cyentia Insitute

    Dr. Benjamin Edwards joined Cyentia at the beginning of 2019 as hire #1. He was formerly with IBM Research, where he worked in applying advanced machine learning techniques to solve real world security problems and shaped the next generation of analytical security models. Before that he received his Ph.D. from the University of New Mexico wit...

  • speaker photo
    Jeff Raymond
    Sales Engineer, Avanan

    Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakesurfing (depending on the se...

  • speaker photo
    Justin Schluessler
    Data Protection Officer, Compassion International

    Justin Schluessler has served with Compassion International, a global child development non-profit, for 21 years. Starting in IT and then transitioning to Risk Management, Justin was the organization’s very first information security employee—building a comprehensive security and compliance program from the ground up. In his current role as ...

  • speaker photo
    Christopher Grillo
    VP & CISO, Formerly Deluxe Corporation
  • speaker photo
    Jerry Vergeront
    Attorney, Vergeront Law, PLLC

    Jerry Vergeront is the founder and attorney at Vergeront Law, PLLC. With over 25 years in Information Security before becoming an attorney, he brings an industry understanding to data security, privacy, and compliance law.

  • speaker photo
    Tim Danks
    VP, Risk Management & Partner Relations, Huawei Technologies (USA)

    As VP Risk Management & Partner Relations Mr. Danks is responsible for understanding and managing business risks in the context of cybersecurity and privacy across Huawei USA businesses and toward external stakeholders. Further, he is responsible for developing and enhancing partner relationships towards key external stakeholders across acade...

  • speaker photo
    Bruce Potter
    CISO, Expel

    Bruce Potter is the CISO at Expel. Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company. He also served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security, and co-founded the Shmoo Group in 1996.

  • speaker photo
    Gaurav Kapil
    Sr. Director, Information Security, Blue Cross and Blue Shield
  • speaker photo
    Anand Singh
    CISO, Alkami Technology

    Dr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currentl...

  • speaker photo
    Drew Simonis
    VP & Deputy CISO, Hewlett Packard Enterprise

    Drew Simonis is a Vice President and serves as the Deputy CISO at Hewlett Packard Enterprise (HPE). He has worked in some of the largest and most complex environments in the public sector and the private sector with firms such as IBM, AT&T, EDS and Symantec. Prior to joining HPE, Drew spent 8 years as the CISO for Willis Group Holdings (now W...

  • speaker photo
    Robert Walden
    Chief Information Officer, Epsilon

    Robert Walden is the Chief Information Officer at Epsilon where he is responsible for cybersecurity, data center and public cloud infrastructure services, and network services. Additionally, Robert is responsible for providing all IT workplace services for a global user base. Robert has been delivering business value through technology for ov...

  • speaker photo
    Tianne Strombeck
    Sr. Principal, Security Risk Management, Verizon

    Tia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has work...

  • speaker photo
    John Berisford
    Sr. Security Architect, SecureWorks
  • speaker photo
    Michael Blaha
    Sr. Director, Cloud Operations, NucleusHealth

    Michael Blaha is currently Sr. Director of Cloud Operations and Security at NucleusHealth. Throughout his career, Michael has made a focus of integrating security and cloud native principles into his delivery and operations teams in both the healthcare payer and healthcare Software-as-a-Service space.

  • speaker photo
    Ian Schneller
    SVP Global Information Security, Financial Institution

    A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...

  • speaker photo
    Craig Swinteck
    IS Manager, Town of Castle Rock

    Craig Swinteck has a comprehensive background in IT operations and cybersecurity, with a career spanning across entrepreneurship, small businesses to global corporations, serving the public in local and federal government, and providing cybersecurity guidance in challenging industries such as Finance, Healthcare, and Manufacturing. Craig’s pa...

  • speaker photo
    Joe Dietz
    Network Security Architect, CenturyLink

    A technology focused senior level IT security professional with an excellent balance of business experience and knowledge of systems/network security. Always conducting oneself with integrity and ethical behavior following the motto of “Always do the right thing.”

  • speaker photo
    Diana Hennel
    CTO, Catalyst Corporation Federal Credit Union

    Diana Hennel is currently the Chief Technology Officer for Catalyst Corporate Federal Credit Union. In her role, Diana is responsible for the long-term strategic direction and implementation of technology strategy, security, and processes. She oversees the corporate’s network operations, technology development and information systems securit...

  • speaker photo
    Joshua Carlson
    Data Privacy and Technology Law Attorney, The Carlson Firm

    Joshua Carlson is a privacy lawyer but also is a technologist and understands sytem engineering, he has for a long time held his CISSP, CIPP, CIPP/G, CIPP/E and provides guidance and advisory to organizations around the world.

  • speaker photo
    Jay Jacobs
    Chief Data Scientist & Co-Founder, Cyentia Institute

    Jay is a Co-founder and Chief Data Scientist at Cyentia Institute, a research firm dedicated to advancing the state of information security knowledge and practice through data-driven research. Prior to Cyentia, Jay served as the Lead Data Analyst on the Verizon Data Breach Investigations Report and is the co-founder of the Society for Informa...

  • speaker photo
    Christopher Calarco
    Special Agent / Private Sector Coordinator, FBI Denver

    Special Agent (SA) Christopher A. Calarco has been in law enforcement for 25 years. He was previously a local and federal prosecutor, and has been an Agent for the FBI for over 20 years. SA Calarco has investigated a number of matters to include reactive violent crimes, gangs, organized crime, fraud and major theft. SA Calarco was also a m...

  • speaker photo
    Scott Bennett
    VP, Applications, Lear Corporation

    Scott Bennett leads Lear Corporation’s global applications as the Vice President of Applications, Deployment and Development. Prior to joining Lear Corporation, he served as the Global Chief Information Officer to International Automotive Components Group, a $6 billion Tier 1 automotive supplier. Before that, Scott was the North America CIO...

  • speaker photo
    Zahira (Zah) Gonzalvo
    SVP and Chief Information Security & Privacy Officer, Flagstar Bank

    Zah joined Flagstar Bank Information Security & Privacy team in 2018 as a Senior Vice President and Chief Information Security & Privacy Officer. Prior to her CISO role, Zah was the head of ERM and the Operational Risk teams since 2013 when she joined Flagstar Bank. Zah was the Strategy Leader for Diversity and Inclusion (D&I) for the Bank si...

  • speaker photo
    Janet Lawless
    CEO & Founder, Center for Threat Intelligence

    Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge threat intelligence consulting, training and a certification program for Certified Threat Intelligence Professionals (CTIP). We are a proud provider for The National Initiative for Cybersecurity Education (NICE)...

  • speaker photo
    Jason Rader
    Director, Network & Cloud Security, Insight Cloud + Data Center Transformation

    Jason Rader joined Insight in 2015 as the National Practice Director of Security. He is charged with managing Insight’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true s...

  • speaker photo
    Dennis Hodges
    CIO, Inteva Products

    Dennis Hodges is the Chief Information Officer for Inteva Products, LLC, a position he has held since March 1, 2008. Prior to this assignment Dennis was Chief Information Officer for Delphi Interiors and Closures. Prior to joining Inteva, Dennis served as the Global Business Systems Director at Huntsman Corporation. He began his career at She...

  • speaker photo
    Tammylynne Jonas
    CIO, Self Esteem Brands

    Tammylynne Jonas (TLJ) is a seasoned digital and technology executive with almost 20 years of experience leading large, international teams. TLJ is the Global CIO for Self Esteem Brands, the parent company for Anytime Fitness. In this role, TLJ has responsibility for multiple franchise brands, with almost 5000 locations across almost 40 count...

  • speaker photo
    Brenden Smith
    CISO, FirstBank

    Brenden Smith is the Chief Information Security Officer at FirstBank. Having spent the last 10 years at FirstBank he is passionate about their community involvement and “Banking for Good” philosophy. In his current role Brenden is focused on aligning security with the needs of the business to help drive better business outcomes through better...

  • speaker photo
    Christopher Riley
    CISO, Ntirety (formerly

    Chris is a seasoned IT Strategist with 20 years of leadership experience in Project & Program Management, Technology & Infrastructure, and Security & Governance. He creates and scales internal technology operations for sustained hyper-growth, builds security operations for Managed Security Provider and spearheads Compliance certification pro...

  • speaker photo
    Ronald Williamson
    Information Security Officer, Medical College of Wisconsin

    Ronald Williamson has over 20 years’ experience in Information Technology and Information Security. He has held roles within the banking, retail, and healthcare industry. Currently, he is Information Security Officer at the Medical College of Wisconsin. Driven by a belief in promoting a strategic vision and utilizing best practices to accompl...

  • speaker photo
    Bill Meredith
    Cloud Security Engineer, Charles Schwab

    Bill Meredith has over 25 years of experience designing, implementing, and supporting IT solutions for large enterprises, of which 10 years have been in the cybersecurity area. He is a cybersecurity professional with experience across a diverse set of cyber domains and industries such as Cloud Security, Financial, Forensics Investigation, Te...

  • speaker photo
    Panel Discussion
  • speaker photo
    David Sonheim
    Cybersecurity Advisor, DHS / CISA
  • speaker photo
    Kevin Beaver
    Independent Information Security Consultant, Principle Logic, LLC

    Kevin Beaver, CISSP is an information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. • With over 31 years in IT and 25 years in security, Kevin specializes in independent security assessments and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sen...

  • speaker photo
    Doug Boykin
    Solutions Engineer, OneTrust

    Doug Boykin serves as a Privacy Engineer at OneTrust – the #1 most widely used privacy, security and third-party risk technology platform. In his role, Boykin advises many of the world's leading organizations on CCPA, GDPR and ePrivacy (Cookie Law) solution implementations, focused on formulating efficient and effective responses to data prot...

  • speaker photo
    John Callaghan
    Sr. Security Engineer in SOC Operations, Forensics, and Threat Hunting, Pulte Financial Services

    As a security practitioner of 30 years, Jack's experience began in the 80s with commercial and military venues, and expanding in early days of the Internet. It continued to be shaped by the growth of malware and data breaches as global threats against business, nations, and individuals. While developing some of the earliest proactive IPS syst...

  • speaker photo
    Patrick Benoit
    Global Business Information Security Officer , CBRE

    Patrick is an Advisory CISO and formerly the Deputy CISO for Cheetah Digital. He is a security and privacy executive, writer, speaker, knowledge provider and seeker. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is certifi...

  • speaker photo
    Jeff Kenney
    CIO/CISO, Grasshopper Bank

    30+ years IT and Information Security practice. CIO/CISO at the first digital commercial bank in the US. Previously served as the Global Head of Wealth Technology for Thomson Reuters wealth management business line. Lead a team of over 380 developers and technologists supporting the TR BETA, BETA Online, and Thomson One products. Previously t...

  • speaker photo
    Dale Drew
    Chief Security Officer, Zayo Group

    Dale is currently the Chief Security Officer of Zayo Group, Inc, a global telecommunications service provider based in Boulder, Colorado. Dale is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, having worked in Federal/State Law Enforcement and with Inte...

  • speaker photo
    Rob Walk
    Sr. Security Engineer, Tenable

    Rob is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying, and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable, he helps organizations reduce risk due to Cyber Exposure.

  • speaker photo
    Kelce Wilson
    General Counsel, InfraGard North Texas

    Kelce S. Wilson was in the U.S. Air Force, both active duty and reserves, retiring as a Lieutenant Colonel. He has a B.S., M.S. and PhD in electrical engineering, an M.B.A., a J.D., US PTO patent practitioner registration, and is a certified privacy professional with CIPP-US, CIPP-E, and CIPM. During his military and engineering career he wor...

  • speaker photo
    TJ Gonen
    Co-Founder , Protego Labs

    TJ is a subject matter expert on cloud security who has decades of experience solving enterprise problems with innovative solutions. His current project, Protego Labs, is two years in the making. With Protego, TJ has developed an award-winning platform that automates security for serverless applications. The combination of reduced development...

  • speaker photo
    Book Signing
  • speaker photo
    Parthasarathi Chakraborty
    Director, Security Architecture, Bank of Montreal

    Partha has over 20 years of cyber security leadership experience in financial services industry. An active speaker and panelist in cyber security conferences around the world. Very much passionate about learning new technologies and writing on recent cyber trends. Currently heading up infrastructure security architecture for Bank of Montreal....

  • speaker photo
    Rob Maynard
    Solutions Architect, Trend Micro

    Rob Maynard is a sales engineer and DevOps SME for Trend Micro. He has been in the IT field for over 11 years working with various cloud, automation, and virtualization technologies. He lives in Michigan with his wife and two children.

  • speaker photo
    Jennifer Reicherts
    Certified Ethical Hacker, Healthcare Information Security Analyst

    Jennifer Reicherts is an Information Security Analyst with over 16 years of experience working in the Healthcare and Public Health sector. Her passions include IoT cybersecurity and threat intelligence. Jennifer is a Certified Ethical Hacker (CEH) and an Executive Board Member of InfraGard Minnesota Member Alliance.

  • speaker photo
    Michael Hiskey
    Chief Marketing Officer, Avanan

    Michael Hiskey is a long-time data, analytics, cloud, and AI industry executive. An accomplished writer and speaker, he has published articles in Forbes, InfoWorld, TechCrunch, ITProPortal, etc. He spends his time thinking about how these innovations impact B2B organizations and their customers. Michael has a background in enterprise technolo...

  • speaker photo
    Rebecca Harness
    AVP, CISO, St. Louis University

    Rebecca Harness is AVP & Chief Information Security Officer for Saint Louis University and Founder/Principal of Pericuro. Rebecca has an established 20+ year career in information technology with the past ten years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two succes...

  • speaker photo
    Scott Hogg
    Chair Emeritus, Rocky Mountain IPv6 Task Force

    Scott Hogg is CTO and a co-founder of, an IPv6 consulting and training firm. He is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. He is the author of the a Cloud Guru course, “Rapidly Deploying IPv6 on AWS.” Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member o...

  • speaker photo
    Joseph Marentette
    MIM, Network Engineer 3, Washington University in St. Louis

    Joe Marentette, MIM (WashU IT Network Engineer 3), has worked for the university for over 20 years. Joe leads the design and engineering of the WashU enterprise network and the research network. Joe has a long history of collaboration with the Information Security department, and most recently built the data collection network to capture netw...

  • speaker photo
    Eddie Ho
    Former CIO & COO, Los Alamos National Bank

    Eddie Ho is the former COO and CIO for Los Alamos National Bank in New Mexico and CIO and CISO at OmniAmerican Bank in Texas. Prior to banking leadership roles, Eddie was in Technology Risk Management, cyber security, and Enterprise Architecture for IBM, Dell, Grant Thornton, and Blockbuster. Eddie is a board member for ePayAdvisors and is a ...

  • speaker photo
    Marc Ashworth
    Senior VP CISO, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...

  • speaker photo
    Frank Leyva
    Systems Engineer, Radware

    Frank Leyva is a Systems Engineer with Radware, a market leader in cybersecurity with a focus on Network and Application level availability, and security. Prior to that, he was a subject matter expert in network security defense with a leading anti-malware company, performing advanced threat analysis, deep packet inspection, and creating hack...

  • speaker photo
    Rod Aday
    CISO, Dexia Crédit Local

    Rod Aday is the CISO, Head of Operational Risk and Information Security for Dexia Credit Local, NY Branch. He is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built I...

  • speaker photo
    Mark Nagiel
    CISO, Supreme Lending

    Mark is currently serving as the Chief Information Security Officer at Supreme Lending. Prior to Supreme Lending, Mark Served as the CISO at Prime Lending, Head of Information Security at MetroPCS (a T-Mobile division), VP of Information Technology and VP of Information Security at InCharge Institute, Head of NEC Information Security Consulti...

  • speaker photo
    Beth Young
    Sr. Security Incident Response Consultant, Aflac

    Beth Young has 20 years of cyber security experience. She is currently a Senior Security Incident Response Consultant with Aflac. Beth has previously worked for a financial services company and for one of the Information Sharing and Analysis centers. She just completed her Masters in Applied Data Science from Syracuse University. She has prev...

  • speaker photo
    Christopher McMahon
    Special Agent, United States Secret Service

    Chris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Servi...

  • speaker photo
    Siam Luu
    Lead Security Architect, Colorado Judicial Department

    Siam Luu has worked information security for over 8 years beginning as an analyst, graduating to an engineer, and currently is employed as a security architect. He has worked in both the public and private sectors in a myriad of different careers and locations in both technical and non-technical roles. At present, he has his CISSP certificati...

  • speaker photo
    Melissa Van Buhler
    Cybersecurity & Data Privacy Attorney, Focal Law

    Melissa’s legal practice focuses on cybersecurity, privacy, and regulatory compliance. Her key strength is helping organizations achieve cyber resiliency through legal and regulatory compliance.

    Before joining Newman Du Wors in 2018, she served more than 15 years as a Judge Advocate General officer in the United States Army where she s...

  • speaker photo
    Quin DeVries
    UX Researcher, Automotive Cybersecurity, Mitsubishi Electric Automotive America

    Quin DeVries is exploring the realm where technology and human behavior meet to create engaging user experiences. As a curious researcher, he is eager to tackle the challenges of today and the future.

    His research background includes topics in design thinking and ideation in engineering, managerial accounting and neuropsychology, and ...

  • speaker photo
    Alan Berry
    Vice President, Cybersecurity, Centene Corporation

    Alan Berry is the Vice President for Cybersecurity at Centene Corporation. He leads the Cyber Incident Response, Security Strategy, and Threat and Vulnerability Management teams, as well as the Business Resilience and Crisis Management teams. Alan brings 30 years of experience in cyber operations, communications, and command and control. Prio...

  • speaker photo
    Matthew Clapham
    Director of Cybersecurity, GE Healthcare

    Matt Clapham is a Directory of Cybersecurity at GE Healthcare. He and his team make products more secure.

  • speaker photo
    Michael Rogers
    Director, Cyber Defense, Optum / UHG

    Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybersecurity. He is a certified nerd with nearly 20 years of IT experience, and has spent the last decade developing his understanding of information security, business strategy, and communications. Mike earned his MBA from the Carlson School of Ma...

  • speaker photo
    David Stauss
    Partner, Husch Blackwell LLP

    David is the leader of Husch Blackwell’s national privacy and data security practice group. Accredited by the International Association of Privacy Professionals as a Fellow of Information Privacy, Certified Information Privacy Professional/United States, and Certified Information Privacy Technologist, David brings to the table a deep engageme...

  • speaker photo
    Marc Harwin
    Information Security Professional, Harwinet LLC

    Marc Harwin is an Information Security Professional with more than 20 years of experience. He has worked to improve Information Security at multiple Fortune 500 organizations with a focus on:
    - Security Operations
    - Vulnerability Management
    - Incident Response

    Marc has a Master of Science in Information Systems from W...

  • speaker photo
    Preston Bukaty
    GRC Consultant / Privacy & Compliance Specialist, IT Governance USA Inc.

    Preston Bukaty is an attorney and consultant working for IT Governance USA. He specializes in data privacy GRC projects, from data inventory audits to gap analysis, contract management, and remediation planning. His compliance background, and experience with operationalizing compliance for a variety of industries, give him a strong understand...

  • speaker photo
    Jeff Wilbur
    Technical Director, Online Trust Alliance, Internet Society

    Jeff Wilbur is the Technical Director of the Internet Society’s Online Trust Alliance. He is responsible for integrating, developing, and extending the OTA initiative within the Internet Society’s overall mission and objectives. He has over 25 years of experience in high technology, all focused on bringing new, industry-transforming communica...

  • speaker photo
    Selim Aissi
    SVP and CISO, Ellie Mae

    Selim Aissi is Senior Vice President & Chief Security Officer at Ellie Mae’. He is responsible for Ellie Mae’s Security Engineering, Operations, Strategy and Information Technology Risk & Compliance. Before joining Ellie Mae, Selim was the Vice President of Global Information Security at Visa. In that role, Selim transformed Visa’s informatio...

  • speaker photo
    Sudesh Gadewar
    Security Engineer, Ellie Mae

    Sudesh Gadewar is Sr Staff Security Engineer at EllieMae. Sudesh holds 10+ years of experience in security where passion is in offense and defense of security. Sudesh holds various Security Certifications which he use as attestations to his skillset. His core area of expertise is in product and application security, where he build SSLDC lifec...

  • speaker photo
    Janelle Hsia
    Director of Privacy and Compliance, American Cyber Security Management

    Janelle Hsia is a trusted advisor for strategic and tactical decision making within organizations of all sizes. She brings a diverse background with strong leadership, technical, and business skills spanning 20 years of experience in the areas of project management, IT, privacy, security, data governance, process improvement, and software dev...

  • speaker photo
    Carlin Dornbusch
    President, American Cyber Security Management (ACSM)

    Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of moder...

  • speaker photo
    Ethan Sailers
    Solutions Engineer, OneTrust

    Ethan Sailers serves as a Privacy Engineer at OneTrust, the largest and most widely-used dedicated privacy management technology platform to operationalize privacy, security, and third-party risk management. In his role, he advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the w...

  • speaker photo
    Carlos Garcia
    Enterprise Architect, Office of CIO, Optum

    Carlos has specialized in Identity and Access Management systems for the past 20 years. His experience has been in the architecture and implementation of large enterprise and consumer IAM systems. Most of his career has been spent designing and running the large scale IAM systems for UnitedHealth Group. His experience and leadership led him t...

  • speaker photo
    Tom Muehleisen
    Director of Cyber Operations, Norwich University Applied Research Institutes

    Tom Muehleisen, CISSP and Retired Army Lieutenant Colonel, is a proven leader in cybersecurity. He is currently the Director of Cyber Operations for NUARI, a non-profit focused on improving our nation’s cybersecurity. He has a rich emergency management background as a National Guardsman, ranging from fighting fires to writing Washington State...

  • speaker photo
    Dave Ruedger

    Dave Ruedger is the Chief Information Security Officer for Risk Management Solutions based out of Newark, CA. RMS is a premier provider of catastrophe risk models for the insurance industry that help organizations forecast losses for hurricane, earthquake, flood, wildfire, terrorism and cyber risk in a cloud hosted SaaS environment. Dave ho...

  • speaker photo
    Kevin Paige
    CISO, Flexport

    Kevin Paige is the Chief Information Security Officer (CISO) at Flexport, provider of the Operating System for Global Trade. Prior to Flexport, Kevin was the CISO at MuleSoft, and brings over 20 years of leadership in delivering solutions and programs that optimize security, compliance and technical operations for both the private and public ...

  • speaker photo
    John Heasman
    CISO, Chegg

    John Heasman is the CISO of Chegg, the leading student-first connected learning platform where he is focused on proactive approaches to building secure software. Prior to Chegg, John was the Deputy CISO at DocuSign. He has presented at Black Hat, DEF CON, OWASP AppSec and other industry forums on a diverse range of topics from web application...

  • speaker photo
    Maarten Van Horenbeeck
    CISO, Zendesk

    Maarten Van Horenbeeck is Chief Information Security Officer of Zendesk since March 2018. He has also been a Board member of the Forum of Incident Response and Security Teams (FIRST) since 2011, and is the Lead Expert to the IGF Best Practices Forum on Cybersecurity. From July 2015 to March 2018, he served as Vice President, Security Engineer...

  • speaker photo
    Rinki Sethi
    VP & CISO, Rubrik

    Rinki Sethi is an information security executive known for change, technical and thought leadership across security and enablement disciplines. She is a veteran in the cyber security domain and throughout her career has built and matured technical security teams across security operations, product security, application security, security arch...

  • speaker photo
    Gary Chan
    Board Member, FBI St. Louis Citizens Academy Alumni Association (FBISTLCAAA)

    Gary S. Chan is an accomplished security and artificial intelligence expert. He architected anti-fraud systems for state agencies, led the information security teams for a $10B+ company, works as an independent consultant, and is an evaluator and mentor for cybersecurity start-ups. He has multiple security certifications, including a CISSP (i...

  • speaker photo
    Jonathan Cran
    Head of Research , Kenna Security

    Jonathan Cran is an information security expert based in Austin, Texas. He’s a principal at the strategic consulting firm Pentestify, and founder of the the open security intelligence platform, Intrigue. His passion is security assessment, architecting systems to measure and ultimately prevent security incidents. Currently, he’s building a wo...

  • speaker photo
    Ann Nagel
    Institutional Privacy Officer and former UW Associate CISO, University of Washington

    Ann Nagel is the Associate Vice Provost for Privacy, University Privacy Officer, and European Union General Data Protection Officer for the University of Washington (UW). She is responsible for developing a cohesive strategy for the humanitarian and legal aspects of privacy across the UW. To help ensure privacy is included in the design of th...

  • speaker photo
    Lynette Crane
    Founder & CEO, Quiet Brilliance Consulting LLC

    Lynette Crane, MA, is a Minneapolis-based mentor to introvert CEOs, an acclaimed national speaker, corporate trainer, executive coach and author, and Founder of Quiet Brilliance Consulting LLC Trained in psychology, she has more than 30 years' experience in her field. Lynette Crane and Quiet Brilliance Consulting help smart companies who are ...

  • speaker photo
    Mark Dargin
    Director, Security & Architecture, Qualfon

    Mark Dargin is the Director of Security Architecture at Qualfon Inc., an organization with over 16,000 employees across North America, South America, and Asia. Mark has over 19 years of experience designing, managing, and securing complex WAN and LAN infrastructures. He is a member of the Michigan Cybersecurity Civilian Corps, FBI citizen’s a...

  • speaker photo
    Swathi Joshi
    Sr. Technical Program Manager - Incident Response, Netflix

    Swathi Joshi is a Senior Technical Program Manager, on the Security Incident Response Team at Netflix where she works on advancing the crisis management program and maturing the incident response function. Previously she worked at Mandiant as an Engagement Manager and as an Escalations manager, managing and solving most critical technical eff...

  • speaker photo
    Sarah Lange
    CISO, Allgress, Inc.

    Sarah has over 23 years of experience in Information Security Management, Risk Management, Third Party Oversight, and Governance in both internal and consulting roles. She is an experienced leader with a background in design, and implementation of GRC and Security programs working with technologies that enable these programs to be effective. ...

  • speaker photo
    Zach Turner
    Enterprise Sales Engineer, Mimecast

    Zach joined Mimecast in 2017 as an Enterprise Sales Engineer in Denver, CO. Previously, Zach worked in the enterprise space for AirWatch by VMware, where he focused on cloud-based Mobile Device Management solutions involving mobile security, content management, and email management. Most recently, he worked for Fuze, Inc., a $1 billion UCaaS ...

  • speaker photo
    Christopher Frenz
    AVP, Information Security, Interfaith Medical Center

    Christopher Frenz is the AVP of Information Security for Interfaith Medical Center, where he worked to develop the hospital’s information security program and infrastructure. Under his leadership, the hospital has been one of the first in the country to embrace a zero trust model for network security. Christopher has also played a role in pus...

  • speaker photo
    Holger Weeres
    Executive Account Manager, baramundi software USA, Inc.

    Holger is a seasoned UEM expert with over 20 years of experience in endpoint Automation for company of all sizes. He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company's general challenges and common obstacles in ach...

  • speaker photo
    Griffin Weaver
    Attorney, Technology and Transactions Counsel, USAA
  • speaker photo
    Dr. Jason Edwards
    Cybersecurity Regulatory Testing Lead, USAA

    Jason Edwards has over 20 years of IT/Cybersecurity experience and currently works for USAA researching, developing and executing enterprise cybersecurity assurance testing. Jason is a 22-year veteran of the US Army and has served multiple tours of duty in Iraq, Afghanistan, and elsewhere. Jason is currently awaiting final approval for his do...

  • speaker photo
    Kristie Pfosi
    Sr. Manager, Automotive Cybersecurity, Mitsubishi Electric Automotive America

    Kristie Pfosi stands at the forefront of one of automotive’s greatest challenges: cybersecurity. A well-respected policy maker and program manager with deep technology expertise, Kristie has been a champion for best practices in cybersecurity for over a decade as a technical intelligence officer at the CIA and as an OEM employee, most notably...

  • speaker photo
    Amy Chu
    Sr. Director, Automotive Product Security, Harman

    Amy Chu is Senior Director, Automotive Cybersecurity at HARMAN, a wholly-owned subsidiary of Samsung Electronics Co., Ltd. HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide, including connected car systems, cyber security solutions, audio and visual products, enterprise automati...

  • speaker photo
    Moderator: Jennifer Tisdale
    Associate Principal, GRIMM, a Cyber Research, Consulting & Education firm

    Jennifer Tisdale is the Associate Principal for Embedded Systems and Advanced Transportation Security Programs at GRIMM, a cybersecurity research and engineering firm. Previously, Jennifer served as R&D Program Manager of Vehicle Product Cybersecurity at Mazda North America. While at Mazda, Jennifer bridged the gap between R&D and Government ...

  • speaker photo
    KC Condit
    CISO, G6 Hospitality, LLC

    KC Condit has been an information security practitioner and IT leader for 30 years with a diverse resume including hospitality, financial services, retail, and private, post-secondary education. He is currently the CISO for G6 Hospitality, LLC, and is responsible for information security, data privacy, IT risk management, and IT compliance fo...

  • speaker photo
    Sonja Torseth
    Sr. Training Consultant, Kalles Group

    Sonja Torseth is a Senior Training Consultant at Kalles Group. She designs communications strategy and learning experiences with a sharp focus on end-goals: to affect staff behavior change, especially for security risk mitigation. She has more than 10 years’ experience in communications, learning design, and project delivery, and holds a B.S....

  • speaker photo
    Jeanette Rogers
    Director of Learning, Kalles Group

    Jeanette Rogers is the Director of Learning at Kalles Group, helping companies build world-class security awareness and training solutions. She has over a decade of experience in design, development, and delivery of global corporate technology-based programs and holds a Master's degree from Stanford University.

  • speaker photo
    Abigail McAlpine
    PhD Cybersecurity Researcher, Secure Societies Institute - University of Huddersfield

    Abigail McAlpine is a CyberSecurity Researcher at the Secure Societies Institute at the University of Huddersfield. Her research is specialised in PII data published on digital systems that leads users to become vulnerable to a number of threats to their identity and safety long-term.

  • speaker photo
    Andy Purdy
    Chief Security Officer, Huawei Technologies USA

    Andy is Chief Security Officer for Huawei Technologies USA, overseeing Huawei USA's cybersecurity assurance program and supporting Huawei’s global assurance program. Andy is the Huawei global lead for the East-West Institute Global Cooperation in Cyberspace Initiative and serves on the Steering Committee of The Open Group Trusted Technology F...

  • speaker photo
    Elvis M. Chan
    Supervisory Special Agent, Squad CY-1, National Cyber Center, FBI San Francisco

    Elvis Chan is a Supervisory Special Agent (SSA) assigned to FBI San Francisco. SSA Chan manages a squad responsible for investigating national security cyber matters. With 14 years in the Bureau, he is a decorated agent who is recognized within the Intelligence Community as a cyberterrorism expert. SSA Chan was the lead agent on significant c...

  • speaker photo
    Mary Chaney
    Attorney, The Cyber Security Law Firm of Texas

    Mary N. Chaney, Esq., CISSP, has over 20 years of progressive experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law.
    Ms. Chaney spent several...

  • speaker photo
    Tara Schaufler
    Information Security Awareness and Training Program Manager, Princeton University

    Tara Schaufler is the Information Security Awareness and Training Program Manager at Princeton University. Tara has been at Princeton University for 15 years, spending the last eight focusing on training and technical communications, and in the past two and a half years has built a robust security awareness and training program from the groun...

  • speaker photo
    David Sherry
    CISO, Princeton University

    David Sherry is the CISO at Princeton University, with university-wide responsibility and authority regarding matters of information security and information risk. He is tasked with the development and maintenance of Princeton's information security strategy, policies and best practices, security training and awareness programs, as well as on...

  • speaker photo
    Steven Lentz
    Head of Security, Mojio

    Steven is the Head of Security, CISSP, CIPP/US. He has presented for SC Magazine and in Las Vegas regarding Cybersecuirty and Security Awareness.

  • speaker photo
    Paola Saibene
    VP, Enterprise Risk Management, American Heart Association

    Paola Saibene is the VP of Enterprise Risk Management at American Heart Association. She has been a CIO, CTO, and CSO of large organizations, and has worked in private, non-profit, and government sectors.

  • speaker photo
    Benjamin Brooks
    VP, Beryllium InfoSec Collaborative, President of the Board, Cyber Warrior Foundation

    Vice President of Beryllium InfoSec Collaborative and Founding Member of Cyber Warrior Foundation. Benjamin is a 19-year Navy veteran of Information Warfare and Special Warfare communities. He serves as the Education Committee Chair for the Cyber Warrior Foundation as well as Chairman of the Board. Benjamin is an (ISC)2 CISSP and Writer for t...

  • speaker photo
    Moderator: Abhijit Solanki
    Founder & Managing Director, Whiteboard Venture Partners

    Abhijit Solanki is the founder of Whiteboard Venture Partners, an early stage venture capital firm helping entrepreneurs achieve their whiteboard dreams.

  • speaker photo
    Ann Marie Mortimer
    Managing Partner, Los Angeles Office, Hunton Andrews Kurth LLP

    Mortimer is the managing partner of Hunton Andrews Kurth LLP’s Los Angeles office and co-head of the firm’s commercial litigation practice. Her practice is cross-disciplinary and includes significant business and class action consumer claims litigation experience and crisis management in relation to data breach, consumer related labeling clai...

  • speaker photo
    Kenneth Hartman
    Instructor, The SANS Institute

    Kenneth G. Hartman is a security engineering leader in Silicon Valley. Ken's motto is "I help my clients earn and maintain the trust of their customers." Ken is an Instructor for the SEC545 Cloud Security Operations course offered by the SANS Institute. Ken has worked for a variety of Cloud Service Providers in Security Architecture, Engineer...

  • speaker photo
    Scott Reynolds
    Industrial Security Manager, Johns Manville

    Scott Reynolds is the Industrial Security Manager at Johns Manville. He has over 14 years of Industrial Engineering experience and is an active member of the OT / IT community. Scott has held leadership roles in the International Society of Automation (ISA) for the last four years and is currently an Executive Board Member. Scott has an elect...

  • speaker photo
    Chris McLaughlin
    Information Security Officer, Johns Manville

    Chris McLaughlin is the Information Security Officer at Johns Manville, a Berkshire Hathaway company. JM is leading global manufacturer of insulation, roofing and glass fibers products. Chris has over 20 years of security and infrastructure experience leading the vision for a highly complex manufacturing environment. Chris has a passion for i...

  • speaker photo
    Stephen Dougherty
    Cyber-Enabled Financial Fraud Investigator, U.S. Secret Service / Firebird AST

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government ...

  • speaker photo
    Jack Freund, PhD
    Director, Risk Science, FAIR Institute

    Dr. Jack Freund is a leading voice in cyber risk measurement and management. He is an expert at building relationships to collaborate, persuade, and sell information risk and security programs. Jack is currently serving as Director, Risk Science at RiskLens and previously worked for TIAA as Director, Cyber Risk. Jack holds a PhD in Informatio...

  • speaker photo
    Nick Selby
    Director, Cyber Intelligence and Investigations, NYPD

    Nick is the Director of Cyber Intelligence and Investigations for the New York City Police Department. He serves the NYPD's Intelligence Bureau, helping advise the strategy and policies that govern how the Bureau assesses and manages investigations and intelligence in the Cyber domain. For nearly a decade Nick has served the public as a Texas...

  • speaker photo
    Serge Borso
    Community Instructor, SANS Institute

    Serge Borso is the founder and CEO of SpyderSec, an organization specializing in penetration testing, security awareness training, and OSINT. He also resides on the board of directors for the Denver OWASP chapter and teaches with the SANS Institute. He is an expert in a variety of information security fields, having served in many roles in th...

  • speaker photo
    Michael Landewe
    Co-Founder & Chief Privacy Officer, Avanan

    Before cofounding Avanan in 2014, Michael Landewe had over 20 years of internet startup experience, starting with cofounding an ISP in 1996. He was an early employee of Network Physics, an internet traffic performance company that was one of the first technology companies to develop detection response for the Blaster worm. As a research engin...

  • speaker photo
    Don Peterson
    Sr. National Cybersecurity Specialist, Federal Reserve

    Don Peterson is a Sr. National Cybersecurity Specialist for the Federal Reserve System, based out of the Federal Reserve Bank- St. Louis. He is tasked with overseeing the supervision of the largest and most systemically important financial institutions in the United States with assets of $100B+. His duties also include participating in the de...

  • speaker photo
    Daniel Stiegman
    Cyber Threat Intelligence Engineer, Pathfinder Intel

    Daniel is a 15-year Intelligence Professional, with a career in US Army Intelligence and the National Geospatial Agency. His primary focus has been in Counter-Terrorism, Asymmetrical Warfare, and Intelligence Analysis methodology. Daniel was a national-level instructor in All Source Intelligence Analysis and has written several published whit...

  • speaker photo
    Craig Reeds
    Cybersecurity Compliance Manager, Electric Power Systems International

    Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Complia...

  • speaker photo
    Tina LaCroix-Hauri
    President and Practice Leader, CISO Advisory Services, Bradford Garrett Group, Former CISO for City of Chicago and Discover Financial

    Tina LaCroix-Hauri is the President and Practice Leader, CISO Advisory Services, for Bradford Garrett Group, a full service security professional services firm. Formerly the CISO for the City of Chicago, Global CISO for AON, CIO of, and Director of Enterprise Risk Management for Discover Financial Services, Tina brings a considered ...

  • speaker photo
    Rhia Dancel
    Information Security Lead Auditor, NSF International

    Rhia is an ISO 27001 and 9001 Lead Auditor and OSINT PenTester for NSF and has previously held several auditing and technical positions in the information security and Pharma quality sectors. Rhia has completed technical writing work and audits for NSF throughout North America, working directly with customers onsite and remotely developing se...

  • speaker photo
    Tony Giles
    Information Security Lead Auditor, NSF International

    Tony is an ISO 27001, ISO 20000 and ISO 9001 Lead Auditor and OSINT PenTester for NSF. Currently, Tony is the Director of Custom Audit Programs, also having served as Director of Operations, Director of Business Development, and Service Delivery Manager. Tony has conducted audits globally for over 10 years and worked on large-scale security i...

  • speaker photo
    Merlin Namuth
    Cyber Risk Advisory Board Member, Pepperdine University

    Merlin Namuth has spent over 20 years focused in security. His experience includes building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions. Namuth serves on the cyber risk advisory board at Pepperdine Univers...

  • speaker photo
    Alexis Womble
    Sr. Threat Intelligence Analyst, BAE Systems

    Alexis Womble is a Sr. Threat Intelligence Analyst at BAE Systems. Previously, she was a Cybersecurity Intelligence Analyst at Express Scripts, where she interned for a year in an EOCC automation development role, Attack Simulation role, and an Intelligence role. She is also a recent grad from Missouri Baptist University, where she can still ...

  • speaker photo
    Matthew DeChant
    CISO, Tempus, Inc.
  • speaker photo
    John Fatten
    Technical Solutions Architect, Cisco Umbrella
  • speaker photo
    Ann Marie Isleib
    VP, Enterprise Sales, Okta, Inc.
  • speaker photo
    Linda Marcone
    Sr. Director, Information Security, Serta Simmons Bedding, LLC

    Linda Marcone has 15+ years of Information Security, Governance, Risk & Compliance, and Fraud Prevention experience. Throughout her career, she has built and transformed Information Security Programs and Teams, worked with FBI & NCFTA to take down an international fraud ring (APT), promoted diversity in the workplace, and acted as a mentor. ...

  • speaker photo
    Samuel Blaney
    Director Cybersecurity, Georgia Technology Authority

    Sam is the Director of Cybersecurity & Governance Risk and Compliance (GRC) at GTA and is a Chief Warrant Officer (CW3) retired. Georgia Technology Authority (GTA) Office of Information Security (OIS) is the premier strategic partner for all state and local government organizations in support of a strong State Cyber Security posture. GTA OIS,...

  • speaker photo
    Adam Shostack
    Leading Expert on Threat Modeling, Shostack & Associates

    Adam is a leading expert on threat modeling, and a consultant, entrepreneur, technologist, author and game designer. He's a member of the BlackHat Review Board, and helped create the CVE and many other things. He currently helps many organizations improve their security via Shostack & Associates, and advises startups including as a Mach37 Sta...

  • speaker photo
    William Lidster
    Sr. Manager, Information Security and Compliance, AAA Washington

    Dr. William Lidster has more than 25 years of experience in IT and information security leadership in government, retail, insurance, finance, healthcare, and the utility industries. He received is PhD in Information Security and Assurance from Capella University and has published in IEEE and other professional journals. Dr. Lidster focuses hi...

  • speaker photo
    Bryce Verdier
    Sr. Software Engineer, GroupOn

    Bryce Verdier (CISSP, CEH) is currently a Senior Software Developer at GroupOn. In previous roles, he’s also been a Systems Engineer with an automation and DevOps minded focus, and an Information Security Engineer, focusing on host-based security.

  • speaker photo
    Tamika Albert-Williams
    Undergraduate IT Program Adjunct Faculty, Capella University - School of Business and Technology

    With a passion for addressing the human element of cybersecurity, Tamika Albert-Williams has 10+ years’ experience in information technology and security. She began her career in IT project management. She is currently a Management Consultant and adjunct IT program faculty at Capella University. She specializes in GRC; and IS program strategy...

  • speaker photo
    Sherron Burgess
    SVP & CISO, BCD Travel
  • speaker photo
    Ken Foster
    Head of Global Cyber Risk Governance, First Data Corporation
  • speaker photo
    Donna Gallaher
    President & CEO, New Oceans Enterprises
  • speaker photo
    Austin Rappeport
    Blue Team Coordinator, Zurich Insurance Group

    Austin Rappeport is a Threat Defense Consultant working for Zurich Insurance on their global cybersecurity team. His team is responsible for managing Zurich's SIEM and integrating Zurich's security toolkit to allow for the automated detection of suspicious or malicious activity across Zurich's network. Previously, Austin worked for the Federa...

  • speaker photo
    Chris Carlis
    Red Team Coordinator, Zurich Insurance Group

    Chris Carlis is a member of the Zurich Insurance Group Red Team and has built a career helping organizations become more secure through offensive testing. Locally, Chris is a community organizer in the Chicago area and helps coordinate several monthly gatherings designed to connect like-minded information security professionals. In his spare ...

  • speaker photo
    Ed Snodgrass
    Regional Security Principal, Insight Cloud + Data Center Transformation

    Ed has over 20 years of experience in information security, supply chain security, risk, compliance and mergers and acquisitions. Prior to joining Insight, he served as Chief Information Security Officer for Secure Digital Solutions, a consulting firm providing cyber security program strategy, enterprise risk and compliance, and data privacy....

  • speaker photo
    Paul Russo
    Enterprise Security Engineer, Tenable

    Paul is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable he helps organizations reduce risk due to Cyber Exposure.

  • speaker photo
    Cody Johnson
    Intelligence Analyst, FBI
  • speaker photo
    George Schultze
    Supervisory Special Agent, Cyber Crime Task Force , Federal Bureau of Investigation

    Special Agent George Schultzel entered on duty in July of 2010 and was assigned to the New York Field Office. Over the course of his career, SA Schultzel has investigated complex criminal computer intrusions, nation state adversarial action, and cyber terrorism. SA Schultzel is currently serving as the Supervisory Special Agent of the Cyber C...

  • speaker photo
    Moderator: Ed Pascua
    SVP, Simeio Solutions & Director, ISSA
  • speaker photo
    Joseph Thacker
    Sr. Security Consultant, Crowe

    Joseph Thacker, CISSP, is a Senior Staff Member in Crowe’s cybersecurity practice. With experience in software development, automation, and cybersecurity, he is serving in Security Engineer and Analyst roles to assist in the development and maturing of one of Crowe’s cybersecurity programs. He has a Bachelor’s degree in Computer Science and a...

  • speaker photo
    Tim Chapman
    Director of Security Assurance, ADP

    Tim Chapman serves as ADP’s Director of Security Assurance, leading a team that provides security assurance to ADP’s North American clients. Prior to ADP, Tim’s expertise includes over 17 years of information security, operational risk management, business management, and process improvement experience. Additionally, Tim has been involved wit...

  • speaker photo
    Jeff Wheat
    Director, Solutions Engineering, @RISK Technologies, Inc.

    Jeff is the Director of Solutions Engineering at @RISK Technologies as a Technical Director sitting at the nexus of Sales, Deployment, Operations, and Product Development. Interacting directly with customer C-Suite and Technical Staff to drive sales, customer satisfaction, and innovation back into the platform. Jeff provides operational and c...

  • speaker photo
    Tim Callahan
    SVP, Global Chief Security Officer, Aflac

    Timothy L. Callahan, CISSP, CISM, CRISC Senior Vice President, Global Security; Chief Security Officer Tim Callahan joined Aflac in 2014, bringing more than 30 years of experience in information and physical security, business resiliency and risk management. He was promoted to his current role in January 2016, where he is responsible for dire...

  • speaker photo
    Phyllis Woodruff
    VP, Enterprise Cybersecurity Programs, Fiserv
  • speaker photo
    Kim Keever
    CISO & SVP, Security & Technology Services, Cox Communications
  • speaker photo
    Deborah Wheeler
    CISO, Delta Air Lines
  • speaker photo
    Michael Jones
    Attorney, Trusted Counsel

    Michael is a corporate attorney with a strong background in intellectual property and business-oriented technology. As an Attorney with Trusted Counsel, Michael handles licensing and commercial agreement issues. He advises clients on IP and technology licensing, outsourcing and services agreements. He is responsible for negotiating complex te...

  • speaker photo
    Dominick Frazier
    Security Awareness & Communications Manager, Tenet Health

    Dominick Frazier is a security professional with over 13 years of security experience with his current role being in Information Technology/Cyber-Security. In his current role he serves as the Security Awareness & Communication Manager responsible for the conversation around security between technical and non-technical teams, which extends to...

  • speaker photo
    David Allen
    CISO, State of Georgia - Georgia Technology Authority

    David Allen is the Chief Information Security Officer for the State of Georgia. He leads GTA’s Office of Information Security, which unifies information security responsibilities for the state’s IT enterprise, the Georgia Enterprise Technology Services (GETS) program, and GTA. Prior to joining GTA in 2019, David served as the Chief Informatio...

  • speaker photo
    Graeme Payne
    President, Cybersecurity4Executives

    Graeme Payne has over 30 years' experience in security and information technology risk consulting and IT management. He spent the majority of his career at Ernst & Young prior to joining Equifax in 2011 as VP of IT Risk & Compliance. At the time of the 2017 Equifax data breach, he was CIO of Global Corporate Platforms. He now consults with Bo...

  • speaker photo
    Lori Anello
    VP, Threat Management & Cybersecurity Operations, GE Aviation

    Lori Anello is an adaptive leader with broad background in leading large enterprise teams in the areas of infrastructure, security technology, application architecture, and business solutions. She started her career working for the National Institutes of Health and then moved into private industry in the areas of consulting and manufacturing ...

  • speaker photo
    Kristen Ellis
    Sr. Director, Cybersecurity, Clinical Reference Laboratory, Inc.

    Kristen Ellis is the Security Officer for Clinical Reference Laboratory, Inc. in Lenexa, KS. She obtained her Certified Information Systems Security Professional (CISSP) designation in 2012 and has over 23 years of Information Technology experience, twelve years focused in security. Mrs. Ellis has been instrumental in the development of the s...

  • speaker photo
    Melissa Spicer
    Sr. Manager, InfoSec Ops, Kansas City Power & Light
  • speaker photo
    Moderator: Beth Strobel
    Sales Director, Onspring

    Beth Strobel began her career at a global aerospace and defense company, maintaining responsibility for the ethics and legal compliance training and awareness programs. She's since worked in both technical and sales roles at technology companies providing solutions for cybersecurity and governance, risk and compliance. Beth currently serves a...

  • speaker photo
    James Pointer
    Manager of Information Security , EML Payments
  • speaker photo
    Mike Shine
    Director, Systems Engineering, Mimecast

    Mike has over 15 years’ experience designing and implementing IT security solutions for large enterprises, and he’s currently focused on making email safer for businesses. He actively participates in combating existing cyber threats and researching new threats out of Mimecast’s Chicago office. Mike holds a degree in Computer Engineering from ...

  • speaker photo
    Anne Rogers
  • speaker photo
    Mario Chiock
    Fellow & CISO Emeritus, Schlumberger

    Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the
    company’s worldwide, long-term cyber security strategy. He is recognized for his leadership...

  • speaker photo
    Brandon Bradshaw
    Sales Engineer, Trend Micro

    Brandon has been with Trend Micro for three plus years, and has been in the IT Industry since the late 1990s. As a Sales Engineer, it's his passion to be the technical bridge between sales and customers.

  • speaker photo
    Altaz Valani
    Research Director, Security Compass
  • speaker photo
    Sahba Kazerooni
    CISO, Aviva Canada
  • speaker photo
    Karen Nemani
    Director, Risk, Compliance and Projects, IACS, Opentext
  • speaker photo
    Greg Thompson
    Vice President & CISO, Manulife
  • speaker photo
    Patrick Gray
    IT Security Consultant, Patrick Gray & Assoc LLC
  • speaker photo
    Stanton Gatewood
    CISO, State of Georgia
  • speaker photo
    Vinay Puri
    National Director, Cloud Security, Deloitte

    Vinay is a ex-veteran and a leader in Cyber Security with two decades of experience. He currently leads the National Cloud Security practice for Deloitte Canada. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organization in architecting complete security framework....

  • speaker photo
    Bryan Orme
    Principal & Partner, GuidePoint Security

    Bryan Orme leads the Information Assurance consulting organization; which includes Application Security, Cloud Security, Governance, Risk, and Compliance Services, Threat and Attack Simulation, Incident Response and Forensics. Additionally, Bryan leads the internal IT and Information Security teams as well as the Project Management Office and...

  • speaker photo
    Susan Berezny
    Director, Information Security, Royal Canadian Mint

    Susan Berezny is the Director of Information Security at the Royal Canadian Mint. She is responsible for developing a cybersecurity strategy and managing a risk-based security program aligned with business objectives. Prior to joining the Mint, Susan was with The Ottawa Hospital for 23 years in several roles, including Information Security Of...

  • speaker photo
    Bob Gordon
    Executive Director, Canadian Cyber Threat Exchange

    Robert W. (Bob) Gordon is the Executive Director of the Canadian Cyber Threat Exchange (CCTX). The CCTX is Canada’s private sector organization for the sharing and analysis of cyber threat information, and enabling collaboration across all sectors. Most recently, Bob was a Director, Global Cyber Security at CGI. Prior to this, he enjoyed a lo...

  • speaker photo
    Laura Fey
    Principal, Fey LLC

    Laura Clark Fey, Esq., PLS, CIPP/US, CIPP/E, CIPM, FIP: Laura Clark Fey, one of the first twenty-seven U.S. attorneys recognized as Privacy Law Specialists by the International Association of Privacy Professionals (IAPP) (ABA-accredited), leads Fey LLC, a global data privacy and information governance law firm. She and her team help organizat...

  • speaker photo
    Roger Vann
    Information Security Leader, JANUS Associates, Inc.
  • speaker photo
    Dave Snyder
    Chief Information Security Leader, Independence Blue Cross
  • speaker photo
    Samuel Sutton
    Computer Scientist, FBI, Houston Cyber Squad

    Samuel Sutton is an FBI Computer Scientist. Since 1992 he has worked in Headquarters and Field Offices across the country. He is currently assigned to a Cyber Squad of the Houston Office. Specializing in Computer Security, Network Forensics, "Enhanced Network Capabilities", and Information Security Management, his skills have been applied to ...

  • speaker photo
    Andrew Matushek
    Senior Special Agent, United States Secret Service

    Andrew Matushek is a Senior Special Agent (SSA) with the United States Secret Service. He is also the Assistant Director of the Kansas City Electronic Crimes Task Force (ECTF) and has over 19 years of experience. He has previously served in Arizona, California, and Washington, DC, prior to landing in Kansas City. SSA Matushek is current activ...

  • speaker photo
    Tim Miller
    Lead Cybersecurity Consultant, Trend Micro

    Tim has over 10 years’ experience in Information Security and 33 years working with computer technology. He started his career with the Apple IIe in his first computer class, through achieving his master’s degree in Network Communications Management. Tim has been with Trend Micro for three years, and his experience in Information Security in...

  • speaker photo
    Intel Analyst from the FBI
  • speaker photo
    Lynn Watson
    Director of Compliance and Risk Management, Dinsmore & Shohl LLP

    Lynn is the Director of Compliance & Risk Management for Dinsmore & Shohl, a national law firm with 1,300 attorneys and employees in 26 offices. Lynn oversees the cybersecurity team and is responsible for all firm security policies, procedures, technology, and initiatives, including the incident response program.

  • speaker photo
    Eric Bucher
    Solutions Architect, Cequence Security

    Eric Bucher has over 15 years of experience in the security industry with a technical concentration in financial fraud, advanced persistent threats, forensics, exfiltration, DLP, and overall attack surfaces.

  • speaker photo
    Eugene Kesselman
    Founder and CEO, TapJets

    Eugene Kesselman is Founder and CEO of TapJets, the on-demand private jet charter company headquartered in Houston, Texas. Since 2015 the company has been using blockchain ledger technology to conduct its business and since 2016 became the first private aviation company to instantly accept cryptocurrency as a form of payment for its services....

  • speaker photo
    Gustavo Coronel
    Sr. Cloud Security Architect, Check Point Software Technologies

    Gustavo (Gus) Coronel is a Senior Cloud Security Architect with Check Point Software Technologies and has been involved with network security for over 25 years. His first foray into network security was serving as the first Firewall Administrator at the US Department of Transportation in 1994. Intrusion Detection, Vulnerability Assessments, P...

  • speaker photo
    Fred Kwong
    CISO, Delta Dental Plan Associates

    Fred Kwong is currently the CISO for Delta Dental Plans Association. He is a highly recognized thought leader in security and is often asked to speak and chair at national/international security conferences. Fred serves on several advisory boards and is often asked to consult on matters of security and leadership. He currently holds the CISSP...

  • speaker photo
    Joseph Rogalski
    Sr. Director, Solution Engineering, eSentire Inc.

    Joe Rogalski is an accomplished Technology and Security Professional with over 20 years of experience developing world-class programs and delivering technology-based solutions. He has served in a variety of technical and management positions during his career, including Security Strategist at Symantec and Information Security Officer at Firs...

  • speaker photo
    Axel Peters
    Executive Sales Manager, baramundi Software USA Inc.

    Axel Peters is Executive Sales Manager for baramundi software USA Inc., headquartered in Framingham, MA. Axel has his degree in IT Management and over six years of experience in professional Endpoint Management. In this time, he has advised over 250 customers from small businesses to global enterprises in Europe. He is well aware of the chall...

  • speaker photo
    Tasha Phelps
    President & CEO, Phelco Technologies, Inc.

    Protecting the integrity of information continues to be a strategic focus within Tasha's cybersecurity efforts. She has seen the impact of businesses being compromised by malicious threats, and shares how building contingency plans can be of value. Her approach is to align business processes with technical solutions to create powerful plans f...

  • speaker photo
    Zaki Abbas
    VP & CISO, Brookfield Asset Management

    An accomplished Information Security and Technology leader with proven ability to develop and align strategies with business priorities and establish strong, trust-based partnerships across executive teams, key stakeholders and board members. Zaki has extensive experience in the insurance, real estate, banking, infrastructure, energy, investm...

  • speaker photo
    Chase Cresgy
    Sr. Healthcare Cybersecurity Consultant, Crowe LLP

    Chase Cresgy attended IUPUI and graduated with a BS in CIT concentrated in information security. He also holds the Security+ and CySA+ certifications. Information/cybersecurity has always interested Chase, and he believes it will be one of the greatest challenges society faces over the next decade. The world of cybersecurity is a fast, ever-c...

  • speaker photo
    Jay Robinson
    Director of Cyber Operations, BlackRock

    BlackRock's Cyber Operations team manages the global 24x7 operations center responsible for cyber monitoring, incident response, cyber intelligence, cyber forensics, and vulnerability management.

  • speaker photo
    Timothy Keese
    Special Agent, FBI
  • speaker photo
    Bob Rudis
    Chief Security Data Scientist, Rapid7

    Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Bre...

  • speaker photo
    Joel Weinstein
    President, Greater Boston Chapter, Association of Continuity Professionals

    Joel Weinstein, a native of Washington DC, moved to Boston in 1977, formed his first company in 1986, and currently is in his second term as president of the Greater Boston Chapter of ACP. He has taught at Boston University, Northeastern University, Benjamin Franklin Institute, and ITT Technical Institute for over 40 years. Joel is interested...

  • speaker photo
    Adib Sarakby
    Sr. Sales Engineer, Mimecast

    Adib Sarakby joined Mimecast as a Service Delivery and, after a year, was promoted to a Sales Engineer role. He works closely with the Sales, Marketing, and Educational teams to continually enhance Mimecast's products and promote Cyber Resilience. Email Security is Adib's passion, and as the threat landscape evolves, he splits his time betwee...

  • speaker photo
    Jonathan Villa
    Practice Director, Cloud Security, GuidePoint Security

    Jonathan Villa has 19 years of experience as a technology consultant including 18 years of direct information security experience. For over 10 years Jonathan consulted to a large municipality across several competencies including PCI compliance and training, application architecture and security, vulnerability management, secure coding, web a...

  • speaker photo
    Antona Dumas
    Associate, XPAN Law Group

    Antonia M. Dumas is an associate at XPAN Law Group, a certified Women’s Business Enterprise (“WBE”) and Women Owned Small Business (“WOSB”). At XPAN, Antonia works with clients to create proactive, streamlined, and global approaches to cybersecurity and data privacy. She performs audits, assessments and gap analysis of a client’s existing con...

  • speaker photo
    Les Stevens
    Vice President, Information Security, Equifax Canada

    As Vice President of Information Security at Equifax Canada, Les Stevens is responsible for the identification, assessment, and mitigation of inherent, residual, regulatory, security, and compliance risks specifically associated with the business operations of Equifax International business units. His experience building and maintaining infor...

  • speaker photo
    Heather Bearfield
    IT Risk and Assurance Services Leader, Marcum Technology

    Heather B. Bearfield is a principal in the firm’s Boston office and serves as the IT Risk and Assurance Services leader. She is also a member of the national Real Estate, Alternative Investment, Healthcare, and Financial Services Industry groups. In addition, Ms. Bearfield chairs the Marcum Diversity & Inclusion Committee. She has extensive e...

  • speaker photo
    Chris Braden
    Vice President, Global Channels & Alliances, eSentire

    Chris Braden is a veteran sales and channel executive, bringing over 20 years of experience building, leading, and executing successful programs around the world. In his current role as the Vice President, Global Channels and Alliances, he is responsible for eSentire's global channel program, overseeing strategic partner recruitment, internat...

  • speaker photo
    Mike Fabrico
    Sr. Technical Sales Director, TrapX Security

    Mike Fabrico is a security expert that has worked for NASDAQ and has over 20 years of industry experience in implementing, architecting, and maintaining critical infrastructure networks. He is also an advisory board member on a number of successful cybersecurity companies worldwide for APT/malware, network intrusion, threat intelligence, digi...

  • speaker photo
    Joshua Marpet
    Data Protection Advisory Council
  • speaker photo
    Moderator: Rosemary Christian
    Founder & President, Philadelphia Women and Cyber Security

    Rosemary Christian is the founder and president of the Philadelphia Women & Cyber Security. She has worked in the cybersecurity industry for the last 3 years at AccessIT Group assisting customers with evaluations of their current cybersecurity programs to help them mature their overall security posture. She has a demonstrated passion, knowled...

  • speaker photo
    Moderator: Robert Wilner
    Delaware Valley Chapter President, Cloud Security Alliance
  • speaker photo
    Parker Crook
    Senior Sales Architect, SentinelOne

    Parker Crook has been in the security industry for over 10 years across multiple verticals. He has experience working on both blue and red teams and has been asked to speak at various regional security conferences. Some of his speaking engagements have covered topics such as purple-teaming, wargaming, orchestration, and his own research. Park...

  • speaker photo
    Matt Wilson
    Chief Information Security Advisor, BTB Security

    Matt Wilson is the Chief Information Security Advisor for BTB, based in southeastern Pennsylvania. Matt has spent his entire career in IT and has over 14 years of experience within Information Security. Throughout his career, Matt has fostered the development of assessment methodologies, toolsets, and techniques for the delivery of security a...

  • speaker photo
    Bruce Forman
    CISO, UMassMemorial Health Care

    Bruce has several degrees including an MBA in Biotechnology and Health Industry Management. Prior to his current position at UMass, he held other IT Management positions, focusing on Information Security, Risk Advisory, and Security Strategy and Policy, as well as offering consultative services. Bruce is a past president of the Information Sy...

  • speaker photo
    Brian Minick
    CISO, Fifth Third Bank

    Brian Minick is CISO at Fifth Third Bank. Brian has responsibility for the bank’s information protection program. Brian is a noted speaker and published author. He brings 20 years of technology and cybersecurity leadership and experience to this position. Prior, Brian was VP of Managed Threat Services at Booz Allen Hamilton following the acqu...

  • speaker photo
    Brian Tobia
    Consulting Systems Engineer, Cisco

    Brian has been an IT practitioner, consultant, and pre-sales engineer for 15 years, focusing on network and virtualization security. He currently is a consulting systems engineer covering cloud security solutions at Cisco. He holds a CISSP along with other industry certifications.

  • speaker photo
    Andrew Dutton
    CISO, DuHart Consulting

    Strategic Global Cybersecurity leader that is accomplished in complex multinational organizations. Strong interpersonal skills and communicator. Extensive experience in cybersecurity, compliance, governance, architecture. Expert in deployment of enterprise standards, processes, and policies. Strong project management experience. Dedicated and...

  • speaker photo
    Christopher Stephen
    Senior Sales Engineer, SentinelOne

    Chris Stephen is a Senior Sales Engineer at SentinelOne. Chris has over a decade of experience in the IT field, from his initial startup where he designed end-phase punch management systems for commercial and residential builders, to his work at Apple to his work in the medical industry. Chris is a ‘Jack-of-all-trades’ when it comes to IT.

  • speaker photo
    Grant Asplund
    Chief Cyber Security Evangelist, Check Point Software Technologies

    For more than 20 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber attacks in an increasingly complex world. As Check Point’s chief evangelist he travels the world enthralling audiences with his passionate and relational storytelling at conferences like RSA and Next100 CI...

  • speaker photo
    Kevin McPeak
    Principal Cyber Architect, U.S. Federal Government, Symantec

    Kevin McPeak is Symantec’s Principal Cyber Architect for the U.S. Federal Government. In this capacity, he serves as the technical SME for eight distinct enterprise defensive technologies. In addition to his CISSP and ITILv3 certifications, Kevin also holds two Masters of Science degrees from Johns Hopkins University and Virginia Tech. In add...

  • speaker photo
    Ondrej Krehel
    CEO and Founder , LIFARS

    Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise. He actively participates in many high-profile engagements around the world whereby his proprietary methodology is leveraged to achieve the most rapid root-cause analysis and remediation.
    He’s the former Chief Information Security Officer ...

  • speaker photo
    Katie Creaser
    SVP and Cybersecurity Practice Lead, Affect

    Katie is a Sr. Vice President, Cybersecurity Lead at Affect, where she provides counsel to clients that are looking to bring PR and social media into their communications program as part of a thoughtful, holistic strategy. Katie is passionate about helping brands of all shapes and sizes find unique and creative ways to tell their story. She w...

  • speaker photo
    Seth Robertson
    Principal, Nocturn Security

    Seth is a dynamic information security leader with fifteen years’ experience building best-in-class programs – including launching a security startup, managing NASA’s incident response program, founding the Security Operations Center at a top Wall Street firm, and leading the security program for a global tech company. His work has been used ...

  • speaker photo
    Sandra Fathi
    President, Affect

    Sandra Fathi has spent the last 20 years helping technology, healthcare and professional services companies achieve their goals. As President and Founder of Affect, a public relations, marketing and social media agency, Sandra has successfully led the company with consistent growth since the agency’s inception in 2002. Sandra’s commentary has...

  • speaker photo
    Jimmy Mills
    Senior Solutions Architect, SSH.COM

    Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.

  • speaker photo
    Kenneth Olmstead
    Internet Privacy & Security Analyst, The Internet Society's Online Trust Alliance

    Kenneth (Kenny) Olmstead is the Internet Security & Privacy Analyst that helps research, analyze, write, and review technical content relating to The Internet Society's Online Trust Alliance issues—identity, security, privacy, and data stewardship. He also helps with communications and engages the OTA Committees on technical and techno-policy...

  • speaker photo
    Jodi Daniels
    Founder & CEO & Privacy Consultant, Red Clover Advisors, LLC

    Jodi Daniels, founder of Red Clover Advisors, is a Certified Informational Privacy Professional (CIPP/US) with more than 20 years of experience helping a range of businesses from solopreneurs to multi-national companies. Red Clover Advisors has helped hundreds of companies create privacy programs, achieve GDPR compliance, and establish a secu...

  • speaker photo
    Tasneem Nipplewala
    VP, Information Security; MSIA, CISSP, CCSP, Eastern Bank

    Tasneem is a Senior Security Architect at Eastern Bank, the largest and oldest mutual bank in the country with $11B in assets. As part of her responsibilities, she provides internal clients security services when implementing new initiatives across the bank and insurance company to ensure the solutions are built with the highest security stan...

  • speaker photo
    Jason Barr
    CIO & CISO, Aptean

    Jason is currently the CIO and CISO of Aptean, leading the IT, security and governance, cloud hosting services, and business systems teams. He's been in the technology sector for over 20 years and has a passion for taking things apart and making them better.

  • speaker photo
    Jockel Carter
    Sr. Cybersecurity Advisor, Sage Data Security
  • speaker photo
    Jeremy Rucker
    Attorney, Spencer Fane LLP

    As a cybersecurity and data privacy attorney in the Dallas office of Spencer Fane LLP, Jeremy Rucker has assisted companies of all sizes in responding to data security and privacy incidents. The expertise of Jeremy and his Spencer Fane colleagues cover several industries including healthcare, banking and finance, insurance, energy, transporta...

  • speaker photo
    Dr. John Opala
    VP, IT Security, McCormick

    Cybersecurity thought leader with over 19 years of technical and leadership experience in multiple disciplines.

  • speaker photo
    Fred Gordy
    Director of Cybersecurity , Intelligent Buildings, LLC

    Fred Gordy is the Director of Cybersecurity at Intelligent Buildings, LLC and is a nationally recognized thought leader, speaker and expert in building systems cybersecurity specializing in organizational and technical vulnerabilities. He has over 20 years of industry experience including information technology and building controls systems. ...

  • speaker photo
    Tom Tollerton
    Sr. Manager, IT Advisory, DHG

    Tom has 15+ years of experience in the IT industry, and has extensive experience performing SOC 1 and 2 examinations and reporting, cybersecurity risk assessments, PCI compliance assessments, and system security assessments. Tom is one of DHG’s PCI Qualified Security Assessors and has completed multiple Reports on Compliance for PCI Level 1 m...

  • speaker photo
    Bryan Bechard
    Fractional CISO, CISO4hire

    Bryan has been working in InfoSec for 20 years as an individual contributor and management of security professionals. Currently, he is the CISO of an auto finance company and Board member of the (ISC)2 Philadelphia chapter. Current certs: CISSP, CSSLP, CRISC.

  • speaker photo
    Velu Jeganathan
    VP, Security Engineering Solutions Team, State Street Corporation

    Velu Jeganathan has more than 20 years of IT experience, most of which is around Information Security. He has been extensivly involved in various roles in penetration testing, vulnerability management, security project consulting, and developing security processes, with an emphasis on integrating security into the project lifecycle.

  • speaker photo
    Vince Fitzpatrick
    Cyber Risk Program Manager, Christiana Care Health System

    Vince Fitzpatrick has experience greater than some and less than others. Currently he is the Cyber Risk Program Manager at Christiana Care Health System (CCHS), one of the largest health care providers in the mid-Atlantic region, serving all of Delaware and parts of PA, MD, and NJ.

  • speaker photo
    Jim Menkevich
    Sr. Sales Engineer, Netskope

    Jim Menkevich is an Information Security, Privacy, and Risk Management professional with 19+ years of experience. Through his career, he has led teams in Cybersecurity, Enterprise Architecture, Systems Integration, and Application Development. Jim specializes in applying methodologies, frameworks, and ideas outside of the intended domain, whi...

  • speaker photo
    Joe Walsh
    MCJ Program Director and Instructor of Computer Science/Criminal Justice, DeSales University

    Joe Walsh teaches digital forensics and computer security at DeSales University. He previously worked as a senior security consultant where he performed security assessments, conducted penetration testing, and responded to computer security incidents. He has been a police officer for eleven years and is a former member of the ICAC Task Force ...

  • speaker photo
    Charles Sgrillo
    Professor of Cybersecurity, Drexel University

    Charles Sgrillo is an adjunct professor of cybersecurity at Drexel University, teaching on topics such as IT Auditing, Cybersecurity, Penetration Testing, and Computer Forensics. During his time as a principal consultant, Charles has worked with over 50 businesses to implement the NIST Cybersecurity Framework. Along with teaching at Drexel Un...

  • speaker photo
    Christian Espinosa
    CEO, Alpine Security

    Christian Espinosa is Alpine Security's CEO/Founder and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a US Air Force veteran with a BS in Engineering from the US Air Force Academy and MBA from Webster University. Christian holds multiple patents on cyberse...

  • speaker photo
    Daniel Smith
    Head of Security, Emergency Response Team, Radware

    Daniel Smith is the Head of Security Research for Radware's Emergency Response Team and provides executive insight for SC Magazine. Daniel's research mainly focuses on network and application based vulnerabilities. As a white-hat hacker, his expertise in criminal tactics, techniques, and procedures (TTP) helps Radware develop signatures and m...

  • speaker photo
    Roy Wattanasin
    Information Security Leader, Healthcare Industry

    Roy Wattanasin is currently a healthcare information security professional. Additionally, Roy is an avid speaker who has spoken at many conferences and webinars. Roy also enjoys data forensics & incident response and building security in. He is heavily involved with many computer security groups including OWASP Boston, ISSA and the local comm...

  • speaker photo
    Ron Reidy
    Audit Analytics Leader, Wells Fargo

    Ron has been working in IT for over 30 years. Starting as a software engineer writing database programs on CP/M, MSDOS, VAX/VMS, and UNIX in C, Pascal, VAX/VMS assembler, and FORTRAN. After 15 years, he switched into a database administration role, managing large Oracle databases as well as smaller SQL Server and Sybase databases. Ron became ...

  • speaker photo
    Ernesto DiGiambattista
    CEO & Founder, CYBRIC

    Ernesto DiGiambattista founded CYBRIC to enable organizations to more easily, confidently and holistically answer the question “How secure are we?” Prior to founding CYBRIC and developing the CYBRIC Continuous Application Security Platform, Ernesto was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, responsibl...

  • speaker photo
    Michael Brown
    Rear Admiral, U.S. Navy (Ret.), President, Spinnaker Security LLC; ACSC Board Clerk

    Michael Brown, Rear Admiral, United States Navy (Retired) is the Founder and President, Spinnaker Security LLC, a cybersecurity consulting business focused on understanding, identifying and mitigating business risks associated with cybersecurity. Additionally, Brown brings executive leadership, including crisis management, from both public an...

  • speaker photo
    Salar Atrizadeh, Esq.
    Attorney at Law, Law Offices of Salar Atrizadeh

    Salar Atrizadeh, Esq. is an attorney and information technology expert. He has an extensive background in computer information services, with a focus on database management systems. Salar has conducted seminars before legal and non-legal organizations on similar topics.

  • speaker photo
    Matt Connors
    Identity and Access Management Program Manager, University of New Hampshire

    Matt Connors is the Identity and Access Management Program Manager for the University of New Hampshire. His role sits at the cross section of enterprise infrastructure, client experience, and security; as well as leading IAM strategy and practice for a Tier 1 Research University. Matt enjoys collaborating and sharing knowledge with technolog...

  • speaker photo
    Edward Davis
    President & CEO, Edward Davis, LLC

    Davis has been in law enforcement for 35 years. He served as the Police Commissioner of the City of Boston from December 2006 until October 2013. He administered 6 world championship celebrations and led the highly successful response to the Boston Marathon bombing. Prior to that, Davis was the Superintendent of the Lowell Police Department, ...

  • speaker photo
    Sean Baggett
    Sr. Director, Information Security, Blue Cross Blue Shield of MA

    Sean Baggett is the Senior Director of Information Security at Blue Cross Blue Shield of Massachusetts. After spending 10 years as a United States Naval Officer, Sean has worked exclusively in Information Technology and Cybersecurity. He has held senior leadership positions at Boston Medical Center & Massachusetts Eye and Ear Infirmary before...

  • speaker photo
    Bryan Scovill
    Manager, Telecom & Network Ops, University of New Hampshire

    Lead of the network security team at the University of New Hampshire for 18 years. Areas of focus include development and architicture in the UNH networking enviroment.

  • speaker photo
    Hazel Cerra
    Senior Special Agent, United States Secret Service

    Hazel Cerra is a Senior Special Agent (SSA) with the United States Secret Service out of the Philadelphia Field Office assigned to the Financial Fraud Division. She has over 19 years of experience in protection and investigations. She began her career investigating counterfeit currency, identity theft and credit card fraud. In 2009, she was t...

  • speaker photo
    Anahi Santiago
    CISO, Christiana Care Health System

    Anahi Santiago is the Chief Information Security Officer at Christiana Care Health System, the largest healthcare provider in the state of Delaware. Prior CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. In her role as CISO she has overall responsibility for the organization's cyber...

  • speaker photo
    Craig Newell
    Manager, Information Security, Ontario Cannabis Store

    Craig is in the business of mitigating privacy and data loss disasters. Constantly keeping abreast of new challenges and developments in the industry, he has evangelized risk-based security and control through the banking and utility industries, private business, governmental agencies, and now, online sale of a really exciting product. A beli...

  • speaker photo
    Bruce Schneier
    Security and Cryptography Expert and Author

    Bruce Schneier is an internationally-renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the best-seller "Click Here to Kill Everybody"—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over ...

  • speaker photo
    Arvin Verma
    Cybersecurity Strategist, InfraGard National Sector IT Subject Matter Expert

    Arvin Verma is a highly motivated and talented cybersecurity professional with over 8 years of experience across a diverse set of cyber domains and industries such as Aerospace and Defense, Technology, Financial and Insurance, Commercial Retail, Manufacturing and several more. He has filed more than 4 invention disclosures in the field of cyb...

  • speaker photo
    Samantha Dutton
    President , DuHart Consulting

    Dr. Samantha Dutton is the President of DuHart Consulting where she works with her husband in addressing cybersecurity business needs, as it impacts the human factor. She is also an Associate Dean and the Director of the Social Work Program in the College of Social and Behavioral Sciences at the University of Phoenix. She is a Licensed Clinic...

  • speaker photo
    Calvin Nobles
    Cybersecurity Policy Fellow, New America Think Tank, New America

    Dr. Nobles is a Cybersecurity Scientist and practitioner with more than 25 years of experience. He teaches cybersecurity at several universities. He recently retired from the Navy and is currently employed in the Financial and Services Industry. Dr. Nobles is a Cybersecurity Policy Fellow with the New America Think Tank. He authored a book on...

  • speaker photo
    Joseph Fontecchio
    Director of Infrastructure and Database Services, The University of Massachusetts

    Joe is currently the director of infrastructure and database services for The University of Massachusetts Information Technology Services department, leading a team of security professionals who support infrastructure and applications used to host shared services. He holds a master’s degree in Information Technology from Worcester Polytechnic...

  • speaker photo
    Girish Chiruvolu
    Director, Information Security Risk Management, Experian

    Dr. Chiruvolu is a CISSP/CISM and has spent several years in the security industry and in particular Finance/e-Commerce and Enterprise industries on cloud/SaaS technologies. He is currently Director Information Security and risk management, and has lead several successful programs on several fronts of Information Security, Risk management and...

  • speaker photo
    Helen Patton
    CISO, The Ohio State University

    Helen is the Chief Information Security Officer at The Ohio State University. She is part of the Enterprise Security team, and oversees Security, Privacy and Disaster Recovery across the university. Helen believes Security is a critical element of data integrity. She works to improve diversity in STEM, and mentors anyone needing career develo...

  • speaker photo
    Rori Boyce-Werner
    Information Security Compliance Program Manager, University of New Hampshire

    Rori Boyce-Werner is currently the Information Security Compliance Program Manager for the University of New Hampshire, where she was previously the Associate Director of IT Client Services and Identity and Access Management Service Owner.She holds a Bachelor’s of Science in Business Administration and is working towards her Masters of Cybers...

  • speaker photo
    Michael Gough
    Founder, IMF Security

    Michael is a Malware Archaeologist, Blue Team defender, Incident Responder and logoholic. Michael developed several Windows logging cheat sheets to help the security industry understand Windows logging, where to start and what to look for. Michael is co-developer of LOG-MD, a free tool that audits the settings, harvests and reports on malicio...

  • speaker photo
    Kalani Hausman
    Adjunct Professor, University of Maryland University College
  • speaker photo
    James Baird
    Founder and Manager, Cybersecurity Management Consultants, LLC

    As a CISO, James has seen his role oversee all the programs and processes involved with Information Security, Operational Security, Technology Risk Management, and IT Compliance, . He has designed and implemented security programs using the ISO 27001, NIST RMF, NIST ICTSCRM, NIST CSF, and ITIL. James holds a Master of Science degree in Inform...

  • speaker photo
    Bryan Inagaki
    Sr. Director, Cybersecurity Risk Management & Solutions, Thermo Fisher Scientific

    Bryan's path to information security was anything but direct, and he took a few detours in the worlds of small business, federal law enforcement and financial services before finding himself fully entrenched in the industry. As a physical security professional first and an information security professional second, Bryan enjoys the challenge o...

  • speaker photo
    John Helt
    Security Operations Center Manager, Discovery, Inc. (Formerly Scripps Networks)

    I have considered myself a "hacker" from the moment I turned on my TI-99/4a. My insatiable curiosity has driven me through a career in IT Operations and InfoSec with both Hewlett Packard (10 years) and Discovery (Scripps Networks Interactive, 18 year). I hold a MS in Information Systems Management and current CISSP-ISSAP, CEH, and CCENT certs...

  • speaker photo
    Candy Alexander
    International President, ISSA

    Candy Alexander has 30+ years experience working for various high-tech companies. She has held several positions as CISO and currently is a Virtual CISO and Executive Cyber Security Consultant. As a recognized leader in the profession, Ms Alexander is often invited to speak at many technology events and interviewed for various publications on...

  • speaker photo
    Sandy Silk
    Director, Information Security Education & Consulting, Harvard University

    Sandy Silk is the Director of Information Security Education and Consulting at Harvard University, Founder of Cyber Risk and Resilience Consulting, and a member of the Board of Advisors for the MS in Information Security Leadership at Brandeis University. She excels at bringing together executive leaders, business teams, and IT professionals ...

  • speaker photo
    Mike Brannon
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Brandi Keough
    Information Security Analyst, Novant Health

    Brandi Keough is a Charlotte, North Carolina, native who started her college career at UNC Charlotte as a Chemistry major and graduated from Utica College in 2016 with her Bachelors of Science in Cybersecurity and Information Assurance with a concentration in Forensics and Investigations. Brandi is currently an information security analyst wi...

  • speaker photo
    Bernie McGuinness
    IT Risk Lead, Campbell Soup Company

    Bernie is a cybersSecurity professional with over 20 years’ experience, both hands on and regulatory compliance of multiple complex systems within the Department of Defense and the commercial space. He provides in-depth knowledge on Third-Party Risk Management, Information Security, Assurance, Audit, and IT Operations, within industry. Holder...

  • speaker photo
    Ian Burke
    Enterprise Information Security Manager, Road Scholar

    Currently the Enterprise Information Security Manager for Road Scholar in Boston, Ian Burke has been working in information security for over 20 years, completing his master’s degree in Information Assurance in 2013. He has worked for companies such as TJX and IBM in the business sectors and Middlebury College in the education sector. He has ...

  • speaker photo
    Dr. Raj Sachdev
    Professor, Researcher, Lawyer, Education

    Dr. Raj Sachdev is a professor, researcher, and‎ internationally qualified lawyer (USA and England/Wales). He holds‎ several degrees in business and law and has guest spoken at such institutions as Oxford, Cambridge, Stanford and major industry conferences including having given a TEDx talk. Over the last 15‎ years, he has taught 50‎+ differe...

  • speaker photo
    Barry Herrin
    Founder, Herrin Health Law, P.C.

    Barry Herrin is the Founder of Herrin Health Law, P.C., a boutique law practice located in Atlanta, Georgia. He regularly assists health care providers in all segments of the industry on health care operations and compliance, medical information privacy and confidentiality, cybersecurity, and data breach response. He is admitted to the bars o...

  • speaker photo
    Tariq Shaikh
    IT Program Manager, Aetna

    Tariq Shaikh leads the Privileged Access Management practice for Aetna as part of their Global Security team. Tariq has more than 20 years of technology experience and is a certified project manager and information systems security professional. Tariq is an SME in the Privileged Access Management space and has spoken extensively about it at i...

  • speaker photo
    Tyler Tate
    Sr. Systems Engineer, Palo Alto Networks
  • speaker photo
    Zubaid Kazmi
    Sr. Manager and IAM Practice Lead, Sila

    Zubaid is a Sr. Manager and Identity and Access Management Practice Lead at Sila. With close to two decades of consulting experience, he has helped Fortune 500 organizations develop Identity and Access Management strategies and solutions. Zubaid has worked with clients across multiple industries, including financial services, telecommunicatio...

  • speaker photo
    Greg Bennett
    Program Manager, Air Force CyberWorx, Center for Technology, Research and Commercialization

    Air Force Officer for 22 years culminating as the Director of Research for a Department of Defense and Dept. of Homeland Security interagency research center delivering capability to the Homeland Security Enterprise and the Air Force. He was the CEO for a small business in Colorado Springs for 14 years and is currently the program manager and...

  • speaker photo
    Wayne Tynes
    Sr. Sales Engineer, Mimecast

    Wayne Tynes is a Sr. Sales Engineer at Mimecast and has been designing solutions on Microsoft’s enterprise software stack for over 20 years, including working for Microsoft as a field sales engineer and SharePoint product manager. Wayne spent 5 years as a Solutions Architect at Avanade and was responsible for their Managed Services business i...

  • speaker photo
    Ashwin Patil
    Sr. Security Analyst , Microsoft

    Ashwin Patil currently works with Microsoft as Senior Security Analyst in Redmond, WA, with over nine years of Blue Team experience in security monitoring and Incident Response. His core work areas are security analytics, threat hunting using Big Data and SIEM technologies with strong interest in Data Science and Machine Learning to analyze s...

  • speaker photo
    Clint Harris
    Consulting Systems Engineer, Cloud Security, Cisco

    Clint is a Consulting Security Engineer with Cisco. He has over 19 years of experience in information security. Originally from New Zealand, he was an Avionics Engineer in the Royal New Zealand Airforce for five years before entering civilian life as a System Administrator with Peace Software. Experiencing a company breach and response first-...

  • speaker photo
    Rich Compton
    Principal Network Security Engineer, Charter Communications

    Rich Compton has been working at ISPs for the last 20 years. He was the very first Network Security Engineer at Charter Communications and has been working in the cable industry for the past 16 years. In his tenure at Charter, he has dealt with all facets of network security. He now focuses on DDoS detection and mitigation, stopping botnets, ...

  • speaker photo
    Tim McCain
    CISO, City of Aurora

    Tim McCain is the Chief Information Security Officer for the City of Aurora, Colorado. He has been in the governance, risk, and compliance industry for 18 years at the manager, director, and CISO level of start-ups to multi-national corporations, including public and private sector. He sees his role as a business enabler, driving meaningful b...

  • speaker photo
    Aleta Jeffress
    Chief Information & Digital Officer, City of Aurora

    Aleta Jeffress is the Chief Information and Digital Officer for the City of Aurora. She has over 20 years as a successful executive business leader and technologist building relationships between business and technology to enable digital transformation and market growth. She drives innovative strategies for business and IT leadership, and ...

  • speaker photo
    Kurt Johnson
    Security Engineer, Check Point Software Technologies

    Check Point Security Engineer, three years;
    Pro Serve/Consultant, four years;
    Sr. Engineer in Financial Services, six years;
    Firewall Monkey, two years

  • speaker photo
    Doug Carter
    Americas IT Security Operations Manager, Munich Re (Group)
  • speaker photo
    JD Milton
    Sr. Information Security Analyst, Greater Cincinnati Hospital System
  • speaker photo
    Lt. Col. Robert Siau
    Cyber Division Chief, Washington Air National Guard

    Lt. Col. Robert A. Siau is currently serving as the Cyber Division Chief for the 252 Cyberspace Operations Group and duel-hatted to the Washington Joint Forces Headquarters as the Operational Cyber Planner.

    Siau is a seasoned cyberspace operator, serving more than 17 years in cyber missions. During Siau's Command of the 262 COS he led ...

  • speaker photo
    Philip Marshall
    Sr. Director, Product Marketing, SecurityScorecard

    Phil Marshall is a security industry veteran with more than 17 years of experience in both network and data security. At SecurityScorecard, he oversees the company’s go-to-market strategy in partnership with the product management organization. Prior to joining SecurityScorecard, Phil worked at security firms Black Duck, Cryptzone, Rapid7, an...

  • speaker photo
    David Cardwell
    Client Solutions Advisor, Optiv

    David Cardwell is a client solutions advisor in Optiv’s major accounts team. In this role he specializes in aligning information security solutions that enable an organization to meet their current and future goals. David has more than 13 years of experience in information security, ranging from frontline support, consulting, and security arc...

  • speaker photo
    Kristopher Dane
    Director of Digital Design, Thornton Tomasetti

    Kristopher is the Director of Digital Design based out of the Seattle office of Thornton Tomasetti, an international structural engineering firm. Kris has 11 years of experience managing teams, administering technology, and developing custom tools to support the design of over 5 million square feet of structures around the world. In collabora...

  • speaker photo
    Seth Kulakow
    Director, Promontory

    Seth is a director in Promontory’s cyber practice, where he advises clients on all aspects of tactical and strategic cybersecurity. He has more than 20 years of experience providing dynamic, secure, and cost-effective security solutions and programs. He has served in senior information security positions at companies ranging from startups to ...

  • speaker photo
    Emily Shipman
    Sr. Product Manager, RSA

    Emily Shipman is a senior product manager, responsible for RSA Archer’s Integrated Risk Management offerings. Emily previously spent seven years in Archer’s presales consulting group, working with hundreds of GRC customers globally to develop tailored solutions for cutting-edge risk management. As a product manager, she drives Archer’s innova...

  • speaker photo
    Nick Butcher
    Sr. Engineering Program Manager, Security/GRC, Microsoft

    Nick is a senior program manager within the Digital Security and Risk Engineering group at Microsoft, where he is responsible for designing, developing, and deploying GRC (Governance, Risk, and Compliance) automation to support every division at the company. Focused on modernizing existing work efforts and building entirely new processes fro...

  • speaker photo
    Moderator: Derek Isaacs
    CAMMO Program CISO, Boecore Inc.

    Author, speaker, and SME. Specialties and certifications include: CISSP, CRISC, CGEIT, Security+, C|EH, C|NDA, ITILv.3, C|CISO

  • speaker photo
    Eric Wong
    Security Engineer, West, Comodo

    Eric Wong is an experienced security engineer with 15 years in the security industry. He has worked with many different security technologies and F-500 clients over the years, focusing on architecting and deploying secure environments. Eric brings the unique expertise of working on both sides of the isle, from the client-side practitioner r...

  • speaker photo
    Cathy Hall
    Sr. Manager and Cybersecurity Architect, Sila Solutions Group

    Cathy is a cybersecurity leader with 18 years of experience providing specialized IT Services to Fortune 500 companies and government agencies, specializing in Identity and Access Management, Information Security, Enterprise Applications and Business Process Management. Cathy brings a unique mix of Federal and Commercial cybersecurity experie...

  • speaker photo
    Zachary Limacher
    Sr. Manager and PAM Practice Lead, Sila Solutions Group

    Zachary Limacher is a cybersecurity leader, business architect, and strategist with 19 years of experience in architecting and implementing enterprise cybersecurity solutions. He has worked in both consulting and corporate roles. Prior to joining Sila, Zach led Access Management at Charles Schwab & Co. Zach is the Privileged Access Management...

  • speaker photo
    Stacy Scott
    Managing Director, Cyber Risk, Kroll

    Stacy Scott is a Managing Director in Kroll’s Cyber Risk practice, based in Dallas. In addition to founding and operating her own consultancy, Stacy has served in high-profile roles with a leading cyber security consulting firm, a Big Four accounting firm, and the largest not-for-profit healthcare system in Texas. She joined Kroll with over 1...

  • speaker photo
    Deneen DeFiore
    SVP, Global Chief Information & Product Security Officer, GE Aviation

    Deneen currently serves as SVP, Chief Information & Product Security Officer, for GE Aviation in Cincinnati, Ohio. And most recently she has taken on an expanded role for GE Aviation as co-leader of Aviation’s Digital League 2.0. She has also served as SVP, Chief Technology Officer, Security & Compliance, for GE Digital.

    She is respons...

  • speaker photo
    Jesse Hood
    Director, Darktrace

    Jesse Hood is a Director at Darktrace, the world’s leading cyber AI company. Jesse has helped many enterprise organizations and SMB’s throughout Colorado and the neighboring states deploy cyber AI to detect and stop emerging threats. He works with businesses across a range of industries, including finance, healthcare, biopharma, local governm...

  • speaker photo
    Anne-Marie Scollay
    CISO, Axiom Law

    As CISO for Axiom Law, Anne-Marie leads the information security strategy for Axiom's products/services, corporation, and governance, risk and compliance (GRC). Prior to joining Axiom, she built out and oversaw the infrastructure and security for a Seattle-based SaaS startup and global multi-nationals. Anne-Marie has a passion for operational...

  • speaker photo
    Colonel Jeffrey Collins
    Director, Air Force CyberWorx

    Jeff “T-Rex” Collins (PhD, Carnegie Mellon University) is the Director of Air Force CyberWorx, a unit comprising a public-private research and design center located at the Air Force Academy in Colorado. Jeff is the former Deputy Director for Cyberspace Strategy and Policy at the Pentagon and Director of Staff for the Air Force CIO. He recentl...

  • speaker photo
    Co-Presenter: Rich Moss
    Head of Delivery, Mirador, LLC

    Rich Moss is a nationally known technology executive with 17 years of IT leadership experience. Rich started his career designing security and remote connectivity solutions. He has a proven track record of translating business requirements into technical objectives and ensuring execution of complex whole-corporate initiatives. Rich has develo...

  • speaker photo
    Moderator: Bhuvaneswari Ramkumar
    Engineering Team Lead and Product Owner, GE Digital

    Bhuvana is a product leader in the field of IoT security. She has a decade of experience both in enterprise companies and startups, wearing engineering as well as product hats. In her current leadership avatar, she leads a team that has built and shipped a variety of IIoT security applications.

  • speaker photo
    JT Gaietto
    Executive Director, Cybersecurity Services, Richey May & Co., LLP

    JT has over 18 years of experience providing enterprise information security and risk management services to a variety of organizations, with a particular emphasis on the financial services industry. He has been a Certified Information Systems Security Professional (CISSP) since 2003, and holds an undergraduate degree in Computer Information ...

  • speaker photo
    Sam Masiello
    CISO, Gates Corporation

    Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Sam currently serves as the CISO at Gates Corporation, where he is responsible for the company's data security, risk, and global compliance initiatives. Prior to Gates, he served as the CISO at TeleTech, where he oversaw the protection of ...

  • speaker photo
    Matt Shufeldt
    CISO, Cognizant Healthcare

    Winner of the CTA APEX 2017 (inaugural) CISO of Year award, Matt Shufeldt is a leader in the Cyber Security community with 25+ years working professionally in multiple areas of Information Technology. Matt has been a CISO in multiple industries and is the current CISO for Cognizant Healthcare. As a passionate technologist and an avid believer...

  • speaker photo
    Barry Kimball
    Systems Administrator, VFIS of Ohio

    Barry is a Material Science Engineer turned IT System Admin Contractor. He runs the Cincinnati chapter of SMBA (Security Master Beer Appreciation) and is a member of ISSA. He enjoys tinkering with materials that make computers work—through logic electric circuits to board OS's and coding—covering a wide range of the field of IT. His favorite ...

  • speaker photo
    Matt Scheurer
    Chair, CiNPA Security SIG, Financial Services industry

    Matt Scheurer is a Systems Security Engineer working in the Financial Services industry and serves as Chair of the Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG). He holds a CompTIA Security+ Certification and possesses multiple Microsoft Certifications including MCP, MCPS, MCTS, MCSA, and...

  • speaker photo
    Gary McMullen
    Lead Security Analyst, Great American Insurance

    Gary McMullen is currently a Lead Security Analyst for the Financial/Insurance industry but has previously utilized his information security skill set to defend the Healthcare industry for nearly two decades. He currently resides in his second term as the president of the Cincinnati Tri-State chapter of the International Information System S...

  • speaker photo
    David Howard
    Security Administrator, 19-facility Healthcare System

    David Howard is a CISSP, Certified Ethical Hacker, and holder of many other certifications. He also has 20 years of experience and currently is the senior member of the security staff of a regional hospital system. He is the host of Bring Your Own Security Radio, heard on iHeartRadio's app and many of their AM/FM stations nationwide, and is k...

  • speaker photo
    Nick Ferrell
    Technical Engineer, Trend Micro

    Nick Ferrell has been helping Trend Micro customers across the world solve security challenges since 2011 as a senior engineer and professional services consultant. A primary focus of this work has been assisting enterprise organizations achieve a unified, automated, and effective set of security controls across diverse cloud and data center ...

  • speaker photo
    Matthew Gioia
    Associate Director, IT Security & Compliance, St. Louis Community College

    Matthew Gioia is Associate Director for IT Security & Compliance at St. Louis Community College where he works with students, faculty, and staff to secure student and employee data. Matthew believes the community is best served with an education partner focused on helping every student establish and work towards achievable goals, and that dev...

  • speaker photo
    Patrick Woods
    Asst. Director, Cybersecurity & Technology / CISO, Missouri State Highway Patrol

    Patrick J. Woods serves as the Chief Information Security Officer for the Missouri State Highway Patrol (MSHP) and the Assistant Director for Cybersecurity & Technology in the Patrol's Criminal Justice Information Services (CJIS) Division. In this capacity, Patrick directs the Patrol's cybersecurity and technology efforts to include network, ...

  • speaker photo
    Micah Brown
    Vice President, Greater Cincinnati ISSA

    Micah K. Brown is a member of the IT Security Engineering team at American Modern Insurance, part of the Munich RE Group. Over the past two years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations located in North and South America. In this role Micah has learned the many intr...

  • speaker photo
    Tom Moore
    Consulting Sales Engineer, Cloud Security, Cisco

    Tom has more than 20 years of experience in the information security industry. He has extensive experience in corporate security policy review and design, auditing, vulnerability testing and analysis, network security and application administration. He has held positions as a chief security officer for a worldwide leader in broadcast televisi...

  • speaker photo
    Pratik Lotia
    Security Engineer III, Charter Communications

    Pratik Lotia is a Security Engineer at Charter Communications, responsible for developing new architectures related to firewalls, IDS/IPS, and botnet detection.

  • speaker photo
    Mohamed Malki
    Director, Security Architecture, State of Colorado, Governor's Office of IT

    Mohamed Malki, director of enterprise security architecture and HIPAA officer, has been key in transforming the State of Colorado’s security landscape. He’s been critical in building Colorado’s cybersecurity plan, designing Colorado's public cloud architecture and building the requirements for Colorado's Blockchain center of excellence. Moham...

  • speaker photo
    John Macintosh
    Sr. Systems Engineer, Comodo Cybersecurity

    John is a Senior Systems Engineer with over 10 years of experience in the security field. He’s previously worked with other cybersecurity firms such as Centrify, bringing trust to devices, users, and applications, and Barracuda Networks, where he worked on a wide range of perimeter defense technologies.

  • speaker photo
    Moderator: Jenifer Clark
    Information Security Analyst, Costco Wholesale

    Experienced Information Security Professional with a demonstrated history of working in the retail industry. Skilled in Operations Management, Sales, Management, Point of Sale (POS) / Fuel Systems, and Inventory Control. Strive to find ways information security can enable and support business and operations teams with solutions. Actively supp...

  • speaker photo
    Brandon Reid
    Sales Engineer, Mimecast

    Mimecast Enterprise Sales Engineer with over 12 years’ experience in Information Technology and Security. Brandon has spent the better part of his career helping enterprise customer identify, architect and deploy cloud solutions. Most recently, he is focused on Mimecast’s enterprise customers in the Midwest. His goal is to ensure his customer...

  • speaker photo
    Mary Rowley
    Information Security Manager, Learning Care Group
  • speaker photo
    Stephanie Scheuermann
    Manager, Threat Intelligence and Vulnerability Management, Ford Motor Company
  • speaker photo
    Ken Piggott
    Program Director, Baker College of Auburn Hills
  • speaker photo
    Paul Groll
    Director of Cloud Services and Research, Department of Technology, Management, and Budget, State of Michigan

    Paul Groll is a dislodged UP'er and a recovering coral reef theoretical ecologist. At some point, he got roped into a broad array of computer-related research projects at both the University of Hawaii (1984) and Michigan State University (1981, 1990). SCUBA tanks are heavy, so he eventually switched fields and moved into computer science (hey...

  • speaker photo
    Joe Olerich
    Systems Engineer, Radware

    Joe Olerich is a Systems Engineer for Radware. He works on the front lines designing cutting-edge security solutions to aid organizations in defending against the growing threat landscape. Over his 15 years of experience, Joe has engaged in a variety of roles, from designing networks and managing infrastructure, to running network and applic...

  • speaker photo
    Zachary Briggs
    Corporate Compliance Counsel, Paycor

    Zach Briggs is Corporate Compliance Counsel at Paycor, a human capital management SaaS company based in Cincinnati. He has a management degree from Purdue University and his Juris Doctor from Northern Kentucky University. Zach enjoys seeing how things work and making them work better. He is responsible for driving compliance initiatives acros...

  • speaker photo
    Dan Collins
    Security Technical Solutions Architect, Cisco

    Dan Collins is a Security Technical Solutions Architect for Cisco Systems. Dan has over 25 years in the Information Security industry, including nine of those years serving in the United States Air Force, focusing on Information Security.

  • speaker photo
    Jennifer Czaplewski
    Director in the Information Security Team, Target

    Jennifer Czaplewski is a Director in the Information Security team at Target. She leads Product Analytics, Security Ninjas, Cyber Risk Management, and Product Security Engineering functions. Jennifer has been with Target for 12 years and in Information Security for 8 years. Prior to her time at Target, she led efforts in Corporate IT at Pfize...

  • speaker photo
    Jadee Hanson
    CISO, Code42

    As chief information security officer at Code42, Jadee Hanson leads global risk and compliance,
    security operations, incident response, and insider threat monitoring and investigations. To her
    position, she brings more than 15 years of information security experience and a proven track
    record of building security programs.

  • speaker photo
    Sanur Sikdar
    Technical Specialist Manager, Deloitte

    Sanur is experienced in enterprise and solution architecture, security architecture and design, cloud architecture, threat modeling, Secure DevOps, application development, software testing, and connected vehicle security.

  • speaker photo
    John Fahey
    Global Channel Field Engineer, Comodo Cybersecurity

    John Fahey is a Channel Field Engineer with Comodo Security Solutions. John has 20 years of various technical consulting roles, with deep and wide expertise across the modern IT infrastructure and security technologies and architectures, primarily serving enterprise clients, while also providing mid-market solutions. John’s previous role was ...

  • speaker photo
    Robb Reck
    Co-Host, Colorado = Security podcast

    “Security only works when it’s in tune with the company it supports. Understanding what we are defending (and why) is more important than preventing, detecting or responding to threats. Understanding is dependent on high-quality relationships with stakeholders.”

    Robb has built successful risk-based security programs in the software and...

  • speaker photo
    Brian Gorenc
    Director, Vulnerability Research, Trend Micro

    Brian Gorenc is the Director of Vulnerability Research with Trend Micro. In this role, Brian leads the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers ...

  • speaker photo
    Scott Giordano
    VP and Sr. Counsel, Privacy and Compliance, Spirion

    Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management consulting experience. An IAPP Fellow of Information Privacy and a Certified Information Security Systems Professional (CISSP), Scott serves as Spirion’s subject matter expert on multinational data protection and its intersection with technology...

  • speaker photo
    Brian Cady
    Principal Enterprise Security Architect, Providence St. Joseph Health

    Brian Cady has been working in the information technology industry for more than 20 years with an exceptionally broad background focusing on security, architecture and future technologies. Brian has held leadership positions for IBM and Microsoft along with banking, airline and gaming companies. He is currently leading the Security Strategy &...

  • speaker photo
    Lenny Maly
    VP, Cybersecurity Architecture & Engineering, Capital One

    Lenny is the former of VP of Cyber for Capital One, leading the Security Engineering and Architecture tower. Prior to that, Lenny was at Target, where he lead a number of security engineering organizations, including Cloud Security, Vulnerability Management, and Cybersecurity.

  • speaker photo
    Timothy Colby
    Regional Account Executive, Comodo Cybersecurity

    Tim has been selling and consulting in the Information Security industry for nearly 7 years. He has worked alongside security practitioners within Small-to-Medium size businesses up go Fortune 10 companies, delivering numerous security products and services throughout the years. Tim is responsible for developing Comodo Cyber Security’s chan...

  • speaker photo
    Michael Westra
    Connected Vehicle Cyber Security Technical Manager, Ford Motor Company

    Michael Westra is the Connected Vehicle Cyber Security Technical Manager at Ford Motor Company focused on cybersecurity for connectivity into vehicles and connected technology, including embedded modems, infotainment, cloud, and mobile systems. Mike has 20 years at Ford, with roles including leading software architect for SYNC, Solution Archi...

  • speaker photo
    Thaddeus Hoffmeister
    Law Professor, University of Dayton

    Law professor who is writing a book on IoT and the law.

  • speaker photo
    Auston Davis
    CISO, Stanford Children’s Health | Lucile Packard Children’s Hospital
  • speaker photo
    Amanda Rousseau
    Sr. Malware Researcher, Endgame
  • speaker photo
    Ibrahim Al-Islam
    Sr. Sales Engineer, Malwarebytes
  • speaker photo
    Mark Barragan
    Account Executive, Jazz Networks
  • speaker photo
    Tam Huynh
    Enterprise Solutions Architect, SentinelOne
  • speaker photo
    Jim Almerico
    Director, Corporate IT and Security, Qualys
  • speaker photo
    Mounir Hahad
    Head of Threat Labs, Juniper Networks
  • speaker photo
    Hema Lakkaraju
    CEO & Founder, HAYAG Corp

    Hema Lakkaraju has worked in the healthcare industry for 10 years in software and IT compliance.

  • speaker photo
    Christine Wanta
    CSO & Founder, CSO4Less (a cfw1 company)

    Over 35 years of security, technology, and business leadership experience with expertise in delivering complete, effective, and strategic security solutions across a breadth of industries, including those with regulatory requirements as well as Secret/Top Secret environments. Proven expertise in DLP solutions across industries including globa...

  • speaker photo
    Brent Lassi
    CISO, Bluecore, Inc.

    Brent Lassi is currently the CISO at Bluecore, Inc. He has nearly 20 years of experience in the information security field. Brent's previous roles include CISO at Carlson Wagonlit, Director of Information Security at UnitedHealth Group, CISO and VP of Information Security at Digital River, Inc. for a decade. He also co-founded one of the worl...

  • speaker photo
    Brian Bobo
    CISO, Sun Country Airlines

    Brian Bobo is the Chief Information Security Office for Sun Country Airlines in Eagan, Minnesota. He is responsible for all aspects of the security and disaster recovery strategy, implementation, and effectiveness. Sun Country Airlines focuses on vacation destinations taking vacationers to the tropical beaches of Mexico, Costa Rica, and the...

  • speaker photo
    Anton Towne
    CISO, Minnesota State Lottery
  • speaker photo
    Adnan Dakhwe
    Head of Security & Compliance, Vera
  • speaker photo
    Sujata Ramamoorthy
    Sr. Director, Information Security, Cisco

    Sujata is a Sr. Director of Information Security at Cisco and leads the group. Sujata and her team partner across Security & Trust Organization, Supply Chain, IT and various Product teams to deliver foundational capabilities to secure Cisco’s business operations and Cloud Offers. This includes establishing security standards, partnering to bu...

  • speaker photo
    Jimmy Sanders
    VP, Information Security, Netflix DVD
  • speaker photo
    Robert Troup
    Executive Sales Manager, baramundi Software USA Inc.

    Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex netw...

  • speaker photo
    Bruce Sussman
    Director of Media & Content, Podcast Host, SecureWorld

    Emmy-winning journalist Bruce Sussman spent more than 20 years on TV screens in Portland, Oregon. During his "second career," he became fascinated by cybersecurity while working with CISOs at Gartner. He joined SecureWorld in 2017 to help grow its media division. Currently, he hosts the Remote Sessions daily web conference series and SecureWo...

  • speaker photo
    Miles Edmundson
    Business Information Security Officer, Equinti

    Miles has spent over 20 years in senior and executive leadership positions building cybersecurity programs with global and national companies across a variety of vertical markets. He has experience in risk assessments, remediation prioritization, business continuity management/disaster recovery, incident response, policy/standard development,...

  • speaker photo
    John Schiel
    Principal InfoSec Engineer, CenturyLink

    John has over 12 years of hands-on experience in network and information security and security architecture. John was the primary DDoS architect and provided direction and support to Network Operations on how to best protect CenturyLink’s network from DDoS attacks. He has decades of cross functional network and application experience and toda...

  • speaker photo
    Julie Tsai
    Information Security Leader
  • speaker photo
    Kurt Aubuchon
    Founder and Principal Consultant, Portunus Consulting

    Kurt is a computer forensics and incident response consultant and an Assistant Professor of Cybersecurity at Maryville University. He has been in the IT field for nearly 20 years, with the last 11 focused on information security.

  • speaker photo
    Lan Jenson
    CEO, Adaptable Security, Communications Director for (ISC)2
  • speaker photo
    Philip Martin
    VP of Security, Coinbase
  • speaker photo
    Charles Nwatu
    Director of Security, Stitch Fix
  • speaker photo
    Chris Sorensen
    Sr. Cybersecurity Researcher, GE Digital

    Chris Sorensen has been in the IT industry for over 30 years practicing a wide range of specialties in multiple industries. He started in the Defense industry as a system administrator and developer before progressing to the Education sector where he taught system administration and security. From there he moved into the Automotive world wher...

  • speaker photo
    Victoria Thomas
    Cybersecurity Awareness Program Leader

    Victoria L. Thomas is an award-winning senior leader with talent for designing, developing and implementing world-class, global cybersecurity awareness programs. With nearly 10 years experience, she brings a strong creative perspective to the field and provides practical solutions that not only build awareness, but also cultivate advocacy and...

  • speaker photo
    Ryan Aniol
    Deputy CISO, State of Minnesota

    Ryan Aniol is the Deputy CISO for the State of Minnesota. A cyber threat expert with over 19 years of cyber security experience, Ryan has specialized in cyber threat intelligence, threat actor profiling, incident response, penetration testing, and digital forensics spanning multiple industries. He is a recognized security researcher and thoug...

  • speaker photo
    Lothar Determann
    Partner, Baker McKenzie

    Lothar has been helping companies in Silicon Valley and around the world take products, business models, intellectual property, and contracts global for nearly 20 years. He advises on data privacy law compliance, IT commercialization, copyrights, open source licensing, electronic commerce, technology transactions, sourcing, and international ...

  • speaker photo
    Teresa Merklin
    Principal Engineer, Cybersecurity Engineering, Lockheed Martin Aeronautics Company

    Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Chr...

  • speaker photo
    CSO Council
  • speaker photo
    Tim Wittenburg
    Information Security Officer, FPX, LLC

    Tim Wittenburg is the Information Security Officer at FPX, LLC, a B2B company providing industry-leading CPQ software that improves sales force productivity by preparing complete and accurate product quotations. As ISO, Tim is responsible for the delivery of a catalog of security and compliance services based on industry leading cybersecurity...

  • speaker photo
    Co-Presenter: Joseph Szmadzinski
    CEO, IT Management Resources

    Joseph R. Szmadzinski has served as interim and permanent CIO (over 12 times) or as an advisor to the chief executive teams/ officers to troubleshoot, restructure, and manage client systems during turnaround, growth, and profit improvement efforts. Joe has served clients in a wide variety of industries, including financial services, transport...

  • speaker photo
    Milinda Rambel Stone
    VP & CISO, Provation Medical

    Milinda Rambel Stone is an executive security leader with extensive experience building and leading security programs, including Information Security Governance, Vulnerability Management, Incident Investigation & Response, Security Awareness, and Risk Management & Compliance. With significant experience in creating and managing large-scale in...

  • speaker photo
    Donald Smith
    Principle Security Architect, CenturyLink

    Donald Smith is responsible for technology leadership, proposals, and strategic direction. His contributions include DCID 6/16, NISPOM chapter 8, DNS changer working group (DCWG), Conficker WG, and numerous security BCPs and RFCs. He has been a SANS handler since 2002. He has spoken at many conferences; including NANOG 33,42,52,71; University...

  • speaker photo
    Kristin Judge
    CEO & President, Cybercrime Support Network

    Kristin founded nonprofit Cybercrime Support Network to be a voice for cybercrime victims. She’s been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology, to share best practices for online safety. Kristin was an SC Media "Women in IT Security Influencer" in 2017. ...

  • speaker photo
    Tam Nguyen
    CISSP, Cyber Threat Researcher, Federal Reserve Bank at Cleveland

    Tam Nguyen is an IEEE and ACM peer-reviewed cybersecurity researcher whose with recent publications on Software Defined Network's security (CSNet - Paris, France), and instructional design evaluation of CEH v10 Online Course (IC4E - Tokyo, JP). Tam's research interests include large-scale cyber threat modeling, cyber behavioral science, and a...

  • speaker photo
    Michael Landeck
    CISO & Executive Director, Social Interest Solutions

    Mike Landeck led the security implementation and then operationalized two of the country’s largest cloud-based healthcare IT projects. He has been responsible for the overall security of systems with financial transactions of over $4 billion per month, as well security programs regulated by HIPAA, SOX, PCI, FISMA (NIST 800-53), the IRS (FTI I...

  • speaker photo
    Peter Chestna
    Contributing Editor,

    Pete Chestna has more than 25 years of experience developing software and leading development teams, and has been granted three patents. Pete has been developing web applications since 1996, including one of the first applications to be delivered through a web interface. He led his company from Waterfall to Agile and finally to DevOps, in add...

  • speaker photo
    Ryan Mostiller
    Cyber Security Regional Manager, Faurecia

    Ryan has nearly 10 years of experience in defending large enterprise environments, specializing in Windows and Active Directory environments. Ryan has responsibility for Incident Response, Vulnerability Management, and the Management of all Security Tools and Controls. Ryan is a proud double alumnus from Oakland University as well as husband ...

  • speaker photo
    Skip Hansen
    Vice President of IT Operations, APi Group, Inc.

    Keith ‘Skip’ Hansen is the Vice President of IT Operations at APi Group Inc., a multi-billion-dollar parent company to more than 40 independently managed life safety, energy, specialty construction and infrastructure companies located in over 200 locations worldwide. Skip is responsible for aligning APi’s information technology strategy with ...

  • speaker photo
    John Bass
    Director, Global Data Risk, Duff & Phelps

    John W. Bass is a director in the Global Data Risk Practice at Duff & Phelps. John is an acknowledged thought leader on risk management, the human dimensions of cyber risk, and insider threats. John was a Central Intelligence Agency (CIA) National Clandestine Service (NCS) operational executive with 27 years in national security and internati...

  • speaker photo
    Jeremy Barnett
    SVP, Marketing and Business Development, NAS Insurance

    Jeremy Barnett is Senior Vice President of Marketing and Business Development for NAS Insurance, based in Los Angeles. Jeremy works across all NAS lines of business including Cyber, Specialty Products and Reinsurance solutions to provide brand strategy, product marketing, sales training, and producer support. Barnett is responsible for all co...

  • speaker photo
    Ernie Hayden
    Founder & Principal, 443 Consulting LLC

    Ernie Hayden is the Founder and Principal of 443 Consulting LLC. He holds a CISSP, CEH, GICSP (Gold), and PSP. Ernie's consulting experience includes work on every continent except Antarctica.

  • speaker photo
    Mark Langford
    Principal Consultant, Aberfoyle Associates

    Mark is the Founder and Principal Consultant at Aberfoyle Associates, a Plano based cybersecurity consulting firm. Mark is a Board Member of the North Texas ISSA, was recently inducted into Infragard, and is called upon periodically to speak at cybersecurity industry events. He holds a Bachelor’s Degree in Management from Clemson University a...

  • speaker photo
    Justin Berman
    CISO, Zenefits

    Justin is the CISO at Zenefits. Previously he lead security at Flatiron Health, lead security architecture at Bridgewater Associates, and built business at Aspect Security. He focuses on data and adversary driven approaches to security, and on centering security in business value.

  • speaker photo
    Steve Brown
    The Bald Futurist, Former Chief Evangelist and Futurist, Intel

    Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.

    Steve is passi...

  • speaker photo
    Judy Quinton
    Information Security Officer , CIBC Bank USA

    Judy Quinton is a driven professional and highly-skilled executive who is responsible for implementing innovative risk-based problems that address cybersecurity requirements while meeting strategic goals. Judy joined The PrivateBank, now known as CIBC Bank USA, as the Information Security Officer in 2011. Before that she worked at Xerox, HSBC...

  • speaker photo
    Torsten George
    Sr. Director, Product Marketing, Centrify

    Torsten George is a security evangelist at Centrify and frequent speaker on cybersecurity, identity and access management, and risk management strategies worldwide. He regularly provides commentary and byline articles for media outlets, covering topics such as data breaches, incident response best practices, and effective cybersecurity defens...

  • speaker photo
    Zoe Lindsey
    Customer Advocacy, Duo Security

    Zoe Lindsey is Duo Security’s Advocate Manager, where she educates and advises organizations with unique compliance challenges including the healthcare, government, and financial industries on strong security policy and best practices. She has been hooked on tech since getting her first Commodore 64 at age 10, and joined Duo with a background...

  • speaker photo
    Mikal Hass
    President, Atlanta Chapter of (ISC)2
  • speaker photo
    Fatih Orhan
    VP, Threat Labs, Comodo Cybersecurity

    With more than 15 years of experience in the technology industry, Fatih Orhan brings a great deal of expertise to his role as director of Comodo Cybersecurity’s Threat Research Lab (CTRL). Working with over 200 security analysts, Orhan and his digital intelligence team are committed to using the best combination of cybersecurity technology an...

  • speaker photo
    David Benton
    Director, The American Society of Digital Forensics & eDiscovery (ASDFED)

    In 1994, David began his investigative career as a Counterintelligence Special Agent. During his tour, he conducted numerous investigations across multiple continents. After the military, he joined the Georgia Bureau of Investigation and left as a supervisor on their computer evidence recovery team. He worked for a fortune 25 company and late...

  • speaker photo
    Richard Devera
    Security Architect, Check Point Software Technologies, Inc

    Richard Devera is the Security Architect at Check Point Software Technologies, Inc.. His background includes 20+ years of industry security experience. Richard is involved in providing best practices security strategies for all areas in networking. He is considered on of the thought leaders within the company providing strategic and technolog...

  • speaker photo
    Pierre-Olivier Fur, CISSP
    Cybersecurity Manager, Radware

    Pierre is a Cybersecurity Manager for Radware, where he brings 20 years of experience in the Information Security space. He holds a Master Degree in Computer Science and is a CISSP. Wearing various hats over the years as programmer, open source security expert, cryptography evangelist, network security architect, and CISO. Pierre is currently...

  • speaker photo
    John Shaia
    Director, Steiner Electric Company

    John has over 30 years of experience in information technology with leadership in data center operations, software development, change management, network infrastructure, security, business continuity, acquisition integration, and transforming technology teams to become business focused.

    Currently, John is a Director at Steiner Electri...

  • speaker photo
    Charles Williams
    Solutions Architect, Trend Micro

    With over 17 years in security and compliance, Charles is a technology evangelist enabling customers globally from a pre-sales and post-sales perspective to ensure proper deployment and configuration of endpoint, gateway, and datacenter security solutions.

  • speaker photo
    Kim Dale, CISSP, CISA
    IT Audit Specialist , Federal Reserve Bank of Chicago

    Kim Z. Dale is an IT Audit Specialist at the Federal Reserve Bank of Chicago. Her previous work experience includes Northwestern University, the US Government Accountability Office (GAO), US Steel, and Management Science Associates. Additionally, she is a freelance writer, speaker, and playwright. Ms. Dale earned a master’s degree in informat...

  • speaker photo
    Mary Kavaney
    Chief Operating Officer, Global Cyber Alliance

    Ms. Kavaney is the Chief Operating Officer for the Global Cyber Alliance (GCA), where she manages the daily operations of GCA, including strategy, personnel and legal responsibilities. She also engages in partnership development and outreach. Previously, Ms. Kavaney worked at the Center for Internet Security, where she developed relationships...

  • speaker photo
    Aimee Larsen Kirkpatrick
    Global Communications Officer, Global Cyber Alliance

    Aimée Larsen Kirkpatrick is the Global Communications Officer for the Global Cyber Alliance (GCA), where she is responsible for strategic communications for the international nonprofit. Prior to GCA she was President of ALK Strategies, a communication and public affairs consulting practice. Aimée was formerly with the National Cyber Security ...

  • speaker photo
    Alexandra Panaretos
    Americas Lead for Secure Culture Activation, Ernst & Young LLP

    Alexandra Panaretos is the Americas Cybersecurity Lead Secure Culture Activation at Ernst & Young LLP. With a background in sports broadcasting and operational security, she specializes in security communications and education, awareness program development, the psychology of social engineering, and behavior analytics. She has over 11 years o...

  • speaker photo
    Jeff Butler
    Founder, JButler International

    Jeff Butler is a speaker, author and passionate millennial who helps organizations improve their relationships with millennial employees. Unlike other experts on millennials, Jeff has been in the trenches of what it means to be a millennial and what it takes to retain and keep them engaged. With Jeff ‘s versatile background, he has helped for...

  • speaker photo
    Gary Johnson
    Sr. Director of Cybersecurity and IT Infrastructure, Kansas City Power & Light

    Gary Johnson is a US Army veteran who has over 30 years of IT experience. He is the Sr. Director of Cybersecurity and IT Infrastructure for Kansas City Power & Light. Prior to that he spent 10 years at Cerner Corporation helping build their IT Infrastructure for the first five years and then led their security program the last five. He has a ...

  • speaker photo
    Kenneth Geers
    Senior Fellow, Atlantic Council

    Kenneth Geers (PhD, CISSP): NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate, TSN University of Kyiv Professor, Ukraine. 20 years US Government (US Army, NSA, NCIS, NATO); FireEye Senior Global Threat Analyst. Author “Strategic Cyber Security”, Editor “Cyber War in Perspective”, Editor “...

  • speaker photo
    Tighe Burke
    Partner, Jobplex

    Tighe Burke is a Partner and Cybersecurity Practice Lead with Jobplex Inc. in Denver, securing the next-generation of leaders on behalf of technology clients around the globe. Tighe has developed powerful domain expertise executing searches for InfoSec functional roles as well as on behalf of security providers.

    He previously spent 5 ...

  • speaker photo
    Ryan Ewing
    Special Agent, FBI Kansas City Division

    Special Agent Ryan Ewing has been with the FBI for over 8 years with assignments within Cyber Task Forces in the Miami Field Office, Columbia Field Office and Kansas City Field Office. He has had investigative cases for Cyber Criminal matters as well as Cyber National Security matters. Through the FBI continuing education program, he has held...

  • speaker photo
    Steven Shalita
    Vice President, Marketing and Business Development, Pluribus Networks

    Steven Shalita has 20+ years of technology experience across the Enterprise, Cloud and Service Provider technology segments. He has market and technology expertise spanning across Cybersecurity, network security, forensics, SDN/NFV, and IT infrastructure. He has spent a considerable amount of time in the performance monitoring marker and was ...

  • speaker photo
    Celia Cortes
    President, Seva 6 Security Consulting

    Celia Cortes, is a Certified Forensic Interviewer (CFI), Licensed Private Investigator, and an Interviewer & Interrogations instructor. She has an extensive background in corporate security, investigations, security design, and personal safety. She is adept at planning, strategizing, and executing security and surveillance operations.

  • speaker photo
    Aaron Deacon
    Founder & Managing Director, KC Digital Drive

    Aaron Deacon is the founder and managing director of KC Digital Drive, a nonprofit civic organization with a mission to make Kansas City a digital leader and help cities adapt to disruptive technology change. He works with mayors, entrepreneurs and civic leaders in Kansas City and around the world to help build ecosystems that connect infrast...

  • speaker photo
    Donna Vieira
    Security Risk and Compliance Analyst, Johnson County (KS) Government

    Donna Vieira , CRISC, has been an Information Security Awareness Professional for since 1999. She is a Certified Risk and Information Systems Control (CRISC) through ISACA, which is designed for IT professional with hands-on experience with risk identification, assessment, evaluation, response and monitoring.

  • speaker photo
    Justin Daniels
    Attorney, Baker Donelson

    Justin Daniels is a thought leader in cybersecurity who believes cybersecurity must be treated by the c-suite as a strategic enterprise business risk. He provides strategic advice to companies to help them understand cyber risk and create a comprehensive approach to address it. Justin is general counsel to one of the largest enterprise data c...

  • speaker photo
    Jon Neiditz
    Partner & Cybersecurity Practice Leader, Kilpatrick Townsend

    Jon Neiditz co-leads the Cybersecurity, Privacy and Data Governance Practice at knowledge asset protection law firm Kilpatrick Townsend & Stockton LLP. Jon has been named a “Cybersecurity Trail Blazer” by the National Law Journal and a Ponemon Fellow, is listed as one of the Best Lawyers in America® both in Information Management Law and in P...

  • speaker photo
    Joseph Muniz
    Cisco, Security Architect

    Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Joseph runs thesecurityblogger website, a popular resource for security and product implementation. He is the author and contributor of sev...

  • speaker photo
    Scott Swanson
    Board Member & Sector Chief Program Leader, InfraGard Chicago Members Alliance

    Scott Swanson is a former cleared national security intelligence professional who has focused for the past decade on Business Risk Intelligence and Financial Crimes as a thought leader and practitioner. He currently works for PwC’s Financial Crimes Unit, is certified in Fraud Investigations, Mobile Forensics, Anti-Money Laundering, and focuse...

  • speaker photo
    Norman Comstock
    Managing Director, UHY Advisors TAP, Inc.

    Norman is President and Managing Director of UHY Advisors TAP, Inc., a subsidiary of UHY Advisors, bringing over 25 years of experience in strategic consulting services. Norman advises clients on enterprise risk management, IT assurance and governance, and cybersecurity. He is also an Instructor for courses in Business Ethics, and Governance,...

  • speaker photo
    Mia Boom-Ibes
    Vice President, Security Innovation, Strategy and Analytics, Allstate Insurance Company

    Mia Boom-Ibes is Vice President, Security Innovation, Strategy and Analytics, ATSV for Allstate Insurance Company. In this role, she is responsible for Allstate's cybersecurity strategy and priorities. She manages relationships with key business and technology stakeholders to ensure alignment and oversees architectural standards to enable con...

  • speaker photo
    James “Mark” Harless
    Special Agent, FBI

    SA Harless has been a Federal Law Enforcement Officer for 24 years, including 3 years as a Special Agent with The U.S. Air Force Office Of Special Investigation (AFOSI), and 21 years as a Special Agent with the FBI. SA Harless has over 11 years of leadership experience as an FBI Supervisor, and has a broad law enforcement background in matte...

  • speaker photo
    Bruno Haring, CISSP, CIPT, CRISC, CISA
    Director and Market Leader, PwC

    Bruno is a Director and Market Leader with PwC’s Cybersecurity and Privacy practice based in Atlanta, GA. With over 21 years of experience, both nationally and internationally, in cybersecurity and IT risk management and transformation. Bruno helps Fortune 500 organizations navigate and address cybersecurity, IT, and governance risks, resulti...

  • speaker photo
    Brian Morovitz
    Director of Sales Engineering, Trend Micro

    For the past 10 years, Brian has helped organizations deploy and operationalize enterprise security solutions. With a background in customer success management, he built Trend Micro’s centralized premium support center of excellence in Las Colinas, Texas. Prior to Trend Micro, Brian led product launch, organizational change, process improveme...

  • speaker photo
    Moderator: Pamela Nigro
    Senior Director GRC, Blue Cross Blue Shield of IL

    Pamela Nigro, MBA, CRMA, CISA, CGEIT, CRISC, is a multifaceted, highly experienced IT Audit and IT Controls leader who brings unique experience with experience with external Big 4 auditing, and cost-effective management of corporate risk and regulatory compliance with the 4th largest health insurance company. Ms. Nigro is a subject matter ex...

  • speaker photo
    Moderator: Alisha Wenc
    Corporate Programs Manager, ISACA

    Alisha Wenc is the manager of corporate programs at ISACA. In her first year with ISACA, she launched the SheLeadsTech program, which has engaged over 1,000 members in its first 6 months. SheLeadsTech aims to increase the representation of women in technology leadership roles and the tech workforce. Alisha’s previous experience includes ex...

  • speaker photo
    Diana Salazar
    CISO, College of American Pathologists (CAP)

    My experience consulting with organizations, corporate and non-profit, navigate the new digital frontier advising on cyber security issues and building technology strategies that drive performance and business value. I have led and managed implementations for organizations in a wide variety of industries, Global 2000, Fortune 1000, small and ...

  • speaker photo
    Brenda Callaway
    Security Management and Risk Divisional Vice President, Blue Cross Blue Shield of Illinois
  • speaker photo
    Ted Claypoole
    Partner, Womble Bond Dickinson

    Lawyer, business adviser, lawfirm team lead for cybersecurity/privacy, licensing and FinTech, chair of American Bar Association, Business Cyberspace Law Committee, former in-house counsel for Bank of America and Compuserve, co-author of books Privacy in the Age of Big Data, and Protecting Your Internet Identity.

  • speaker photo
    Tauseef Ghazi
    Principal, RSM US LLP

    Ghazi currently serves as a principal in RSM’s security, privacy, and risk practice with more than 15 years of infrastructure security, system implementation and application security review experience. He leads RSM’s security, privacy and risk practice for the Central Region and leads RSM’s critical infrastructure practice nationally. In his ...

  • speaker photo
    Christopher Kar
    InfoSec Advisor, Fort Bend ISD

    Mr. Kar is the Information Security Advisor for Fort Bend ISD, the 7th largest school district in TX with ~74,500 students, ~11,000 employees and contractors spanning 80+ educational and administrative campuses. Chris has previously held leadership roles at both public and private sector organizations including Memorial Hermann, the U.S. Hous...

  • speaker photo
    Roy Wilkinson
    Principal, CISO/CIO Services, Rausch Advisory

    Roy Wilkinson, PhD, CISSP, CPCS, CHS-V, HISP, is a former CSO & CISO with 30+ years in Information Security and 25+ years in physical security. He is currently Principal for a virtual CIO/CISO practice with an executive advisory firm and was recently elected as Vice President of ISSA International. Dr. Wilkinson is a recognized security leade...

  • speaker photo
    Rene Kolga
    Sr. Director of Product Management, Nyotron

    Rene Kolga, CISSP, heads Product Management and Business Development for North America at Nyotron. Prior to working at Nyotron, Rene was Head of Product at ThinAir. Rene also spent eight years at Symantec where he managed multiple enterprise security product lines in the areas of encryption and endpoint security. Additionally, Rene led dozens...

  • speaker photo
    Rebecca Finnin
    Director, Technology Security, AT&T

    Rebecca Finnin is a Director in the Chief Security Office at AT&T. During her time at AT&T, Rebecca has overseen large-scale development projects to meet compliance requirements. She was also responsible for automation of vulnerability assessments on infrastructure elements across AT&T internal and customer-serving networks. Her current role ...

  • speaker photo
    Lynn Goodendorf
    Director, Information Security / CISO, Mandarin Oriental Hotel Group

    Lynn Goodendorf is the Director of Information Security for the Mandarin Oriental Hotel Group with a global scope of responsibility for the information security program at all hotels and corporate offices. She is known for a strategic and risk-based approach with over 25 years of leadership in technology, cybersecurity, data privacy and risk ...

  • speaker photo
    Paul Brager
    Technical Product Security Leader, Digital Technology, BHGE (Baker Hughes, a GE Company)

    Paul W. Brager, Jr has been a contributing member of the cyber security community for over twenty-three (23) years, with expert level knowledge of security architecture and defense-in-depth design, critical infrastructure/industrial cyber, IoT, and IIoT. He has extensive cyber experience in the oil and gas, manufacturing, power utility, chemi...

  • speaker photo
    Brian Engle
    CEO, Riskceptional Strategies

    Brian A. Engle, CISSP, CISA Founder and CEO Riskceptional Strategies Brian Engle is an experienced security and risk management professional who works with business leaders to create and implement successful strategies for implementing sustainable risk-based information security programs. Prior to founding Riskceptional, Brian led the Retail ...

  • speaker photo
    James Waters
    Global CISO, Black & Veatch

    Currently the Global CISO for Black & Veatch and responsible for the security of all things digital/cyber within the enterprise. Previously the Chief IT Strategist and Security Director for HNTB, and prior to that as Senior IT Architect for the Federal Reserve.

  • speaker photo
    Daniel Reither
    Manager, Information Security, Health Partners Plans
  • speaker photo
    David Ruess
    Information Security & Incident Response Team Lead, Wawa Inc.
  • speaker photo
    Louise O’Donnell
    Sr. Information Technology Manager, TD Ameritrade
  • speaker photo
    Pete Lindstrom
    VP of Security Strategies, IDC

    Pete Lindstrom is VP of Security Strategies for IDC, where he conducts research on digital trust, risk measurement and cybersecurity economics in the age of digital transformation. Pete has spent over 25 years as a security professional and is known for his practical approaches to addressing security challenges. He is a U.S. Marine veteran an...

  • speaker photo
    Blake Collins
    Director of Clinical Engineering, Christiana Health Care System

    Blake Collins has been in the Health Technology field for over 27 years and the health care industry for over 34 years. He retired from the United States Navy after 21 years in 2004. He received his basic and advanced BMET training in Aurora, Co. at the United States Army Medical Equipment and Optical School. After retirement, he became a Reg...

  • speaker photo
    Chris Thielet
    Account Executive, Wombat Security

    Chris has over 15 years' experience in training program development. For over two years at Wombat he has worked with security professionals in over 22 countries to plan, develop, and implement successful cybersecurity education programs. These programs have focused on phishing simulations, training methodologies, and engaging end users to red...

  • speaker photo
    Sonia Arista
    Principal, Healthcare Strategy: Governance, Risk and Compliance, GuidePoint Security

    Sonia E. Arista is a seasoned Information Security and Technology specialist with over 20 years' experience. As a management consultant with Dell Services and Perot Systems she has worked internationally in the financial, healthcare, telecommunications and manufacturing verticals. She has also served as a senior information technology directo...

  • speaker photo
    Michael Podemski
    Senior Manager in the Risk Advisory Services Practice, Ernst & Young LLP

    Michael Podemski, CISA, CISM, CRISC, CIPM, CIPT, is a Senior Manager in the Risk Advisory Services practice of Ernst & Young LLP. He focuses on managing and delivering high-quality IT assurance and advisory engagements, including financial statement audits/internal controls over financial reporting (SOX 404), pre- and post-implementation syst...

  • speaker photo
    Frank Downs
    Director, Cyber Information Security Practices at ISACA and DoD Instructor

    Downs, an 11-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity were two very different concepts, Frank pro...

  • speaker photo
    Arlene Yetnikoff
    Director of Information Security, DePaul University

    Arlene Yetnikoff is the Director of Information Security for DePaul University, which offers numerous degrees in Computer Science, including Masters and Bachelor's in Information Security fields. Arlene has worked in Information Security for many years as a consultant, educator and hands-on practitioner. Today, Arlene leads DePaul's Informati...

  • speaker photo
    Thomas Hart
    CISO, Cyber Guide LLC

    Thomas F Hart - Tom has been in the IT field since 1978(EDP), starting as a programmer trainee (Assembler and COBOL). First computer worked on was an IBM360 system (PCs were a long way off). He has been a Programmer, Systems Analyst, Operating Systems Programmer, Network Systems Programmer, DR / BCS Specialist, IT Auditor, GRC, Sr. Security A...

  • speaker photo
    Nicholas Davis
    Technical Product Manager, Rapid7

    Nick Davis began his career at Rapid7 in 2013 as a Software Engineer building InsightIDR. In this role, he was focused on building key detections and establishing scalability across the platform to keep up with a growing user base. Now, as the Technical Product Manager for InsightIDR, Nick works closely with engineering, SOC Analysts, and cus...

  • speaker photo
    Nuno Sousa
    Strategic Engineering Manager, Check Point Software Technologies, Inc.

    Nuno is the Check Point Strategic Engineering Manager in the Northeast. 10+ years of experience in the cybersecurity industry. He has held various positions in the vendor, system integrator and private sector including Security Engineer, Security Architect, Security Consultant and now managing Check Point SE’s responsible for Check Point’s la...

  • speaker photo
    Mark Aiello
    Board Member , (ISC)2

    Having more than 30 years of IT and cybersecurity consulting/staffing experience, Mark joined Signature Consultants, one of the largest IT Staffing Firms in the U.S., to lead, build and cultivate the cybersecurity talent and workforce throughout the organization’s 26 locations, serving 100s of clients throughout North America. Former Presiden...

  • speaker photo
    Chris DeMale, CFA
    Strategic Account Executive, ISACA

    Chris DeMale, CFA is a Strategic Account Executive for ISACA, where he serves enterprises across the globe on ISACA’s full suite of assessment, training, and cybersecurity products, and as a dedicated technical resource with expertise in the financial services sector. Before joining ISACA, Mr. DeMale served as Senior Vice President at Blueroc...

  • speaker photo
    Moderator: Yaron Levi
    CISO, Blue Cross and Blue Shield of Kansas City

    Yaron Levi is the CISO for Blue Cross and Blue Shield of Kansas City, where he oversees both cyber and physical security.

  • speaker photo
    Cindi Carter
    Vice President, Chief Security Officer, MedeAnalytics

    As Vice President, Chief Security Officer (CSO) at MedeAnalytics, Cindi oversees global enterprise security. Her mission encompasses creating a culture that places high value on securing and protecting MedeAnalytics and the clients’ information entrusted to them. Cindi has built and matured both cyber and physical security practices at The Un...

  • speaker photo
    Sara Flores
    CISO, UMB Bank

    Sara serves as Senior Vice President and Chief Information Security Officer for UMB Financial Corporation (UMB), overseeing UMB’s information security and privacy programs. A 15+ year veteran in information technology and information security, Sara has worked with a wide range of financial services firms to enhance their security posture. Her...

  • speaker photo
    Lewie Dunsworth
    CISO, H&R Block
  • speaker photo
    Akshay Finney
    Associate, Meditology Services

    Akshay Finney is an IT Risk Management Associate who specializes in Security risk assessments and Medical Device Security. As an Associate, he works closely with the Risk Management Team to assess and identify the client’s risks, and guide them in mitigating the identified risks. He also specializes in security and network operations to provi...

  • speaker photo
    Tyrone Jeffress
    Director of IT Risk Management, Meditology Services

    Tyrone is an experienced consultant who has over 12 years’ experience advising covered entity and business associate clients on cybersecurity, privacy and compliance matters. His expertise includes HIPAA security risk assessments, HITRUST certification, SOC 2 certification, security governance and strategic planning, vendor risk management an...

  • speaker photo
    Bob Bennett
    Chief Innovation Officer, City of Kansas City, MO

    Bob Bennett became the Chief Innovation Officer for the City of Kansas City, Missouri, in January 2016 after a 25-year career in the US Army. He leads the Smart City initiatives, a suite of projects including: data analysis, Public Wi-Fi, digital kiosk installation, and smart lighting programs in the city’s downtown core. Kansas City’s initia...

  • speaker photo
    Diane Glick
    Investigative Auditor, State of Texas

    30+ years experience in auditing and investigating white-collar crimes. Currently employed by Texas Office of Attorney General Medicaid Fraud Control Unit. Assisted Harris County DA in successfully prosecuting a case of cash theft of $150,000. Hold ACFE, CIA, and CGFM certifications. Past President of Houston Chapter, ACFE. Business Administr...

  • speaker photo
    Josh Sokol
    Information Security Program Owner, National Instruments

    Josh Sokol, CISSP, graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies, including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as the Information Security Program Owner at National Instruments. In his cur...

  • speaker photo
    Robert McKosky
    Asst. Professor, Drexel University

    Dr. Robert McKosky served as the Director of Information Security at MBNA America and was the Technical Program Director for the Network Infrastructure Laboratory at GTE. He has organized and participated in various simulated attacks (Tiger Teams) to identify weaknesses in security systems. Mac has consulted to the CTIA, NSA, Secret Service, ...

  • speaker photo
    Stephen Jones
    Vice President Managed Services, GuidePoint Security

    Stephen is the Vice President of Managed Services at GuidePoint Security and began his career in Information Security, Information Technology Management, Vulnerability Management, and Security Operations Center (SOC) operations. Before joining GuidePoint Security, Stephen worked for ManTech International at a large federal agency managing SOC...

  • speaker photo
    Matthew Gardiner
    Principal Security Strategist, Mimecast

    Matthew Gardiner is a Director of Security at Mimecast and is currently focused on email & web security, phishing, awareness training, malware, and cloud security. With more than 15 years focused in security, Matthew’s expertise in various roles includes threat detection & response, network monitoring, SIEM, endpoint threat detection, threat ...

  • speaker photo
    Katie Stebbins
    Vice President for Economic Development, University of Massachusetts President's Office

    Katie Stebbins is the Vice President for Economic Development at the University of Massachusetts. She serves as a liaison to the business community, establishing and growing research and workforce development partnerships to benefit the university and the Commonwealth of Massachusetts. Representing UMass, the state’s second-largest employer a...

  • speaker photo
    Edward Moses
    Associate Executive Director, Kennesaw State University

    Edward Moses, MS MBA CISSP CISA GSNA GCIH GPEN PCIP is the Associate Executive Director of Cybersecurity for Kennesaw State University.

  • speaker photo
    Britney Hommertzheim
    Director, Information Security, AMC Theatres

    Britney began the first decade of her security career in the US Army where she managed over 90 teams and traveled internationally to assess the security of international government partners. She now oversees the Information Security Department for AMC Theatres. She is responsible for the development and implementation of the global strategy, ...

  • speaker photo
    Ravi Thatavarthy
    VP & CISO, BJ's Wholesale Club

    Ravi Thatavarthy brings 20+ years of experience in Information Security to his role with a strong background in Security Architecture and building Security programs from ground up. His approach to Information Security is unique and well-balanced with a focus on ‘Business Value’ and ‘User Delight’. He recently appeared in ‘Profiles in Confiden...

  • speaker photo
    Rex Johnson
    Director of Cybersecurity, BKD CPAs & Advisors

    Rex is a strategic and technical leader with more than 25 years of experience in security and privacy, enterprise risk management, security management and operations, IT governance, application development, internal and external audit, regulatory compliance, and controls assurance. He has served as the lead executive with responsibility for p...

  • speaker photo
    Steven "Doc" Simon, PhD
    Professor, IT / Captain, US Navy (Ret), Mercer University

    Steven “Doc” Simon was commissioned in the Navy in October 1989. He served his first tour aboard the USS BLAKELY (FF-1072), homeported in Charleston, SC earning his Surface Warfare Qualification. Upon de-commissioning of the Blakely he cross-decked to the USS SAMUEL ELLIOT MORRISON (FFG-13) before being assigned to Naval Construction Force, ...

  • speaker photo
    Yaron Levi
    CISO, Blue Cross and Blue Shield of Kansas City

    Yaron Levi is the CISO for Blue Cross and Blue Shield of Kansas City (Blue KC), Prior to joining Blue KC, Yaron was a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ANX. Yaron is a...

  • speaker photo
    Jim Benanti
    Sr. Partner, Consulting Engineer, Arbor Networks

    Jim comes to Arbor with over 20 years in the security field as a Pre-Sales Engineer, Sales Representative, Competitive Analyst, and Solutions Consultant. He has been with Arbor for the past six years, where he currently is a Sr. Partner Consulting Engineer.
    Jim received his Bachelor’s degree from Clarion University of Pennsylvania and h...

  • speaker photo
    Nir Valtman
    Head of Application Security, NCR Corporation

    Nir Valtman heads the application security of the software solutions for NCR Corporation. Before the acquisition of Retalix by NCR, Nir lead the security of the R&D in the company. As part of his previous positions, he was working in several application security, penetration testing and systems infrastructure security positions. Nir is a freq...

  • speaker photo
    Amy Baker
    VP of Marketing, Wombat Security Technologies

    Amy Baker, Vice President of Marketing at Wombat Security Technologies, has been in the information technology and security industry for almost 20 years and has been specifically focused on info security awareness and training for the last several years. Amy led the development of Wombat’s Best Practices Methodology for Security Education pro...

  • speaker photo
    John Kveragas
    Owner, TJM Professional Services, LLC

    John E. Kveragas, Jr., CPA, CISA, is a seasoned Internal Audit Executive with over 20 years’ experience in IT, operational, financial, and compliance auditing in multiple industries. John has extensive expertise with building effective internal audit functions, training and development, and managing regulatory exams with positive outcomes for...

  • speaker photo
    Michael Hoehl
    Security Leader, Independent Consultant

    Security Leader with experience in Health, Manufacturing, Financial Services, and Retail Industries.

  • speaker photo
    Frank Duff
    Cybersecurity Engineer, MITRE

    Frank Duff is a principal cyber operations engineer at MITRE. His work has focused in endpoint security and cyber deception. He is the current principle investigator of the Leveraging External Transformational Solutions research and development effort that seeks to assist the integration of innovative commercial cybersecurity solutions into o...

  • speaker photo
    Devon Bryan
    Executive Vice President and System CISO, Federal Reserve System

    Devon Bryan is Executive Vice President and Chief Information Security Officer (CISO) for the Federal Reserve System. As CISO, Devon oversees information security, including incident response, for the enterprise, ensuring information security architecture, standards, policies, and programs remain effective and efficient. Devon was appointed S...

  • speaker photo
    Tim Hill
    Director, Product Management & Strategy, Centrify Corp

    Tim Hill joined Centrify in the fall of 2017 as the Director of Product Management & Strategy, he is a US Air Force Veteran who post military joined Amp Inc./TE Connectivity Inc. through the embattled years as part of Tyco International Inc., as their Information Security Manager, and M&A team member, later at PHEAA as the VP of Enterprise Se...

  • speaker photo
    Vana Khurana
    Cloud Security Architect, The Vanguard Group

    Vana Khurana, Cloud Security Architect, The Vanguard Group, CISSP, AWS Certified Architect (A), CCSP, CCSK, GSEC and TOGAF certified. Director of Training and Board Member of Cloud Security Alliance Delaware Valley Chapter. Also, an Adjunct Faculty at Temple University, Philadelphia.

  • speaker photo
    Penny Chase
    Sr. Principal Scientist, MITRE

    Penny Chase is in the Cybersecurity Solutions and Information Technology Technical Centers at The MITRE Corporation. She leads MITRE’s support to FDA on medical device cybersecurity and preparedness and response, and is developing a Common Vulnerability Scoring System rubric tailored to medical devices.

  • speaker photo
    Margie Zuk
    Sr. Principal Cybersecurity Engineer, MITRE

    Margie Zuk is in the Cybersecurity Solutions and Information Technology Technical Centers at The MITRE Corporation. She leads MITRE’s support to FDA on medical device cybersecurity and preparedness and response and is developing a Common Vulnerability Scoring System rubric tailored to medical devices. Margie has a Bachelor of Arts in Mathemat...

  • speaker photo
    Happy Hour
  • speaker photo
    Michael Thelander
    Sr. Director, Product Marketing, iovation Inc.

    Michael has a 20-year history in product marketing and product management, with a focus over the last seven years on cybersecurity. He held senior product marketing and product management roles at security leader Tripwire, and has other career highlights that include co-founding a successful startup and receiving patents for network technolog...

  • speaker photo
    Tom Plummer
    Cybersecurity Fellow, Lockheed Martin

    Cybersecurity Fellow to provide architecture guidance across products and programs. BS Computer Engineering. CISSP.

  • speaker photo
    Katie Greer
    CEO, KL Greer Consulting, Featured on: CNN, The O'Reilly Factor, Inside Edition, The Huffington Post, TIME Magazine, USA Today and more

    Previously of the Massachusetts Attorney General's Office and MA State Police, Katie Greer travels the country presenting to hundreds of thousands of law enforcement, communities, school staff/administration and students on the trends, safety and best digital safety/social media practices. Katie serves as a media industry expert, and has been...

  • speaker photo
    Brian Harrell
    Assistant Director, Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency (CISA), DHS

    Brian Harrell was appointed by the President of the United States in December 2018 to serve as the Department of Homeland Security’s Assistant Secretary for Infrastructure Protection. Brian now serves as the first Assistant Director for Infrastructure Security within the newly renamed U.S. Cybersecurity and Infrastructure Security Agency (CIS...

  • speaker photo
    Brian Shield
    CIO, Boston Red Sox

    Brian is responsible for the strategic direction of technology and day-to-day IT operations in support of the Boston Red Sox, their fans, and Fenway Sports Management.

  • speaker photo
    Joanne Kossuth
    CIO, Mitchell College

    Currently Joanne acts as the Chief Information Officer for Mitchell College with responsibility for academic, administrative, and enterprise computing and library information services. Joanne also serves as principal in her consulting services company, 1MountainRoad, which specializes in strategic business process re-engineering; aspirant and...

  • speaker photo
    Ben Levitan
    CEO, Cedalion Partners

    Ben Levitan serves as CEO of Cedalion Partners, a Management Advisory firm to Investors, Boards, and CEOs. Ben serves as Board Director of OGSystems, a GEOINT solutions company, and Bricata, a cybersecurity company. Ben has more than 25 years of leadership experience, having served as CEO or COO of five companies—in venture, growth equity, an...

  • speaker photo
    Vincent Campitelli
    Regional Partner with Coopers & Lybrand (now PWC), Former IT Risk Manager, Goldman Sachs, Wells Fargo, and McKesson

    Vince has extensive experience in the converged fields of information technology and risk management. As a Regional Partner with Coopers & Lybrand (now PWC) he was a member of a small team of partners who led the adaptation of technology into the traditional fields of accounting and auditing. Post public accounting, he applied his mastery of ...

  • speaker photo
    Alejandro Languren
    Information Security Officer, DLL Group

    Alejandro is a cybersecurity professional, experienced in Information Security, IT Infrastructure, and Software Development areas—with working experience in multinational organizations covering positions in the United States and Latin America. Currently working in a world class financial organization, with continuous collaboration with divers...