- Joseph CarsonChief Security Scientist & Advisory CISO, Thycotic
Joseph Carson has more than 25 years of experience in enterprise security. He is an ethical hacker, an InfoSec award winner, and author of "Privileged Account Management for Dummies" and "Least Privilege Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s a cybersecurit...
- Piyali DasSr. Director, Information Security Risk Management, The College Board
Piyali Das has a proven 16-year track record of leading Information Security and Information Technology enterprise-wide initiatives. This includes success in risk-based prioritization of security initiatives and the resolution of complex issues cost effectively. She has also directed complex cross-functional projects across the enterprise res...
- Brian CoulsonPrincipal Threat Research Engineer, LogRhythm
As Principal Threat Research Engineer in LogRhythm Labs, Brian works to keep abreast of current cyberthreats and news, develop threat detection and response content, and demonstrate how we detect and respond to threats. In this role, he regularly engages with the LogRhythm Community and offers advice and solutions to remediate common security...
- Sajed NaseemCISO, New Jersey Courts
Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters...
- Erich KronSecurity Awareness Advocate, KnowBe4
Erich Kron is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical i...
- Mike StacyGlobal Director, Cloud and Information Protection, Proofpoint
Mike Stacy is the Global Cloud and Information Protection Director at Proofpoint. Mike works with customers and oversees technical strategy for areas which include cloud security, advanced email defense, SOAR, browsing security, and SDP. Prior to joining Proofpoint, Mike held numerous technical leadership and product strategy roles across a v...
- Chris PoulinDirector, Technology & Strategy / Deputy CTO, BitSight
Chris is Director of Technology & Strategy, as well as the Deputy CTO, at BitSight Technologies, guiding enterprises in assessing risk metrics and managing third-party relationships. He's been in cybersecurity for over 35 years, in both technical roles as a developer for the DoD intelligence community, and in executive positions, such as CSO ...
- Terry RaySVP, Strategy and Imperva Fellow, Imperva
Terry Ray is the SVP and Imperva Fellow for Imperva Inc. As a technology fellow, Terry supports all of Imperva’s business functions with his years of industry experience and expertise. Previously he served as Chief Technology Officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well ...
- Sudeep VenkateshChief Product Officer, Egress Software Technologies Ltd
Sudeep Venkatesh is a noted expert on data protection, bringing two decades of industry and technology experience in this area. His expertise spans the protection of data in both structured and unstructured data ecosystems, with an emphasis on solving real-world business problems through encryption, authentication and key management. He has a...
- Jayson SalazarSr. Security Automation Engineer, GitLab Inc.
Former software engineer and penetration tester, nowadays Sr. Security Automation Engineer at GitLab.
- George J. SmithSr. Security Consultant, Gigamon
George has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down ...
- Meera RaoSr. Director, Product Management, Synopsys
Ms. Meera Rao is a Senior Director of Product Management, focusing on DevOps solutions at Synopsys, Inc. Ms. Meera has over 20 years of experience in software development organizations in a variety of roles including Architect, Lead Developer, and Project Manager, and Security Architect. Ms. Meera has been working as a trusted adviser to Fort...
- Morgan WrightChief Security Advisor, SentinelOne
Morgan is an internationally recognized expert on cybersecurity strategy and cyberterrorism. As Chief Security Advisor for SentinelOne, Morgan brings his experience as a seasoned moderator, technology analyst, and former law enforcement advisor. Morgan is a Senior Fellow at The Center for Digital Government, and the chief technology analyst f...
- Belinda Enoma, CIPP/USFounder, Activate & Implement LLC
Belinda Enoma is a privacy and cybersecurity consultant with a legal and technology background. She offers virtual privacy and cybersecurity services including risk mitigation solutions and building privacy programs from scratch. She is a writer, corporate trainer, lifestyle strategist, mentor, and coach to women in the cybersecurity and data...
- Roger GrimesData-Driven Defense Evangelist, KnowBe4
Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bach...
- Nimmy ReichenbergCMO, Siemplify
Nimmy Reichenberg oversees strategy and marketing for Siemplify, the leading independent provider of Security Orchestration, Automation, and Response (SOAR). A cybersecurity industry veteran, Nimmy has more than 15 years of experience helping enterprises around the world tackle their security challenges. Nimmy started his careers as a securit...
- Riley BruceSecurity Community Evangelist, Manager, Code42
Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with...
- Justin WynnSr. Security Consultant, Coalfire
As a Senior Security Consultant, Justin Wynn is responsible for actively compromising and reporting on virtual environments typically encountered at Fortune 500 companies. Justin performs wireless, physical, red team and social engineering engagements. Justin also conducts research to include the production of open-source models for printing/...
- Gary DeMercurioDirecting, Center of Excellence for Red Team, Social Engineering, and Physical Penetration Testing, Coalfire
Gary DeMercurio runs one of the largest groups in Coalfire Labs as a Director, where he leads Coalfire’s “Center of Excellence” for Red Teaming, Social Engineering and Physical Penetration. At Coalfire, Gary manages day-to-day business involved with FedRAMP, PCI, HIPPA, and penetration testing, while helping to spearhead the physical and soci...
- Amber VanderburgFounder, The Pathwayz Group
Amber Vanderburg is a multi award winning international businessperson, keynote speaker, and founder of The Pathwayz Group. In 2016, she left her job in corporate HR to become the only female, only American, and only blonde Academy elite football coach for the Adidas Gameday Academy/Paris Saint Germain Academy in Bangalore, India. She worked ...
- Brian VecciField CTO, Varonis
As Field CTO at Varonis, Brian supports a wide range of security and technology initiatives by helping Varonis’ customers and partner get the most out of the company’s products. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecuri...
- Dave PresuhnSr. Security Engineer, Boston Scientific
Dave has been working in IT since the last millennium. In his current role, he manages the device management system for medical devices. He has worked primarily in healthcare throughout his IT career.
- Brian AndersonDirector of Technology, Office of the CTO, Imperva
Brian Anderson has over 16 years' experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactiona...
- VJ ViswanathanPartner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory & strategic consulting firm delivering solutions to public and private sectors. He also serves as...
- Mark SangsterVice President and Industry Security Strategist, eSentire
Mark Sangster is the author of "NO SAFE HARBOR: The Inside Truth About Cybercrime and How to Protect Your Business." He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference, and author on various subjects related to cybersecurity. His thought provoking work and per...
- Jason GeorgiGlobal Field CTO, Prisma Access, Palo Alto Networks
Jason is an accomplished technology executive with over 25 years of experience driving innovation and transformation initiatives across global organizations. Jason collaborates with CIOs, CTOs, and other technology leaders on strategies aimed at enabling business outcomes.
Jason is currently the Global Field Chief Technology Officer fo...
- Eric BodkinDirector, Endpoint Recovery Services, CrowdStrike
Eric Bodkin leads the delivery of Endpoint Recovery Services for CrowdStrike. Based out of the greater Denver area, Eric leads service engagements focused on the rapid recovery and remediation of endpoints in response to a cyber incident. Eric has more than 15 years of experience in incident response, forensic investigation, cybersecurity ope...
- Jonathan EchavarriaEnterprise Architect, ReliaQuest
Jonathan Echavarria is an Enterprise Architect at ReliaQuest that has spent his career building and breaking a variety of environments. In his current role, Echavarria leverages this experience to orchestrate business strategy alignment with technological enablement. During his time at ReliaQuest, Jonathan has held various positions with resp...
- Chris PittmanSenior Manager, Sales Engineering, BlackBerry
Chris Pittman has worked in enterprise information technology since 1993 and has specialized in cyber security for the last 14 years. He worked in security and controls and incident response for the Ford Motor Company before moving to the security vendor space in 2008. As a sales engineer at BlackBerry Cylance, he provides technical and secur...
- Rori PerkinsProgram Manager, InfoSec Awareness and Analytics, Columbia Sportswear
Rori is an expert in organizational change management with a focus on security awareness and driving human behavior.
- Brennan O'BrienDirector, Information Security, Risk & Compliance, Columbia Sportswear
Brennan is the head of Information Security for Columbia Sportswear Company and a 20-year veteran of cybersecurity in verticals including apparel, logistics, healthcare, and financial services.
- Paul RichExecutive Director, Data Management & Protection, JPMorgan Chase
Paul Rich joined JPMorgan Chase & Co. in 2019 as Executive Director, Data Management & Protection, with the mission of tackling the management of all unstructured data within the company. Paul is passionate about data security, privacy, principle-based design and goal-setting, and has over thirty years of technology experience. During the mor...
- Mike DeNapoliSenior Solution Architect, Cymulate
Mike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners k...
- Nigel ThompsonVice President, Solutions Marketing, BlackBerry
Nigel Thompson is responsible for the product position and messaging of BlackBerry® Spark. He is a regular thought leadership speaker, experienced on topics impacting governments and businesses worldwide, including cybersecurity trends, workflow reformation and harnessing IoT to accelerate digital transformation.
As BlackBerry has tr...
- Jeremiah SahlbergManaging Director - Federal, Third Party Risk, Tevora
Jeremiah Sahlberg has more than 20 years of security experience. Sahlberg is an executive security consultant and advises clients on establishing security programs and compliance management. He holds CISSP, CISM, PCI QSA and HITRUST certifications.
Previously, Sahlberg held the Senior Director of Protect Operations at NBCUniversal a...
- David HawkinsDirector, Consulting Engineer, BitSight
David Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.
On the Info...
- Brian RobisonChief Evangelist & Sr. Director, Product Marketing, BlackBerry
Brian Robison is the Senior Director, Product Marketing and Chief Evangelist at BlackBerry (formerly Cylance), where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after an attack. With over 20 years' of cybersecurity experience, Robison is a regular sp...
- Kevin BocekVP, Security Strategy & Threat Intelligence, Venafi
Kevin Bocek is a leading subject matter expert in machine identity protection. With more than 16 years in the IT security industry, Kevin has been featured in The Wall Street Journal, The New York Times and The Washington Post, among many others. Before joining Venafi in 2012, Kevin spent almost two decades working for several leading IT secu...
- Katrina WattsCyber Security Threat Analyst, Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC)
Katrina Watts works as a Threat Analyst with the ONG-ISAC and focuses on curating and sharing qualitative intelligence related to cyber threats to the oil and natural gas supply chain. Prior to joining the ONG-ISAC, Katrina worked as an Incident Response Analyst for a mid-size corporation and separately as a contractor. Additionally, Katrina ...
- Travis HerrmannInformation Security Advisor, Devon Energy Corporation
Travis has been with Devon Energy for 20 years, being a pioneering member of the Information Security team. Currently, Travis supports the Incident Response, Hunt, and Intelligence functions at Devon, serves on the ONG-ISAC Information Sharing committee, and holds multiple industry security certifications.
- Dr. Shaneé DawkinsComputer Scientist, Visualization and Usability Group, National Institute of Standards and Technology (NIST)
Dr. Shaneé Dawkins is a Computer Scientist in the Visualization and Usability Group at the National Institute of Standards and Technology (NIST). She performs research focusing on human centered design and leads the NIST Phish Scale research effort. Shaneé received her M.S. and Ph.D. in Computer Science at Auburn University, and B.S. in Compu...
- Ansh PatnaikHead of Product Marketing, Google Cloud Security
Ansh Patnaik, former Chief Product Officer for Chronicle, is now the head of product marketing for Google Cloud Security. Previously, he was VP of Product Management at Oracle where he defined and launched their Security Analytics Cloud service. Over the last 20 years, Ansh has held product management, marketing and sales engineering roles at...
- Adam GatesSr. Sales Engineer, Malwarebytes
With over 20 years of experience in technology, Adam Gates serves as a senior technical member of Malwarebytes Field Sales Team providing support for customers in North America. Prior to Malwarebytes, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, and Mimecast. Adam lives in Dalla...
- Myriah V. Jaworski, Esq.Privacy Litigation Practice Group, Beckage Law
Myriah leads Beckage’s Privacy Litigation Practice Group where she represents clients in data breach actions, technology vendor disputes, and the defense of consumer class actions and related regulatory investigations. Recognized as a Super Lawyers Rising Star – Litigation om 2019 and 2020, Myriah practices in many jurisdictions throughout th...
- Stuart WagnerSr. Director, IT Security & Compliance at Enterprise Products, Chairman, ONG-ISAC
Stuart served as a Board Member of ONG-ISAC for over five years and became Chairman in June 2018. He has attended the FBI CISO Academy, has served as President of the award-winning South Texas Chapter of the Information Systems Security Association (ISSA), and is a member of ISACA and InfraGard. Stuart has developed and led information securi...
- Angela HaunExecutive Director, ONG-ISAC
Angela Haun became the Executive Director of the Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC) in September 2018. Ms. Haun joined the ISAC after a 20-year career as a Special Agent with the FBI. She brought extensive experience in cybersecurity and protecting critical assets from her work at the FBI, along with her le...
- Brad BeutlichVice President, Western and LATAM Sales, Entrust
Brad Beutlich is an information security professional who has worked with numerous U.S. based companies over the past 20 years, providing security solutions ranging from end-point to data security. The last 13 years, he has worked for Entrust providing security solutions that protect customer data, financial transactions, and IoT device manuf...
- Sivan TehilaDirector of Solution Architecture, Perimeter 81
Sivan Tehila is the Director of Solution Architecture at Perimeter 81, a leading Secure Access Service Edge (SASE) provider, and a cybersecurity expert with over 14 years of industry experience. Sivan served in the IDF as an Intelligence Officer and then in various field positions, including Information Security Officer, CISO of the Research ...
- Julia VooCyber Fellow, Harvard Kennedy School, Belfer Center for Science and International Affairs
Julia Voo is a Cyber Fellow and leads the team behind Belfer's National Cyber Power Index. She was formerly the Research Director for the China Cyber Policy Initiative.
Her areas of research concern geotech strategy including the Digital Silk Road, industrial policy, and technical standards for strategic technologies.
Voo has re...
- Tony AnscombeChief Security Evangelist, ESET
Tony Anscombe is Global Security Evangelist and Industry Partnerships Ambassador for EST, where he serves to increase ESET’s public awareness initiatives and strengthen relationships with new and existing partners.
Anscombe joined ESET from Avast (which acquired his former employer AVG) where he held the title of Senior Security Evange...
- Tom UtleySr. Presales Systems Engineer, Arctic Wolf
Tom Utley is a senior presales systems engineer with Arctic Wolf Networks based out of the Charlotte area. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer and solution archite...
- Allan LiskaSr. Security Architect, Recorded Future
Allan Liska is a senior security architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security pos...
- Richard MelickSr. Technical Product Marketing Manager, Automox
Richard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.
- Etay MaorChief Security Officer, IntSights
Etay Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in...
- Gina ScintaSr. Solutions Architect, Thales
Gina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the IT profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data usin...
- Rick HollandCISO and VP of Strategy, Digital Shadows
Rick has more than 15 years' experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently co-chair ...
- Chris GoettlSr. Director, Product Management, Ivanti
Chris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events...
- Lee PsinakisCloud Security Sales Specialist, Check Point Software Technologies
Lee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.
Before joining Check Point, Lee held Sales, Management and Business...
- Eric SkinnerVP, Strategy, Trend Micro
Eric Skinner is VP of Market Strategy at Trend Micro, helping shape Trend’s solution offerings, growth plans and go-to-market approach. Previously at Trend Micro, Eric has been responsible for global product marketing. Prior to Trend Micro, Eric held senior management positions in a health care mobile startup and at digital identity solutions...
- Tim O'ConnorManager of Knowledge Services, Cadre Information Security
Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including PCI-QSA, CISA, CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written...
- James EllisDetective First Lieutenant, Commander, Michigan Cyber Command Center (MC3), Michigan State Police
Detective First Lieutenant Jim Ellis is the commander of the Michigan State Police Cyber Section within the Intelligence Operations Division. He leads a cyber team of 56 MSP members located at 7 offices throughout Michigan. He has oversight over the Michigan Cyber Command Center (MC3), Computer Crimes Unit (CCU), and the Michigan region of th...
- Edward RobertsDirector of Product Marketing, Imperva
Edward Roberts leads Product Marketing for Imperva Advanced Bot Protection. Prior to Imperva he led marketing at Distil Networks and has over twenty years of experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Softw...
- Ran RosinDirector, Product Management, Imperva
Ran Rosin Joined Imperva two years ago and is currently leading the Cloud Data Security solution. Prior to joining Imperva, Ran founded and lead two start-ups in the area of mobile Application and IoT.
- Phillip WylieLead Curriculum Developer, Point3 Federal
Phillip Wylie is the Lead Curriculum Developer for Point3 Federal, Adjunct Instructor at Dallas College, and The Pwn School Project founder. With over 22 years of experience, he has spent the last eight plus years as a pentester. His passion for mentoring and education inspired him to start teaching and to found The Pwn School Project, a bi-m...
- Tod BeardsleyResearch Director, Rapid7
Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, ...
- Glenn KapetanskyCSO & Technology Capability Lead, Trexin Group
Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...
- Eric WolffSr. Product Marketing Manager, Cloud and App-layer Data Protection, Thales Cloud Security
Eric Wolff is a Senior Product Marketing Manager for Thales application-layer data protection and solutions for public cloud security. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications, a...
- Kelsey NelsonSr. Product Marketing Manager, Okta
Kelsey Nelson is a Senior Product Marketing Manager at Okta, leading workforce IT and security solutions, including getting beyond the buzzword of "Zero Trust." Prior to joining Okta, she led product and business communications at tech startups varying from enterprise software to edtech to consumer music hardware, and prior to that taught sec...
- David MassonDirector of Enterprise Security, Darktrace
David Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various u...
- Susan HansonVice President, Human Resources, Provation Medical
Susan has over 20 years of healthcare experience in Human Resources and Compliance. Susan joined the Provation team in 2017 and brings her experience of building and growing high-performing teams with a dynamic, results-oriented culture and strong leadership. Susan also has experience in healthcare compliance specifically in HIPAA and HITECH ...
- Paul LanziCo-Founder & COO, Remediant
Paul Lanzi, is the co-founder and COO of Remediant. Remediant is a cybersecurity startup focused on delivering a new approach Privileged Access Management. Paul and his co-founder at Remediant, Tim Keeler, worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At eac...
- Adam WaltmanSr. Sales Engineer, Malwarebytes
Adam has over 20 years of experience in technology and serves as a senior technical member of the Malwarebytes field sales organization, providing expertise to customers in the Eastern U.S. Prior to joining Malwarebytes almost 5 years ago, Adam’s travels took him from various operational roles to other pre-sales engineering roles with Symante...
- Eddie DoyleGlobal Security Strategist, Check Point Software Technologies
Edwin Doyle communicates with international leaders in cybersecurity, cyber forensics, and cyber law enforcement, across the world. Taking best practices for threat mitigation from the industry’s finest CISOs and from police and military cyber command, Edwin’s responsibilities include sharing cyber defense tactics with media, government agenc...
- Andre AlvesCloud Security Architect, Trend Micro
Andre Alves has been helping companies to achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a certified AWS Solutions Architect and Hybrid Cloud Security trainer.
- Mike LloydCTO, RedSeal Networks
Dr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-...
- Davitt J. PotterDirector, MSSP and Channels, Americas, Digital Shadows
Born and raised in the Black Hills of South Dakota, Davitt has over 25 years of experience in the OEM, VAR & MSSP channels realm. From starting as a field services engineer fresh from school at the South Dakota School of Mines and Technology, and eventually defining and managing IT operations and strategy for numerous companies in a CTO capac...
- Michael LopezDirector of Cloud Services, AccessIT Group
Mike Lopez, Director of Cloud Services at AccessIT Group, has a history of designing cloud architecture with a security focused approach for government and fortune 500 clients. He has worked with private and public cloud environments including AWS, Azure, Oracle, and Google Cloud. Mike leads AccessIT Group’s Cloud practice by helping its cust...
- Gillian LockwoodEnterprise Information Security Program Administration and Governance, Partners Healthcare
- Brian CareyManager, Advisory Services, Rapid7
Brian Carey is a Rapid7 Manager of Advisory Consulting, specializing in: Security Program Assessments, Security Program Development, Risk Management, Vulnerability Management Program Development, Security Awareness and Policy Development. Before joining Rapid7 Brian was Information Security Director and interim Security Officer at LafargeHolc...
- Adam WinnProduct Manager, Cisco Umbrella, Cisco
Adam Winn is the platform product management lead for Cisco Umbrella. He got into cloud security product management in 2013 and never looked back. In 2016, he joined OpenDNS shortly before it was rebranded as Cisco Umbrella. He is a life-long California resident and a fan of live music (and can't wait for it to come back).
- Yuk Fai ChanCo-Leader, OWASP Toronto Chapter
Yuk Fai Chan is Co-Leader of the OWASP Toronto chapter, where he actively promotes software security within the Toronto community. Professionally, Yuk Fai is a Co-Founder at Proack Security Inc., a Toronto-based information security consulting firm. He specializes in application security, penetration testing, threat modelling, security incide...
- Bobby ModhaSecurity Consultant, Security Compass
Bobby Modha is a Security Consultant with Security Compass. He specializes in security assessments in the application security space including web application, APIs and mobile app penetration testing. In his spare time, Bobby enjoys working on personal projects such as developing scripts and participating in capture-the-flags.
- Jeremy CastlemanCloud Security Specialist, Check Point Software Technologies
Jeremy Castleman is the Cloud Security Specialist supporting the Cloud Team for Check Point Software Technologies. Jeremy brings 15 years of experience in technology sales, marketing, business development and cloud migration services in the partner ecosystem. He has worked in multiple countries around the world, in various markets, and across...
- Achint SehgalGlobal Head of Solutions Engineering, OneTrust
Achint Sehgal, CIPP/E, CIPM, serves as a Global Head of Solutions Engineering for OneTrust Vendorpedia—a purpose-built software designed to operationalize third-party risk management. In his role, Sehgal advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, fra...
- Robert WongExecutive Vice-President, Chief Information Officer, Toronto Hydro
Robert Wong is EVP & CIO at Toronto Hydro, responsible for information technology, operational technology, cyber security, and telecommunications. Robert was also Chief Risk Officer, responsible for corporate enterprise risk management, strategic planning, corporate governance, and business continuity.
Robert is on the Board of Directo... - Lois TulloExecutive in Residence, Global Risk Institute; CFRO/CCO, Novera Capital, Risk Management Faculty, Schulich School of Business, York University
- GuidePoint Security
- Nick RitterCISO, First Financial Bank
Nick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost...
- James GoepelTreasurer and Member, Board of Directors, Cybersecurity Maturity Model Certification (CMMC) Accreditation Body
James Goepel is Treasurer and Member, Board of Directors for the CMMC-AB. He is also an adjunct professor of Cybersecurity at Drexel University and CEO of Fathom Cyber, a trusted agent for senior management and developer of defensible cybersecurity strategies. Jim earned his BSECE from Drexel and his JD and LLM degrees from George Mason Unive...
- Edward EttorreOperational Risk Consultant, Wells Fargo
Ed is an Operational Risk Consultant working within the Technology Information Security group. He has been with Toastmasters International (TMI) since 1997 and has multiple certifications from TMI. Ed is a resourceful, creative, and solution-oriented person who was frequently able to come up with new and innovative approaches to his assigned ...
- Devon CampbellDigital Forensic Examiner, TransPerfect Legal Solutions
Devon Campbell is a Digital Forensic Examiner at TransPerfect Legal Solutions in the Forensic Technology and Consulting division. Devon has experience conducting forensic examinations of mobile devices, computers, social media data, cloud-based data, and email data. Prior to joining TransPerfect Legal Solutions, Devon earned her Master's degr...
- Christina GriffinIT Security and Risk Manager, Chatham Financial
Cybersecurity professional specializing in risk management and information security. She holds an MBA, a master’s in information technology leadership, and also has a CISSP certification. She has professional experience working in both higher education and finance industries and is currently employed as an IT Risk and Security Manager at Chat...
- Tedrick HoushPartner, Lathrop GPM LLP
Tedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the ...
- Steve HengeliAttorney at Law, Polsinelli
With a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technolog...
- Nan L. GrubeConsulting Attorney, PBL Consulting
Owner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandabl...
- Scott LaliberteChapter President, ISSA Delaware Valley Chapter
Scott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Scott also leads Protiviti’s Emerging Technology practice where he enables clients to leve...
- Jason PatelChief Technology Officer, Ensighten
As Chief Technology Officer Jason leads the Product and Engineering teams at Ensighten. Being part of Ensighten’s development team over six years ago when the Tag Management Platform was first designed gives him a unique perspective and experience on all our solutions; he has hence been influential in designing and implementing the majority o...
- Sunny NotaniSpecial Agent, United States Secret Service
Sunny Notani has worked as a Special Agent for the United States Secret Service for 18 years. SA Notani was initially assigned to the New York Field Office (NYFO) for eight years. During his time in the NYFO, SA Notani specialized in Financial Institution Fraud, Electronic Crimes, Network Intrusions, and Social Engineering. SA Notani was assi...
- Steve MagowanDirector, Data Protection and Resiliency, Royal Bank of Canada
Steve Magowan is Director of Data Protection with the Royal Bank of Canada. A Veteran of the Canadian Airforce, since retiring Steve has spent the past 20 years engaged in a wide assortment of Risk Focused, Data Protection, Security Architecture & Enterprise Risk Management initiatives.
Including the remediation of active security...
- MJ CouldridgeDirector, Business Development, Canadian Cyber Threat Exchange
MJ Couldridge is the Director of Business Development for the Canadian Cyber Threat Exchange. The CCTX is Canada’s threat sharing hub for all companies doing business in Canada. It provides analysis and enables collaboration of cyber security insights impacting Canada. Providing both a cross-industry and by-industry context, it serves small, ...
- Sabrina StanichCybersecurity Manager, Darktrace
Sabrina Stanich is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from financial services to manufacturing, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting an...
- Will MishraCybersecurity Manager, Darktrace
Will Mishra is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autono...
- Taylor LehmannCISO, athenahealth
Taylor Lehmann is the VP and Chief Information Security Officer at athenahealth, a healthcare information technology organization with headquarters in Watertown, MA and operations around the world. Taylor has been in information security and risk management for over 15 years. He was most recently the CISO at Wellforce, an eastern MA-based, Tu...
- Myles KellermanChief Cybersecurity Analyst, Alpine Security
Myles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many ...
- Lauren ProvostProfessor, Computer Science, Western Governors University
Dr. Lauren E. Provost is an ethical hacker, author and professor. She directs The Ethical Hackers Cybersecurity organization, a virtual community for educators and industry providing comprehensive planning and risk management updates, network and cloud security knowledge and information on other cybersecurity topics such as general penetratio...
- Sam RastogiProduct Marketing Director, Illumio
Sam Rastogi is a veteran of the security industry with 18+ years experience marketing leading security products at Illumio, Palo Alto Networks, Cisco Systems, HP Enterprise, McAfee, Juniper Networks, and Oracle. Sam is a Product Marketing Director at Illumio, where he is responsible for leading go-to-market and marketing activities for zero t...
- Leland DeanVP, Global Corporate Security, Bank of New York Mellon
Leland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).
Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal ...
- Torry CrassCyber Security Advisor, N.C. State Board of Elections
Torry Crass currently serves as a Cyber Security Advisor at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.
Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry...
- Brian NeesbyCIO, N.C. State Board of Elections
Brian Neesby is the CIO of the State Board of Elections. Prior to this role, he was the Chief Data Officer. Brian has served as a fact witness, been deposed several times, and executed declarations on behalf of the State Board concerning his knowledge of North Carolina’s Statewide Voter Registration Database. He investigated data discrepanc...
- Michael DickersonDirector, Mecklenburg County Board of Elections
Michael Dickerson is currently the Director of Elections for Mecklenburg County and has held this position since 1998.
Prior to coming to Charlotte, Mr. Dickerson was with the Federal Election Commission as a Deputy Assistant Staff Director. Mr. Dickerson spent 14 years at the Federal Election Commission.Currently he is a membe...
- Karen Brinson BellExecutive Director, N.C. State Board of Elections
Karen Brinson Bell was appointed executive director of the State Board of Elections on May 13, 2019, and began her tenure on June 1. As the state’s chief elections official, she leads about 70 full-time employees at the state agency, which is charged with administering elections and overseeing the 100 county boards of elections, as well as ca...
- Patrick GannonPublic Information Officer, N.C. State Board of Elections
Patrick Gannon has been the public information officer at the State Board of Elections since October 2016, just before the presidential election. He came to the State Board after a 17-year career in journalism, most recently as editor of The Insider State Government News Service and syndicated columnist covering state politics for the Capitol...
- Boris VishnevskyBoard Member and Technology Strategist, Cloud Security Alliance - Delaware Valley (CSA-DV)
Boris Vishnevsky, MBA, CISSP, DIA is a board member and advisor of the Cloud Security Alliance- Delaware Valley Chapter, Distinguished IT Architect of the Open Group and is a frequent speaker and presenter, taking part in review panels and advising innovative Cyber Security Companies. Mr. Vishnevsky is a solutions principal advising companie...
- Marc TabagoSolutions Engineer, Trend Micro
As a Solutions Engineer, Marc Tabago works with enterprises to solidify and strengthen their digital security policies against malicious threat actors. However, he believes that having a concrete digital security posture starts at the use case level, driven and experienced by its users and not simply read off a PowerPoint slide. Once the dust...
- Justin BourgeoisSales Engineer, Mimecast
Justin Bourgeois is a Solution Engineer at Mimecast. He has a background in implementation project management, IT consulting and has spent his off time programming as a hobby. Justin’s main responsibility is educating people about the ever-evolving threat landscape that not only threatens their infrastructure but also their partners and the g...
- Joe ZurbaCISO, Harvard Medical School
In his role as the leader of Information Security at Harvard Medical School, Joe Zurba has been responsible for defining and building capabilities to meet the requirements of an extraordinarily diverse community of clinical and research faculty, students, and staff. Joe develops strategy, improves capabilities, and manages risk for all inform...
- Michael AnayaSupervisory Special Agent, Cyber, FBI (Prior)
Michael is the Head of Cyber Risk at Expanse (one of Forbes' 25 fastest-growing venture-backed startups likely to reach a $1 billion valuation). He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies' and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent...
- Tony HowlettCISO, SecureLink
Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP and GNSA certifications, and a B.B.A in Management Information Systems. Tony is curre...
- Ian WoolleyChief Revenue Officer, Ensighten
Ian’s impressive background and management expertise in digital marketing and advertising are fueling his success in driving adoption of Ensighten’s solutions worldwide. Ian started his career at Dun & Bradstreet Europe before working at Interpublic Group’s Draft Digital as Managing Director. After building his own premium publisher business,...
- Samara WilliamsThreat Intel Engineer, Cardinal Health
Samara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about ...
- Melisa OzcanCybersecurity Account Executive, Darktrace
Melisa Ozcan is a Cyber Security Account Executive at Darktrace, the world’s leading AI company for cyber defense. At Darktrace, Melisa works with leading organizations in a range of industries from private equity to media and entertainment to deploy and operationalize cutting edge technologies. During Melisa’s tenure at Darktrace, the compan...
- Kelley MisataCEO, Sightline Security
Dr. Kelley Misata, CEO of Sightline Security, President and Executive Director of OISF (Suricata), and former Director of Communication of The Tor Project - a cyber and information security executive with 15+ years of experience in cyber and information security, marketing, and communications. Expert in bridging the gap between technical and ...
- Sergeant Michael DavisCyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center Unit
Sgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Ho...
- Michael ButterfieldRegional Architect - Mid-Atlantic, Check Point Software Technologies
Michael Butterfield is Security Architect at Check Point, where he supports 30+ engineering teams responsible for hundreds of customers across the Mid-Atlantic. He is primarily focused on helping enterprises design, consolidate, and integrate security controls into emerging technology platforms. Over an 18-year career in cybersecurity, Michae...
- Andrew HooverSr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University
Andrew Hoover is a Senior Engineer with the CERT Division of Carnegie Mellon University’s Software Engineering Institute. As a member of the Cybersecurity Assurance Team, he performs risk and resilience management work for a variety of organizations, mostly relating to critical infrastructure protection. Andrew has 16 years of experience in i...
- Katie StewartSr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University
Katie Stewart is a senior member of the technical staff within the CERT® Division at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. She has more than 15 years of experience advising clients in engineering, information technology, and telecommunications industries. Katie’s current research int...
- Juan MarinSales Engineer Manager, IntSights
A cybersecurity professional and avid technologist advocate with 10 years of experience in effective cyber-security practices, advanced threat prevention, malware and incident response; Juan has worked with the likes of McAfee/Intel Security and Trend Micro in the past, fulfilling technical sales, advisory and customer success roles, and toda...
- John AmaralHead of Product, Cloud Security, Cisco
John Amaral is the Head of Product for Cisco Cloud Security. In this role, he is responsible for product management, planning and strategy for Cisco's leading cloud security offerings including Cisco Umbrella and Cisco Cloudlock. John joined Cisco through the acquisition of Cloudlock, where he was Head of Product; responsible for product deve...
- Stacy HarperPartner, Spencer Fane LLP
Stacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and ...
- Rick DotenCISO, Carolina Complete Health, VP, Information Security, Centene Corp.
Rick is CISO of Carolina Complete Health, a state healthcare plan for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industrie...
- Dr. Atefeh (Atty) MashatanFounder & Director, Cybersecurity Research Lab, Ryerson University
Dr. Atefeh (Atty) Mashatan is the Founder and Director of the Cybersecurity Research Lab at Ryerson University. SC Magazine recognized her as one of top five Women of Influence in Security globally in 2019. She joined the School of Information Technology Management of Ryerson University in 2016 focusing on Information Systems Security, Crypto...
- Rob DalzellVulnerability Management, Global Bank
Rob Dalzell is a cybersecurity professional with over 30 years of information technology experience and 10 years of cybersecurity experience. He currently works in Cyber Security Defense for a global financial institution helping to transform the way it manages cyber security vulnerabilities. Rob has thrived in the following cybersecurity bas...
- Tammy KlotzCISO, Covanta
Prior to Covanta, Tammy was responsible for the cybersecurity program at Versum Materials, which included Information Risk Management, Plant Cybersecurity, as well as IT Security, Risk & Compliance activities. She was with Versum since their start-up in October 2016 and was responsible for standing up all security services required for the ne...
- Pete MurphyIT Advisory Executive, CareSource
Pete Murphy is a well-established leader, builder and collaborator with high standards for personal integrity and a bias for action. He has demonstrated senior level leadership experience building, growing, improving and operating business systems and processes as a CIO, CTO, CISO, Risk Leader and Data and Analytics executive.
He speci... - Joshua CloudDirector of Information Security, NFI
Joshua Cloud is currently serving as the director of information security for NFI. He has over 20 years of infrastructure and security leadership experience spanning professional services, manufacturing, retail, and logistics industries in countries all over the world. Cloud is a transformational security leader with a business focus who evan...
- Paul IhmeCo-Founder & President of Consulting Services, Soteria
Paul is an accomplished Security Professional with 14 years of experience in multiple information technology domains, specializing in computer network exploitation, computer network defense and security incident response. His expertise includes planning, coordinating and performing offensive computer operations.
Paul leads the firm’s ma... - Douglas JamborSr. Cybersecurity Manager - IT Advisory, Dixon Hughes Goodman LLP
Douglas has 13 years of penetration testing experience in the information technology field, focusing on information systems security and information security risk management. He is DHG’s cybersecurity subject leader and manager over all of the firm’s technical cybersecurity services, which includes internal, external, wireless and web applica...
- Trend Micro
- Kevin DreyerIT Director & CISO, Maple Reinders Group
Kevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the...
- Jana WhiteCOO, Alpine Security
Jana White is the Chief Operating Officer of Alpine Security. Jana has an extensive background in banking, compliance, and loss prevention and serves as one of the virtual CISOs for Alpine Security clients. Jana has degrees in criminal justice and cybersecurity and is certified as a crime scene evidence technician. She also holds many cyber...
- Olivera ZatezaloChief Security Officer, Huawei Canada
Olivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada’s operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Olivera is best known for creating value through collaborative leadership style, agi...
- Kenrick BagnallDetective Constable, Coordinated Cyber Centre (C3), Toronto Police Service, Former VP of IT at Capital G Bank
Kenrick has been a member of the Toronto Police Service since April of 2006 and currently serves as an investigator in the Coordinated Cyber Centre (C3) section of Intelligence Services. Before this Kenrick spent 20 years in the Information Technology industry primarily in the financial services sector, holding positions of Senior Network Ana...
- Tamika PuckettRisk Manager, Corporate Security, Zoom
As the City of Chicago’s Chief Risk Officer, Ms. Puckett was responsible for implementing and managing the city’s enterprise risk management governance framework, including the implementation of policies and procedures to identify and manage organizational risks. A career risk manager, Ms. Puckett possesses over 15 years of experience managin...
- Tanya Tipper-LusterIT Audit/Advisory Professional, Wyndham Destinations
Tanya Tipper-Luster has spoken at cyber conferences such as the (ISC)2 Security Congress and was featured as a cybersecurity expert in the Orlando Business Journal. She is a Cybersecurity Audit thought leader and visionary. She represents the alignment of emerging technology, critical business processes and key cybersecurity controls to infl...
- Robert RybaSr. IT Audit / Advisory, Wyndham Destinations
Robert Ryba has spoken at cyber conferences such as the (ISC)2 Security Congress. He is a Certified Public Accountant and Certified Information Systems Auditor with an Internal Audit and Cybersecurity background. As a millennial who is deeply passionate about information technology, he is motivated to learn why millennials are so indifferent...
- Ethan StrayerSr. IT Advisory Analyst, Wyndham Destinations
Ethan Strayer has spoken at cyber conferences such as the (ISC)2 Security Congress. Ethan is a Certified Information Systems Auditor, Cybersecurity and Information Technology (IT) Governance Risk and Compliance professional. He supports the Company's risk tolerance while also improving the IT posture of the organization. Ethan specializes in...
- Chris TurleyLeader, RISC Education & Awareness, FIS
I lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previo...
- Brian ColemanAssociate CIO, Information Security Officer , University of Massachusetts Medical School
Brian is a seasoned leader, Chief Information Security Officer, and IT executive. His experience spans Insurance, Financial Services, Health Care, and Cloud Security. His specialty is optimizing Information Security and Risk Management / Compliance organizations, his passion is employee mentorship, continuous improvement and process developme...
- Donna RossSVP & CISO, Radian Group
Donna L. Ross was appointed to her current position as Senior Vice President, Chief Information Security Officer in July 2016. In this role she is responsible for Radian’s information security program and business compliance, as well as the enterprise project management and initiative governance programs.
Donna is a senior security and...
- Moderator: Nancy HunterVP & CISO, Federal Reserve Bank of Philadelphia
Nancy Hunter is the VP, CISO and Data Privacy Security Officer at the Federal Reserve Bank of Philadelphia. With more than 25 years of experience in technology including 15 years in Information Security, Nancy joined the Federal Reserve Bank in 2017 where is accountable for Information Security Operations and Consulting, Information Risk Mana...
- Mark EgglestonVP, Chief Information Security and Privacy Officer, Health Partners Plans
Mark Eggleston is a senior executive specializing in security and privacy programs. His unique background and expertise in IT program and people management, combined with his diverse experience in healthcare, has positioned him as a thought leader and frequent speaker.
Mark currently serves as Vice President, Chief Information Security...
- Joshua SorensonSr. Director, Global Security, Equifax
Joshua is a Global Information Security Leader with 14 years of professional experience. Joshua currently serves as Equifax's Senior Director of Global Mainframe Security where he has responsibility for transforming zSeries platform security around the world. Prior to joining Equifax, Joshua served in security leadership roles, leading transf...
- Ted DemopoulosPrincipal, Demopoulos Associates
Ted Demopoulos’ professional background includes over 35 years of experience in Information Security and Business, including over 30 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent...
- Joel LoweDirector of Physical and Cyber Security, Red Ventures
Joel Lowe has more than 14 years of experience in remediating threats, vulnerability management, risk management, data privacy, and information security programs. These programs focus on overseeing private data protection, corporate governance, risk management strategy, Certification & Accreditation, Incident Response, forensics and executive...
- Canadian Cyber Threat Exchange (CCTX)
The Canadian Cyber Threat Exchange (CCTX) is a sharing hub and collaboration organization that provides insight into cyber events directly impacting Canadian business, along with mitigation options and tools to combat identified threats. Learn about the CCTX and enjoy a special, CCTX-hosted guest presentation. Details available soon.
- Ken E. SiglerBoard of Advisors, University of Detroit Mercy, Center for Cybersecurity and Intelligence Studies
Ken Sigler has served as a full-time faculty member of the Computer Information Systems program at the Auburn Hills Michigan campus of Oakland Community College since 2001, while his primary research is in the area of cybersecurity education, policy, and management; software management; and software assurance. Ken serves as the Liaison for th...
- Daniel GoldenbergDirector, IT Infrastructure, Barton Associates
Dan is a business results-focused information technology leader with a background in information security, infrastructure, and technical operations; experiences range from fledgling start-ups to enterprise corporate environments.
- Tammy MoskitesPonemon Institute Distinguished Fellow, Career CISO & Former CISO, Time Warner Cable; CEO & Founder, CyAlliance
Tammy is the CEO and Founder of CyAlliance. She is a strategic advisor to companies, vendors and startups by leading, building and scaling security offerings while providing CISO as a Service and virtual CISO (vCISO) services for companies worldwide. With her 30 years of experience, she is noted by her peers to be a results-driven and passion...
- Adam KarcherCyber Special Agent, FBI
Special Agent Adam Karcher has been with the FBI for over 16 years running cyber investigations and operations across the full spectrum of criminal and national security programs. SA Karcher's experience spans local field investigations to national and international strategic engagement against the most sophisticated cyber threats. His curren...
- Matt DonatoCo-Founder & Managing Partner, HuntSource
Matt Donato is a Co-Founder & Managing Partner of HuntSource- the preeminent Executive Search and Talent Solutions firm with a niche focus in Cyber Security & Data Intelligence. Matt possesses fifteen years of experience in executive recruiting, talent solutions, workforce planning, and talent management. He is a thought leader and recruiting...
- Helen OakleyLeader in Cybersecurity
Helen Oakley is a cybersecurity enthusiast, researcher and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s “Canadian Women in Cybersecurity” conference. Helen holds a lea...
- (ISC)2 Local Chapter
The International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization."
- Joe ProvostInformation Security, Avidia Bank
Joe's been in cyber since the internet was a piece of string tied between two soup cans! He's a former Army warrant officer (network warfare), MIT Lincoln Laboratory IAM, IBM (XForce Cyber Range) “The Cave” member, teaches professional ED at MIT with the Geospatial Cyber Security group, and has a Masters in Cyber from Utica College. His forme...
- Michael MeyerChief Risk and Innovation Officer, MRS BPO, LLC
Michael Meyer, MPSTM, CISSP, CIPP/US, CIPM, FIP, CISM, CRVPM II, CRISC, CISA, is the Chief Risk and Innovation Officer of MRS BPO. He is responsible for overseeing the company’s enterprise innovation, risk management and security initiatives for its Fortune clients. Michael has been with MRS for over 20 years and previously served in the Chie...
- Don McKeownInformation Security Manager, Wolters Kluwer Health
Don McKeown is currently an information security manager for a provider of healthcare solutions that facilitate effective clinical decisions. There he developed and teaches a threat modeling course, teaches code scanning, contributes to corporate application security advisory committees, and consults for technical and product teams. Previousl...
- Doug GrahamChief Security and Privacy Officer, Lionbridge
Doug is the Chief Security and Privacy Officer at Lionbridge Technologies, a global leader in localization and data training. He has over 20 years of global experience in the enterprise security space and brings a balance of leadership, customer focus, and technical expertise to the table. He previously served as CSO of Nuance Communications ...
- Gabriel DoncelDirector, Information Security, Drexel University
Gabriel Doncel joined Drexel University in 2019 where is currently Director of Information Security. He is also part of the University of Delaware and Wilmington University Adjunct Faculty. As a member of the Information Security team at Drexel, and working closely with the campus community and outside parties, his focus is to protect the peo...
- Margarita RiveraVP, Information Security, Risk & Compliance, LMC (a Lennar Company)
An Information Security Executive with over 15 years of experience, Margarita Rivera has thrived her entire career on solving complex problems. Margarita has dedicated her professional journey to building Information Security Risk, Compliance and Privacy Programs and continues to do so as the Head of Information Security at LMC, a Lennar Corp...
- Brendan CampbellAVP, Global Technology Governance & Control, Manulife
Brendan Campbell is currently the leader for Manulife’s Global Technology Governance & Control function and has prior experience across audit, risk management, information security. He is a part of the Global Technology Executive team and is responsible for leading the execution of risk activities globally. In addition, he is responsible for ...
- Mike Ste. MarieElection Security Partnership Program Manager, Office of the Secretary of the Commonwealth of Massachusetts
Mike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a...
- Adel DaneshCISO, Analytics 4 Life
Adel Danesh has over 20 years of experience in IT and information security. Over the course of his professional career, he has been holding information security leadership roles in various organizations and spearheaded mission critical security and infrastructure projects. In his current job, Adel is a CISO at Analytics For Life, a medical re...
- Dominique WestSr. Cloud Security Consultant, EY, Instructor, Georgia Institute of Technology
Dominique West is a senior consultant for Ernst & Young based in Atlanta, GA. She has eight years of experience in Information Technology, five of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries...
- Daniel PepperPartner, BakerHostetler
Dan Pepper is a partner on BakerHostetler's Privacy and Data Protection team. Utilizing 25 years of comprehensive experience in information technology, data privacy, and cybersecurity law, Dan advises clients on proactive data security practices, data breach incident response, and regulatory compliance. He frequently handles security incident...
- Michael EffiongHead of Cybersecurity, Tango Networks
Michael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas,...
- Arif HameedSr. Director, Client Security, Equifax Canada
Arif Hameed is Senior Director at Equifax, where he leads a team that handles client cybersecurity due diligence activities including questionnaires, audits, remediation support, security schedules, etc. Prior to his role at Equifax, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third Party Cyber Risk, and IT ...
- Imran AhmadPartner/ Attorney, Blake, Cassels & Graydon LLP
Imran has a business law practice with a specialization in technology, cybersecurity, and privacy law. As part of his cybersecurity practice, Imran works closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk alloca...
- J. Zhanna Malekos SmithReuben Everett Cyber Scholar and Researcher, Duke University Center on Law & Technology
J. Zhanna Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of ...
- Larry SnyderAssociate Professor, Bloomsburg University of Pennsylvania
Professor Larry Snyder has nearly two decades of experience in law enforcement, fraud, and auditing in the US Army and a variety of industries, and 15 years in the field of cybersecurity education. Larry believes that cybersecurity strategists must have a broad understanding of the cyber issues facing organizations, as well as the skills need...
- Ryan HausknechtInstructor, University of North Carolina at Charlotte
Ryan Hausknecht specializes in red teaming as a Security Consultant at SpecterOps and is an instructor for cybersecurity at UNC Charlotte. He is a former Forensic Consultant, Information Security Analyst, and Penetration Tester who has dealt with clients ranging from local government to enterprise-sized businesses. Ryan graduated Summa Cum La...
- Stephen PurpuraFounder, [Stealth Mode]
Stephen Purpura is an American entrepreneur and an applied machine learning researcher. He has co-founded four companies that focus on evolving the future of work, including Context Relevant (renamed Versive and acquired by eSentire) and SkyEye LLC (also acquired). He holds degrees from Harvard University’s Kennedy School of Government and th...
- Karen HolmesVP and CISO, TrueBlue Inc.
Karen Holmes is the Vice President and CISO at True Blue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating an innovative atmosphe...
- Garrett WhitneyCIO, Delta Dental of Washington
Garrett Whitney is the Chief Information Officer at Delta Dental of Washington, the largest dental benefits provider in Washington State. He developed a passion for technology at an early age by learning to program Pascal, C, and 8086 Assembly languages prior to graduating high school. Garrett is a veteran of the United States Navy, specializ...
- Kat JungckPrincipal Enterprise Security Architect, F5 Networks
Kat is an experienced cybersecurity practitioner with a background in both enterprise cybersecurity and secure product development with deep domain experience in cloud security, identity and access management, and secure product development. Kat enjoys working with local cybersecurity chapters and programs to recruit and develop the next gen...
- Brian SheaDirector of Security - GRC, Microsoft
Brian is an IT Executive with 25 years of experience from IT Operations and Support, Security, through Compliance, Risk Management, and Technology Innovation. As part of his tenure at Microsoft he has been supporting Supply Chain security and compliance for the last 7 years including hardware supply chain, software supply chain, and vendor /...
- Sean VenturaCISO, Atmosera
Sean has over 30 years of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Chief Information Security Officer at Atmosera, implementing and maintaining the company’s security posture, while providing security and compliance expert advisory to Atmoser...
- Mukesh DixitCTO, WA State Department of Labor and Industries
Chief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...
- Austin McBrideThreat Data Scientist, Cisco Umbrella
Austin McBride is a Threat Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. His current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets...
- Burak SerdarCo-Founder, ConsentGrid
Burak is one of the co-founders and the technical lead at Cloud Privacy Labs. He has more than 25 years of experience as a software engineer and recently left his position at Red Hat as Principal Software Applications Engineer. His work includes large scale back-end applications for distributed environments and open-source tools for enterpris...
- Jaymin DesaiOffering Manager, Third-Party Risk, OneTrust
Jaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficie...
- Clint SowadaDirector of Product Security, Collibra
As the Director of Product Security at Collibra, Clint Sowada is responsible for delivering secure applications and protecting customer’s data. He has been in the security industry for nearly a decade and has proven track record in building secure SDLC programs at companies that range from endpoint protection to large scale cloud service prov...
- Ashish PopliDirector of Product Security, Privacy & Compliance, UiPath
Ashish thrives on pragmatism, innovation and building teams that deliver a promise. He started his career over 20 years ago, as a computer scientist in upstate NY, and since then has been learning the 'art of impossible', by wearing multiple hats, including writing code, conducting pen tests, finding and fixing security bugs, building and shi...
- Dr. Ben EdwardsSr. Data Scientist, Cyentia Insitute
Dr. Benjamin Edwards joined Cyentia at the beginning of 2019 as hire #1. He was formerly with IBM Research, where he worked in applying advanced machine learning techniques to solve real world security problems and shaped the next generation of analytical security models. Before that he received his Ph.D. from the University of New Mexico wit...
- Jeff RaymondSales Engineer, Avanan
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakesurfing (depending on the se...
- Justin SchluesslerData Protection Officer, Compassion International
Justin Schluessler has served with Compassion International, a global child development non-profit, for 21 years. Starting in IT and then transitioning to Risk Management, Justin was the organization’s very first information security employee—building a comprehensive security and compliance program from the ground up. In his current role as ...
- Jerry VergerontAttorney, Vergeront Law, PLLC
Jerry Vergeront is the founder and attorney at Vergeront Law, PLLC. With over 25 years in Information Security before becoming an attorney, he brings an industry understanding to data security, privacy, and compliance law.
- Tim DanksVP, Risk Management & Partner Relations, Huawei Technologies (USA)
As VP Risk Management & Partner Relations Mr. Danks is responsible for understanding and managing business risks in the context of cybersecurity and privacy across Huawei USA businesses and toward external stakeholders. Further, he is responsible for developing and enhancing partner relationships towards key external stakeholders across acade...
- Bruce PotterCISO, Expel
Bruce Potter is the CISO at Expel. Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company. He also served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security, and co-founded the Shmoo Group in 1996.
- Anand SinghCISO, Alkami Technology
Dr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currentl...
- Drew SimonisVP & Deputy CISO, Hewlett Packard Enterprise
Drew Simonis is a Vice President and serves as the Deputy CISO at Hewlett Packard Enterprise (HPE). He has worked in some of the largest and most complex environments in the public sector and the private sector with firms such as IBM, AT&T, EDS and Symantec. Prior to joining HPE, Drew spent 8 years as the CISO for Willis Group Holdings (now W...
- Robert WaldenChief Information Officer, Epsilon
Robert Walden is the Chief Information Officer at Epsilon where he is responsible for cybersecurity, data center and public cloud infrastructure services, and network services. Additionally, Robert is responsible for providing all IT workplace services for a global user base. Robert has been delivering business value through technology for ov...
- Tianne StrombeckSr. Principal, Security Risk Management, Verizon
Tia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has work...
- Michael BlahaSr. Director, Cloud Operations, NucleusHealth
Michael Blaha is currently Sr. Director of Cloud Operations and Security at NucleusHealth. Throughout his career, Michael has made a focus of integrating security and cloud native principles into his delivery and operations teams in both the healthcare payer and healthcare Software-as-a-Service space.
- Ian SchnellerSVP Global Information Security, Financial Institution
A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...
- Craig SwinteckIS Manager, Town of Castle Rock
Craig Swinteck has a comprehensive background in IT operations and cybersecurity, with a career spanning across entrepreneurship, small businesses to global corporations, serving the public in local and federal government, and providing cybersecurity guidance in challenging industries such as Finance, Healthcare, and Manufacturing. Craig’s pa...
- Joe DietzNetwork Security Architect, CenturyLink
A technology focused senior level IT security professional with an excellent balance of business experience and knowledge of systems/network security. Always conducting oneself with integrity and ethical behavior following the motto of “Always do the right thing.”
- Diana HennelCTO, Catalyst Corporation Federal Credit Union
Diana Hennel is currently the Chief Technology Officer for Catalyst Corporate Federal Credit Union. In her role, Diana is responsible for the long-term strategic direction and implementation of technology strategy, security, and processes. She oversees the corporate’s network operations, technology development and information systems securit...
- Joshua CarlsonData Privacy and Technology Law Attorney, The Carlson Firm
Joshua Carlson is a privacy lawyer but also is a technologist and understands sytem engineering, he has for a long time held his CISSP, CIPP, CIPP/G, CIPP/E and provides guidance and advisory to organizations around the world.
- Jay JacobsChief Data Scientist & Co-Founder, Cyentia Institute
Jay is a Co-founder and Chief Data Scientist at Cyentia Institute, a research firm dedicated to advancing the state of information security knowledge and practice through data-driven research. Prior to Cyentia, Jay served as the Lead Data Analyst on the Verizon Data Breach Investigations Report and is the co-founder of the Society for Informa...
- Christopher CalarcoSpecial Agent / Private Sector Coordinator, FBI Denver
Special Agent (SA) Christopher A. Calarco has been in law enforcement for 25 years. He was previously a local and federal prosecutor, and has been an Agent for the FBI for over 20 years. SA Calarco has investigated a number of matters to include reactive violent crimes, gangs, organized crime, fraud and major theft. SA Calarco was also a m...
- Scott BennettVP, Applications, Lear Corporation
Scott Bennett leads Lear Corporation’s global applications as the Vice President of Applications, Deployment and Development. Prior to joining Lear Corporation, he served as the Global Chief Information Officer to International Automotive Components Group, a $6 billion Tier 1 automotive supplier. Before that, Scott was the North America CIO...
- Zahira (Zah) GonzalvoSVP and Chief Information Security & Privacy Officer, Flagstar Bank
Zah joined Flagstar Bank Information Security & Privacy team in 2018 as a Senior Vice President and Chief Information Security & Privacy Officer. Prior to her CISO role, Zah was the head of ERM and the Operational Risk teams since 2013 when she joined Flagstar Bank. Zah was the Strategy Leader for Diversity and Inclusion (D&I) for the Bank si...
- Janet LawlessCEO & Founder, Center for Threat Intelligence
Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge threat intelligence consulting, training and a certification program for Certified Threat Intelligence Professionals (CTIP). We are a proud provider for The National Initiative for Cybersecurity Education (NICE)...
- Jason RaderDirector, Network & Cloud Security, Insight Cloud + Data Center Transformation
Jason Rader joined Insight in 2015 as the National Practice Director of Security. He is charged with managing Insight’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true s...
- Dennis HodgesCIO, Inteva Products
Dennis Hodges is the Chief Information Officer for Inteva Products, LLC, a position he has held since March 1, 2008. Prior to this assignment Dennis was Chief Information Officer for Delphi Interiors and Closures. Prior to joining Inteva, Dennis served as the Global Business Systems Director at Huntsman Corporation. He began his career at She...
- Tammylynne JonasCIO, Self Esteem Brands
Tammylynne Jonas (TLJ) is a seasoned digital and technology executive with almost 20 years of experience leading large, international teams. TLJ is the Global CIO for Self Esteem Brands, the parent company for Anytime Fitness. In this role, TLJ has responsibility for multiple franchise brands, with almost 5000 locations across almost 40 count...
- Brenden SmithCISO, FirstBank
Brenden Smith is the Chief Information Security Officer at FirstBank. Having spent the last 10 years at FirstBank he is passionate about their community involvement and “Banking for Good” philosophy. In his current role Brenden is focused on aligning security with the needs of the business to help drive better business outcomes through better...
- Christopher RileyCISO, Ntirety (formerly HOSTING.com)
Chris is a seasoned IT Strategist with 20 years of leadership experience in Project & Program Management, Technology & Infrastructure, and Security & Governance. He creates and scales internal technology operations for sustained hyper-growth, builds security operations for Managed Security Provider and spearheads Compliance certification pro...
- Ronald WilliamsonInformation Security Officer, Medical College of Wisconsin
Ronald Williamson has over 20 years’ experience in Information Technology and Information Security. He has held roles within the banking, retail, and healthcare industry. Currently, he is Information Security Officer at the Medical College of Wisconsin. Driven by a belief in promoting a strategic vision and utilizing best practices to accompl...
- Bill MeredithCloud Security Engineer, Charles Schwab
Bill Meredith has over 25 years of experience designing, implementing, and supporting IT solutions for large enterprises, of which 10 years have been in the cybersecurity area. He is a cybersecurity professional with experience across a diverse set of cyber domains and industries such as Cloud Security, Financial, Forensics Investigation, Te...
- Panel Discussion
- Kevin BeaverIndependent Information Security Consultant, Principle Logic, LLC
Kevin Beaver, CISSP is an information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. • With over 31 years in IT and 25 years in security, Kevin specializes in independent security assessments and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sen...
- Doug BoykinSolutions Engineer, OneTrust
Doug Boykin serves as a Privacy Engineer at OneTrust – the #1 most widely used privacy, security and third-party risk technology platform. In his role, Boykin advises many of the world's leading organizations on CCPA, GDPR and ePrivacy (Cookie Law) solution implementations, focused on formulating efficient and effective responses to data prot...
- John CallaghanSr. Security Engineer in SOC Operations, Forensics, and Threat Hunting, Pulte Financial Services
As a security practitioner of 30 years, Jack's experience began in the 80s with commercial and military venues, and expanding in early days of the Internet. It continued to be shaped by the growth of malware and data breaches as global threats against business, nations, and individuals. While developing some of the earliest proactive IPS syst...
- Patrick BenoitGlobal Business Information Security Officer , CBRE
Patrick is an Advisory CISO and formerly the Deputy CISO for Cheetah Digital. He is a security and privacy executive, writer, speaker, knowledge provider and seeker. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is certifi...
- Jeff KenneyCIO/CISO, Grasshopper Bank
30+ years IT and Information Security practice. CIO/CISO at the first digital commercial bank in the US. Previously served as the Global Head of Wealth Technology for Thomson Reuters wealth management business line. Lead a team of over 380 developers and technologists supporting the TR BETA, BETA Online, and Thomson One products. Previously t...
- Dale DrewChief Security Officer, Zayo Group
Dale is currently the Chief Security Officer of Zayo Group, Inc, a global telecommunications service provider based in Boulder, Colorado. Dale is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, having worked in Federal/State Law Enforcement and with Inte...
- Rob WalkSr. Security Engineer, Tenable
Rob is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying, and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable, he helps organizations reduce risk due to Cyber Exposure.
- Kelce WilsonGeneral Counsel, InfraGard North Texas
Kelce S. Wilson was in the U.S. Air Force, both active duty and reserves, retiring as a Lieutenant Colonel. He has a B.S., M.S. and PhD in electrical engineering, an M.B.A., a J.D., US PTO patent practitioner registration, and is a certified privacy professional with CIPP-US, CIPP-E, and CIPM. During his military and engineering career he wor...
- TJ GonenCo-Founder , Protego Labs
TJ is a subject matter expert on cloud security who has decades of experience solving enterprise problems with innovative solutions. His current project, Protego Labs, is two years in the making. With Protego, TJ has developed an award-winning platform that automates security for serverless applications. The combination of reduced development...
- Book Signing
- Parthasarathi ChakrabortyDirector, Security Architecture, Bank of Montreal
Partha has over 20 years of cyber security leadership experience in financial services industry. An active speaker and panelist in cyber security conferences around the world. Very much passionate about learning new technologies and writing on recent cyber trends. Currently heading up infrastructure security architecture for Bank of Montreal....
- Rob MaynardSolutions Architect, Trend Micro
Rob Maynard is a sales engineer and DevOps SME for Trend Micro. He has been in the IT field for over 11 years working with various cloud, automation, and virtualization technologies. He lives in Michigan with his wife and two children.
- Jennifer ReichertsCertified Ethical Hacker, Healthcare Information Security Analyst
Jennifer Reicherts is an Information Security Analyst with over 16 years of experience working in the Healthcare and Public Health sector. Her passions include IoT cybersecurity and threat intelligence. Jennifer is a Certified Ethical Hacker (CEH) and an Executive Board Member of InfraGard Minnesota Member Alliance.
- Michael HiskeyChief Marketing Officer, Avanan
Michael Hiskey is a long-time data, analytics, cloud, and AI industry executive. An accomplished writer and speaker, he has published articles in Forbes, InfoWorld, TechCrunch, ITProPortal, etc. He spends his time thinking about how these innovations impact B2B organizations and their customers. Michael has a background in enterprise technolo...
- Rebecca HarnessAVP, CISO, St. Louis University
Rebecca Harness is AVP & Chief Information Security Officer for Saint Louis University and Founder/Principal of Pericuro. Rebecca has an established 20+ year career in information technology with the past ten years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two succes...
- Scott HoggChair Emeritus, Rocky Mountain IPv6 Task Force
Scott Hogg is CTO and a co-founder of HexaBuild.io, an IPv6 consulting and training firm. He is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. He is the author of the a Cloud Guru course, “Rapidly Deploying IPv6 on AWS.” Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member o...
- Joseph MarentetteMIM, Network Engineer 3, Washington University in St. Louis
Joe Marentette, MIM (WashU IT Network Engineer 3), has worked for the university for over 20 years. Joe leads the design and engineering of the WashU enterprise network and the research network. Joe has a long history of collaboration with the Information Security department, and most recently built the data collection network to capture netw...
- Eddie HoFormer CIO & COO, Los Alamos National Bank
Eddie Ho is the former COO and CIO for Los Alamos National Bank in New Mexico and CIO and CISO at OmniAmerican Bank in Texas. Prior to banking leadership roles, Eddie was in Technology Risk Management, cyber security, and Enterprise Architecture for IBM, Dell, Grant Thornton, and Blockbuster. Eddie is a board member for ePayAdvisors and is a ...
- Marc AshworthSenior VP CISO, First Bank
Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...
- Frank LeyvaSystems Engineer, Radware
Frank Leyva is a Systems Engineer with Radware, a market leader in cybersecurity with a focus on Network and Application level availability, and security. Prior to that, he was a subject matter expert in network security defense with a leading anti-malware company, performing advanced threat analysis, deep packet inspection, and creating hack...
- Rod AdayCISO, Dexia Crédit Local
Rod Aday is the CISO, Head of Operational Risk and Information Security for Dexia Credit Local, NY Branch. He is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built I...
- Mark NagielCISO, Supreme Lending
Mark is currently serving as the Chief Information Security Officer at Supreme Lending. Prior to Supreme Lending, Mark Served as the CISO at Prime Lending, Head of Information Security at MetroPCS (a T-Mobile division), VP of Information Technology and VP of Information Security at InCharge Institute, Head of NEC Information Security Consulti...
- Beth YoungSr. Security Incident Response Consultant, Aflac
Beth Young has 20 years of cyber security experience. She is currently a Senior Security Incident Response Consultant with Aflac. Beth has previously worked for a financial services company and for one of the Information Sharing and Analysis centers. She just completed her Masters in Applied Data Science from Syracuse University. She has prev...
- Christopher McMahonSpecial Agent, United States Secret Service
Chris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Servi...
- Siam LuuLead Security Architect, Colorado Judicial Department
Siam Luu has worked information security for over 8 years beginning as an analyst, graduating to an engineer, and currently is employed as a security architect. He has worked in both the public and private sectors in a myriad of different careers and locations in both technical and non-technical roles. At present, he has his CISSP certificati...
- Melissa Van BuhlerCybersecurity & Data Privacy Attorney, Focal Law
Melissa’s legal practice focuses on cybersecurity, privacy, and regulatory compliance. Her key strength is helping organizations achieve cyber resiliency through legal and regulatory compliance.
Before joining Newman Du Wors in 2018, she served more than 15 years as a Judge Advocate General officer in the United States Army where she s...
- Quin DeVriesUX Researcher, Automotive Cybersecurity, Mitsubishi Electric Automotive America
Quin DeVries is exploring the realm where technology and human behavior meet to create engaging user experiences. As a curious researcher, he is eager to tackle the challenges of today and the future.
His research background includes topics in design thinking and ideation in engineering, managerial accounting and neuropsychology, and ...
- Alan BerryVice President, Cybersecurity, Centene Corporation
Alan Berry is the Vice President for Cybersecurity at Centene Corporation. He leads the Cyber Incident Response, Security Strategy, and Threat and Vulnerability Management teams, as well as the Business Resilience and Crisis Management teams. Alan brings 30 years of experience in cyber operations, communications, and command and control. Prio...
- Matthew ClaphamDirector of Cybersecurity, GE Healthcare
Matt Clapham is a Directory of Cybersecurity at GE Healthcare. He and his team make products more secure.
- Michael RogersDirector, Cyber Defense, Optum / UHG
Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybersecurity. He is a certified nerd with nearly 20 years of IT experience, and has spent the last decade developing his understanding of information security, business strategy, and communications. Mike earned his MBA from the Carlson School of Ma...
- David StaussPartner, Husch Blackwell LLP
David is the leader of Husch Blackwell’s national privacy and data security practice group. Accredited by the International Association of Privacy Professionals as a Fellow of Information Privacy, Certified Information Privacy Professional/United States, and Certified Information Privacy Technologist, David brings to the table a deep engageme...
- Marc HarwinInformation Security Professional, Harwinet LLC
Marc Harwin is an Information Security Professional with more than 20 years of experience. He has worked to improve Information Security at multiple Fortune 500 organizations with a focus on:
- Security Operations
- Vulnerability Management
- Incident ResponseMarc has a Master of Science in Information Systems from W...
- Preston BukatyGRC Consultant / Privacy & Compliance Specialist, IT Governance USA Inc.
Preston Bukaty is an attorney and consultant working for IT Governance USA. He specializes in data privacy GRC projects, from data inventory audits to gap analysis, contract management, and remediation planning. His compliance background, and experience with operationalizing compliance for a variety of industries, give him a strong understand...
- Jeff WilburTechnical Director, Online Trust Alliance, Internet Society
Jeff Wilbur is the Technical Director of the Internet Society’s Online Trust Alliance. He is responsible for integrating, developing, and extending the OTA initiative within the Internet Society’s overall mission and objectives. He has over 25 years of experience in high technology, all focused on bringing new, industry-transforming communica...
- Selim AissiSVP and CISO, Ellie Mae
Selim Aissi is Senior Vice President & Chief Security Officer at Ellie Mae’. He is responsible for Ellie Mae’s Security Engineering, Operations, Strategy and Information Technology Risk & Compliance. Before joining Ellie Mae, Selim was the Vice President of Global Information Security at Visa. In that role, Selim transformed Visa’s informatio...
- Sudesh GadewarSecurity Engineer, Ellie Mae
Sudesh Gadewar is Sr Staff Security Engineer at EllieMae. Sudesh holds 10+ years of experience in security where passion is in offense and defense of security. Sudesh holds various Security Certifications which he use as attestations to his skillset. His core area of expertise is in product and application security, where he build SSLDC lifec...
- Janelle HsiaDirector of Privacy and Compliance, American Cyber Security Management
Janelle Hsia is a trusted advisor for strategic and tactical decision making within organizations of all sizes. She brings a diverse background with strong leadership, technical, and business skills spanning 20 years of experience in the areas of project management, IT, privacy, security, data governance, process improvement, and software dev...
- Carlin DornbuschPresident, American Cyber Security Management (ACSM)
Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of moder...
- Ethan SailersSolutions Engineer, OneTrust
Ethan Sailers serves as a Privacy Engineer at OneTrust, the largest and most widely-used dedicated privacy management technology platform to operationalize privacy, security, and third-party risk management. In his role, he advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the w...
- Carlos GarciaEnterprise Architect, Office of CIO, Optum
Carlos has specialized in Identity and Access Management systems for the past 20 years. His experience has been in the architecture and implementation of large enterprise and consumer IAM systems. Most of his career has been spent designing and running the large scale IAM systems for UnitedHealth Group. His experience and leadership led him t...
- Tom MuehleisenDirector of Cyber Operations, Norwich University Applied Research Institutes
Tom Muehleisen, CISSP and Retired Army Lieutenant Colonel, is a proven leader in cybersecurity. He is currently the Director of Cyber Operations for NUARI, a non-profit focused on improving our nation’s cybersecurity. He has a rich emergency management background as a National Guardsman, ranging from fighting fires to writing Washington State...
- Dave RuedgerCISO, RMS
Dave Ruedger is the Chief Information Security Officer for Risk Management Solutions based out of Newark, CA. RMS is a premier provider of catastrophe risk models for the insurance industry that help organizations forecast losses for hurricane, earthquake, flood, wildfire, terrorism and cyber risk in a cloud hosted SaaS environment. Dave ho...
- Kevin PaigeCISO, Flexport
Kevin Paige is the Chief Information Security Officer (CISO) at Flexport, provider of the Operating System for Global Trade. Prior to Flexport, Kevin was the CISO at MuleSoft, and brings over 20 years of leadership in delivering solutions and programs that optimize security, compliance and technical operations for both the private and public ...
- John HeasmanCISO, Chegg
John Heasman is the CISO of Chegg, the leading student-first connected learning platform where he is focused on proactive approaches to building secure software. Prior to Chegg, John was the Deputy CISO at DocuSign. He has presented at Black Hat, DEF CON, OWASP AppSec and other industry forums on a diverse range of topics from web application...
- Maarten Van HorenbeeckCISO, Zendesk
Maarten Van Horenbeeck is Chief Information Security Officer of Zendesk since March 2018. He has also been a Board member of the Forum of Incident Response and Security Teams (FIRST) since 2011, and is the Lead Expert to the IGF Best Practices Forum on Cybersecurity. From July 2015 to March 2018, he served as Vice President, Security Engineer...
- Rinki SethiVP & CISO, Rubrik
Rinki Sethi is an information security executive known for change, technical and thought leadership across security and enablement disciplines. She is a veteran in the cyber security domain and throughout her career has built and matured technical security teams across security operations, product security, application security, security arch...
- Gary S. ChanSystem VP & CISO, SSM Health
Gary S. Chan helps organizations innovate, stay secure, and meet compliance using information security as the vehicle. He has architected anti-fraud systems for state agencies, led the information security teams for a large-cap technology company, leads the information security department for a large multi-state healthcare system, owns an inf...
- Jonathan CranHead of Research , Kenna Security
Jonathan Cran is an information security expert based in Austin, Texas. He’s a principal at the strategic consulting firm Pentestify, and founder of the the open security intelligence platform, Intrigue. His passion is security assessment, architecting systems to measure and ultimately prevent security incidents. Currently, he’s building a wo...
- Ann NagelInstitutional Privacy Officer and former UW Associate CISO, University of Washington
Ann Nagel is the Associate Vice Provost for Privacy, University Privacy Officer, and European Union General Data Protection Officer for the University of Washington (UW). She is responsible for developing a cohesive strategy for the humanitarian and legal aspects of privacy across the UW. To help ensure privacy is included in the design of th...
- Lynette CraneFounder & CEO, Quiet Brilliance Consulting LLC
Lynette Crane, MA, is a Minneapolis-based mentor to introvert CEOs, an acclaimed national speaker, corporate trainer, executive coach and author, and Founder of Quiet Brilliance Consulting LLC Trained in psychology, she has more than 30 years' experience in her field. Lynette Crane and Quiet Brilliance Consulting help smart companies who are ...
- Mark DarginDirector, Security & Architecture, Qualfon
Mark Dargin is the Director of Security Architecture at Qualfon Inc., an organization with over 16,000 employees across North America, South America, and Asia. Mark has over 19 years of experience designing, managing, and securing complex WAN and LAN infrastructures. He is a member of the Michigan Cybersecurity Civilian Corps, FBI citizen’s a...
- Swathi JoshiSr. Technical Program Manager - Incident Response, Netflix
Swathi Joshi is a Senior Technical Program Manager, on the Security Incident Response Team at Netflix where she works on advancing the crisis management program and maturing the incident response function. Previously she worked at Mandiant as an Engagement Manager and as an Escalations manager, managing and solving most critical technical eff...
- Sarah LangeCISO, Allgress, Inc.
Sarah has over 23 years of experience in Information Security Management, Risk Management, Third Party Oversight, and Governance in both internal and consulting roles. She is an experienced leader with a background in design, and implementation of GRC and Security programs working with technologies that enable these programs to be effective. ...
- Zach TurnerEnterprise Sales Engineer, Mimecast
Zach joined Mimecast in 2017 as an Enterprise Sales Engineer in Denver, CO. Previously, Zach worked in the enterprise space for AirWatch by VMware, where he focused on cloud-based Mobile Device Management solutions involving mobile security, content management, and email management. Most recently, he worked for Fuze, Inc., a $1 billion UCaaS ...
- Christopher FrenzAVP, Information Security, Interfaith Medical Center
Christopher Frenz is the AVP of Information Security for Interfaith Medical Center, where he worked to develop the hospital’s information security program and infrastructure. Under his leadership, the hospital has been one of the first in the country to embrace a zero trust model for network security. Christopher has also played a role in pus...
- Holger WeeresExecutive Account Manager, baramundi software USA, Inc.
Holger is a seasoned UEM expert with over 20 years of experience in endpoint Automation for company of all sizes. He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company's general challenges and common obstacles in ach...
- Dr. Jason EdwardsCybersecurity Regulatory Testing Lead, USAA
Jason Edwards has over 20 years of IT/Cybersecurity experience and currently works for USAA researching, developing and executing enterprise cybersecurity assurance testing. Jason is a 22-year veteran of the US Army and has served multiple tours of duty in Iraq, Afghanistan, and elsewhere. Jason is currently awaiting final approval for his do...
- Kristie PfosiSr. Manager, Automotive Cybersecurity, Mitsubishi Electric Automotive America
Kristie Pfosi stands at the forefront of one of automotive’s greatest challenges: cybersecurity. A well-respected policy maker and program manager with deep technology expertise, Kristie has been a champion for best practices in cybersecurity for over a decade as a technical intelligence officer at the CIA and as an OEM employee, most notably...
- Amy ChuSr. Director, Automotive Product Security, Harman
Amy Chu is Senior Director, Automotive Cybersecurity at HARMAN, a wholly-owned subsidiary of Samsung Electronics Co., Ltd. HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide, including connected car systems, cyber security solutions, audio and visual products, enterprise automati...
- Jennifer TisdaleAssociate Principal, GRIMM, a Cyber Research, Consulting & Education firm
Jennifer Tisdale is the Associate Principal for Embedded Systems and Advanced Transportation Security Programs at GRIMM, a cybersecurity research and engineering firm. Previously, Jennifer served as R&D Program Manager of Vehicle Product Cybersecurity at Mazda North America. While at Mazda, Jennifer bridged the gap between R&D and Government ...
- KC ConditCISO, G6 Hospitality, LLC
KC Condit has been an information security practitioner and IT leader for 30 years with a diverse resume including hospitality, financial services, retail, and private, post-secondary education. He is currently the CISO for G6 Hospitality, LLC, and is responsible for information security, data privacy, IT risk management, and IT compliance fo...
- Sonja TorsethSr. Training Consultant, Kalles Group
Sonja Torseth is a Senior Training Consultant at Kalles Group. She designs communications strategy and learning experiences with a sharp focus on end-goals: to affect staff behavior change, especially for security risk mitigation. She has more than 10 years’ experience in communications, learning design, and project delivery, and holds a B.S....
- Jeanette RogersDirector of Learning, Kalles Group
Jeanette Rogers is the Director of Learning at Kalles Group, helping companies build world-class security awareness and training solutions. She has over a decade of experience in design, development, and delivery of global corporate technology-based programs and holds a Master's degree from Stanford University.
- Abigail McAlpinePhD Cybersecurity Researcher, Secure Societies Institute - University of Huddersfield
Abigail McAlpine is a CyberSecurity Researcher at the Secure Societies Institute at the University of Huddersfield. Her research is specialised in PII data published on digital systems that leads users to become vulnerable to a number of threats to their identity and safety long-term.
- Andy PurdyChief Security Officer, Huawei Technologies USA
Andy is Chief Security Officer for Huawei Technologies USA, overseeing Huawei USA's cybersecurity assurance program and supporting Huawei’s global assurance program. Andy is the Huawei global lead for the East-West Institute Global Cooperation in Cyberspace Initiative and serves on the Steering Committee of The Open Group Trusted Technology F...
- Elvis M. ChanSupervisory Special Agent, Squad CY-1, National Cyber Center, FBI San Francisco
Elvis Chan is a Supervisory Special Agent (SSA) assigned to FBI San Francisco. SSA Chan manages a squad responsible for investigating national security cyber matters. With 14 years in the Bureau, he is a decorated agent who is recognized within the Intelligence Community as a cyberterrorism expert. SSA Chan was the lead agent on significant c...
- Mary ChaneyAttorney, The Cyber Security Law Firm of Texas
Mary N. Chaney, Esq., CISSP, has over 20 years of progressive experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law.
Ms. Chaney spent several... - Tara SchauflerInformation Security Awareness and Training Program Manager, Princeton University
Tara Schaufler is the Information Security Awareness and Training Program Manager at Princeton University. Tara has been at Princeton University for 15 years, spending the last eight focusing on training and technical communications, and in the past two and a half years has built a robust security awareness and training program from the groun...
- David SherryCISO, Princeton University
David Sherry is the CISO at Princeton University, with university-wide responsibility and authority regarding matters of information security and information risk. He is tasked with the development and maintenance of Princeton's information security strategy, policies and best practices, security training and awareness programs, as well as on...
- Steven LentzHead of Security, Mojio
Steven is the Head of Security, CISSP, CIPP/US. He has presented for SC Magazine and in Las Vegas regarding Cybersecuirty and Security Awareness.
- Paola SaibeneVP, Enterprise Risk Management, American Heart Association
Paola Saibene is the VP of Enterprise Risk Management at American Heart Association. She has been a CIO, CTO, and CSO of large organizations, and has worked in private, non-profit, and government sectors.
- Benjamin BrooksVP, Beryllium InfoSec Collaborative, President of the Board, Cyber Warrior Foundation
Vice President of Beryllium InfoSec Collaborative and Founding Member of Cyber Warrior Foundation. Benjamin is a 19-year Navy veteran of Information Warfare and Special Warfare communities. He serves as the Education Committee Chair for the Cyber Warrior Foundation as well as Chairman of the Board. Benjamin is an (ISC)2 CISSP and Writer for t...
- Abhijit SolankiFounder & Managing Director, Whiteboard Venture Partners
Abhijit Solanki is the founder of Whiteboard Venture Partners, an early stage venture capital firm helping entrepreneurs achieve their whiteboard dreams.
- Ann Marie MortimerManaging Partner, Los Angeles Office, Hunton Andrews Kurth LLP
Mortimer is the managing partner of Hunton Andrews Kurth LLP’s Los Angeles office and co-head of the firm’s commercial litigation practice. Her practice is cross-disciplinary and includes significant business and class action consumer claims litigation experience and crisis management in relation to data breach, consumer related labeling clai...
- Kenneth HartmanInstructor, The SANS Institute
Kenneth G. Hartman is a security engineering leader in Silicon Valley. Ken's motto is "I help my clients earn and maintain the trust of their customers." Ken is an Instructor for the SEC545 Cloud Security Operations course offered by the SANS Institute. Ken has worked for a variety of Cloud Service Providers in Security Architecture, Engineer...
- Scott ReynoldsIndustrial Security Manager, Johns Manville
Scott Reynolds is the Industrial Security Manager at Johns Manville. He has over 14 years of Industrial Engineering experience and is an active member of the OT / IT community. Scott has held leadership roles in the International Society of Automation (ISA) for the last four years and is currently an Executive Board Member. Scott has an elect...
- Chris McLaughlinInformation Security Officer, Johns Manville
Chris McLaughlin is the Information Security Officer at Johns Manville, a Berkshire Hathaway company. JM is leading global manufacturer of insulation, roofing and glass fibers products. Chris has over 20 years of security and infrastructure experience leading the vision for a highly complex manufacturing environment. Chris has a passion for i...
- Stephen DoughertyCyber-Enabled Financial Fraud Investigator, U.S. Secret Service / Firebird AST
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government ...
- Jack Freund, PhDDirector, Risk Science, FAIR Institute
Dr. Jack Freund is a leading voice in cyber risk measurement and management. He is an expert at building relationships to collaborate, persuade, and sell information risk and security programs. Jack is currently serving as Director, Risk Science at RiskLens and previously worked for TIAA as Director, Cyber Risk. Jack holds a PhD in Informatio...
- Nick SelbyDirector, Cyber Intelligence and Investigations, NYPD
Nick is the Director of Cyber Intelligence and Investigations for the New York City Police Department. He serves the NYPD's Intelligence Bureau, helping advise the strategy and policies that govern how the Bureau assesses and manages investigations and intelligence in the Cyber domain. For nearly a decade Nick has served the public as a Texas...
- Serge BorsoCommunity Instructor, SANS Institute
Serge Borso is the founder and CEO of SpyderSec, an organization specializing in penetration testing, security awareness training, and OSINT. He also resides on the board of directors for the Denver OWASP chapter and teaches with the SANS Institute. He is an expert in a variety of information security fields, having served in many roles in th...
- Michael LandeweCo-Founder & Chief Privacy Officer, Avanan
Before cofounding Avanan in 2014, Michael Landewe had over 20 years of internet startup experience, starting with cofounding an ISP in 1996. He was an early employee of Network Physics, an internet traffic performance company that was one of the first technology companies to develop detection response for the Blaster worm. As a research engin...
- Don PetersonSr. National Cybersecurity Specialist, Federal Reserve
Don Peterson is a Sr. National Cybersecurity Specialist for the Federal Reserve System, based out of the Federal Reserve Bank- St. Louis. He is tasked with overseeing the supervision of the largest and most systemically important financial institutions in the United States with assets of $100B+. His duties also include participating in the de...
- Daniel StiegmanCyber Threat Intelligence Engineer, Pathfinder Intel
Daniel is a 15-year Intelligence Professional, with a career in US Army Intelligence and the National Geospatial Agency. His primary focus has been in Counter-Terrorism, Asymmetrical Warfare, and Intelligence Analysis methodology. Daniel was a national-level instructor in All Source Intelligence Analysis and has written several published whit...
- Craig ReedsCybersecurity Compliance Manager, Electric Power Systems International
Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Complia...
- Tina LaCroix-HauriPresident and Practice Leader, CISO Advisory Services, Bradford Garrett Group, Former CISO for City of Chicago and Discover Financial
Tina LaCroix-Hauri is the President and Practice Leader, CISO Advisory Services, for Bradford Garrett Group, a full service security professional services firm. Formerly the CISO for the City of Chicago, Global CISO for AON, CIO of Kudoz.com, and Director of Enterprise Risk Management for Discover Financial Services, Tina brings a considered ...
- Rhia DancelInformation Security Lead Auditor, NSF International
Rhia is an ISO 27001 and 9001 Lead Auditor and OSINT PenTester for NSF and has previously held several auditing and technical positions in the information security and Pharma quality sectors. Rhia has completed technical writing work and audits for NSF throughout North America, working directly with customers onsite and remotely developing se...
- Tony GilesInformation Security Lead Auditor, NSF International
Tony is an ISO 27001, ISO 20000 and ISO 9001 Lead Auditor and OSINT PenTester for NSF. Currently, Tony is the Director of Custom Audit Programs, also having served as Director of Operations, Director of Business Development, and Service Delivery Manager. Tony has conducted audits globally for over 10 years and worked on large-scale security i...
- Merlin NamuthCyber Risk Advisory Board Member, Pepperdine University
Merlin Namuth has spent over 20 years focused in security. His experience includes building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions. Namuth serves on the cyber risk advisory board at Pepperdine Univers...
- Alexis WombleSr. Threat Intelligence Analyst, BAE Systems
Alexis Womble is a Sr. Threat Intelligence Analyst at BAE Systems. Previously, she was a Cybersecurity Intelligence Analyst at Express Scripts, where she interned for a year in an EOCC automation development role, Attack Simulation role, and an Intelligence role. She is also a recent grad from Missouri Baptist University, where she can still ...
- Linda MarconeSr. Director, Information Security, Serta Simmons Bedding, LLC
Linda Marcone has 15+ years of Information Security, Governance, Risk & Compliance, and Fraud Prevention experience. Throughout her career, she has built and transformed Information Security Programs and Teams, worked with FBI & NCFTA to take down an international fraud ring (APT), promoted diversity in the workplace, and acted as a mentor. ...
- Samuel BlaneyDirector Cybersecurity, Georgia Technology Authority
Sam is the Director of Cybersecurity & Governance Risk and Compliance (GRC) at GTA and is a Chief Warrant Officer (CW3) retired. Georgia Technology Authority (GTA) Office of Information Security (OIS) is the premier strategic partner for all state and local government organizations in support of a strong State Cyber Security posture. GTA OIS,...
- Adam ShostackLeading Expert on Threat Modeling, Shostack & Associates
Adam is a leading expert on threat modeling, and a consultant, entrepreneur, technologist, author and game designer. He's a member of the BlackHat Review Board, and helped create the CVE and many other things. He currently helps many organizations improve their security via Shostack & Associates, and advises startups including as a Mach37 Sta...
- William LidsterSr. Manager, Information Security and Compliance, AAA Washington
Dr. William Lidster has more than 25 years of experience in IT and information security leadership in government, retail, insurance, finance, healthcare, and the utility industries. He received is PhD in Information Security and Assurance from Capella University and has published in IEEE and other professional journals. Dr. Lidster focuses hi...
- Bryce VerdierSr. Software Engineer, GroupOn
Bryce Verdier (CISSP, CEH) is currently a Senior Software Developer at GroupOn. In previous roles, he’s also been a Systems Engineer with an automation and DevOps minded focus, and an Information Security Engineer, focusing on host-based security.
- Tamika Albert-WilliamsUndergraduate IT Program Adjunct Faculty, Capella University - School of Business and Technology
With a passion for addressing the human element of cybersecurity, Tamika Albert-Williams has 10+ years’ experience in information technology and security. She began her career in IT project management. She is currently a Management Consultant and adjunct IT program faculty at Capella University. She specializes in GRC; and IS program strategy...
- Austin RappeportBlue Team Coordinator, Zurich Insurance Group
Austin Rappeport is a Threat Defense Consultant working for Zurich Insurance on their global cybersecurity team. His team is responsible for managing Zurich's SIEM and integrating Zurich's security toolkit to allow for the automated detection of suspicious or malicious activity across Zurich's network. Previously, Austin worked for the Federa...
- Chris CarlisRed Team Coordinator, Zurich Insurance Group
Chris Carlis is a member of the Zurich Insurance Group Red Team and has built a career helping organizations become more secure through offensive testing. Locally, Chris is a community organizer in the Chicago area and helps coordinate several monthly gatherings designed to connect like-minded information security professionals. In his spare ...
- Ed SnodgrassRegional Security Principal, Insight Cloud + Data Center Transformation
Ed has over 20 years of experience in information security, supply chain security, risk, compliance and mergers and acquisitions. Prior to joining Insight, he served as Chief Information Security Officer for Secure Digital Solutions, a consulting firm providing cyber security program strategy, enterprise risk and compliance, and data privacy....
- Paul RussoEnterprise Security Engineer, Tenable
Paul is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable he helps organizations reduce risk due to Cyber Exposure.
- George SchultzeSupervisory Special Agent, Cyber Crime Task Force , Federal Bureau of Investigation
Special Agent George Schultzel entered on duty in July of 2010 and was assigned to the New York Field Office. Over the course of his career, SA Schultzel has investigated complex criminal computer intrusions, nation state adversarial action, and cyber terrorism. SA Schultzel is currently serving as the Supervisory Special Agent of the Cyber C...
- Joseph ThackerSr. Security Consultant, Crowe
Joseph Thacker, CISSP, is a Senior Staff Member in Crowe’s cybersecurity practice. With experience in software development, automation, and cybersecurity, he is serving in Security Engineer and Analyst roles to assist in the development and maturing of one of Crowe’s cybersecurity programs. He has a Bachelor’s degree in Computer Science and a...
- Tim ChapmanDirector of Security Assurance, ADP
Tim Chapman serves as ADP’s Director of Security Assurance, leading a team that provides security assurance to ADP’s North American clients. Prior to ADP, Tim’s expertise includes over 17 years of information security, operational risk management, business management, and process improvement experience. Additionally, Tim has been involved wit...
- Jeff WheatDirector, Solutions Engineering, @RISK Technologies, Inc.
Jeff is the Director of Solutions Engineering at @RISK Technologies as a Technical Director sitting at the nexus of Sales, Deployment, Operations, and Product Development. Interacting directly with customer C-Suite and Technical Staff to drive sales, customer satisfaction, and innovation back into the platform. Jeff provides operational and c...
- Tim CallahanSVP, Global Chief Security Officer, Aflac
Timothy L. Callahan, CISSP, CISM, CRISC Senior Vice President, Global Security; Chief Security Officer Tim Callahan joined Aflac in 2014, bringing more than 30 years of experience in information and physical security, business resiliency and risk management. He was promoted to his current role in January 2016, where he is responsible for dire...
- Michael JonesAttorney, Trusted Counsel
Michael is a corporate attorney with a strong background in intellectual property and business-oriented technology. As an Attorney with Trusted Counsel, Michael handles licensing and commercial agreement issues. He advises clients on IP and technology licensing, outsourcing and services agreements. He is responsible for negotiating complex te...
- Dominick FrazierSecurity Awareness & Communications Manager, Tenet Health
Dominick Frazier is a security professional with over 13 years of security experience with his current role being in Information Technology/Cyber-Security. In his current role he serves as the Security Awareness & Communication Manager responsible for the conversation around security between technical and non-technical teams, which extends to...
- David AllenCISO, State of Georgia - Georgia Technology Authority
David Allen is the Chief Information Security Officer for the State of Georgia. He leads GTA’s Office of Information Security, which unifies information security responsibilities for the state’s IT enterprise, the Georgia Enterprise Technology Services (GETS) program, and GTA. Prior to joining GTA in 2019, David served as the Chief Informatio...
- Graeme PaynePresident, Cybersecurity4Executives
Graeme Payne has over 30 years' experience in security and information technology risk consulting and IT management. He spent the majority of his career at Ernst & Young prior to joining Equifax in 2011 as VP of IT Risk & Compliance. At the time of the 2017 Equifax data breach, he was CIO of Global Corporate Platforms. He now consults with Bo...
- Lori AnelloVP, Threat Management & Cybersecurity Operations, GE Aviation
Lori Anello is an adaptive leader with broad background in leading large enterprise teams in the areas of infrastructure, security technology, application architecture, and business solutions. She started her career working for the National Institutes of Health and then moved into private industry in the areas of consulting and manufacturing ...
- Kristen EllisSr. Director, Cybersecurity, Clinical Reference Laboratory, Inc.
Kristen Ellis is the Security Officer for Clinical Reference Laboratory, Inc. in Lenexa, KS. She obtained her Certified Information Systems Security Professional (CISSP) designation in 2012 and has over 23 years of Information Technology experience, twelve years focused in security. Mrs. Ellis has been instrumental in the development of the s...
- Moderator: Beth StrobelSales Director, Onspring
Beth Strobel began her career at a global aerospace and defense company, maintaining responsibility for the ethics and legal compliance training and awareness programs. She's since worked in both technical and sales roles at technology companies providing solutions for cybersecurity and governance, risk and compliance. Beth currently serves a...
- Mike ShineDirector, Systems Engineering, Mimecast
Mike has over 15 years’ experience designing and implementing IT security solutions for large enterprises, and he’s currently focused on making email safer for businesses. He actively participates in combating existing cyber threats and researching new threats out of Mimecast’s Chicago office. Mike holds a degree in Computer Engineering from ...
- Mario ChiockFellow & CISO Emeritus, Schlumberger
Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the
company’s worldwide, long-term cyber security strategy. He is recognized for his leadership... - Brandon BradshawSales Engineer, Trend Micro
Brandon has been with Trend Micro for three plus years, and has been in the IT Industry since the late 1990s. As a Sales Engineer, it's his passion to be the technical bridge between sales and customers.
- Vinay PuriNational Director, Cloud Security, Deloitte
Vinay is a ex-veteran and a leader in Cyber Security with two decades of experience. He currently leads the National Cloud Security practice for Deloitte Canada. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organization in architecting complete security framework....
- Bryan OrmePrincipal & Partner, GuidePoint Security
Bryan Orme leads the Information Assurance consulting organization; which includes Application Security, Cloud Security, Governance, Risk, and Compliance Services, Threat and Attack Simulation, Incident Response and Forensics. Additionally, Bryan leads the internal IT and Information Security teams as well as the Project Management Office and...
- Susan BereznyDirector, Information Security, Royal Canadian Mint
Susan Berezny is the Director of Information Security at the Royal Canadian Mint. She is responsible for developing a cybersecurity strategy and managing a risk-based security program aligned with business objectives. Prior to joining the Mint, Susan was with The Ottawa Hospital for 23 years in several roles, including Information Security Of...
- Bob GordonExecutive Director, Canadian Cyber Threat Exchange
Robert W. (Bob) Gordon is the Executive Director of the Canadian Cyber Threat Exchange (CCTX). The CCTX is Canada’s private sector organization for the sharing and analysis of cyber threat information, and enabling collaboration across all sectors. Most recently, Bob was a Director, Global Cyber Security at CGI. Prior to this, he enjoyed a lo...
- Laura FeyPrincipal, Fey LLC
Laura Clark Fey, Esq., PLS, CIPP/US, CIPP/E, CIPM, FIP: Laura Clark Fey, one of the first twenty-seven U.S. attorneys recognized as Privacy Law Specialists by the International Association of Privacy Professionals (IAPP) (ABA-accredited), leads Fey LLC, a global data privacy and information governance law firm. She and her team help organizat...
- Samuel SuttonComputer Scientist, FBI, Houston Cyber Squad
Samuel Sutton is an FBI Computer Scientist. Since 1992 he has worked in Headquarters and Field Offices across the country. He is currently assigned to a Cyber Squad of the Houston Office. Specializing in Computer Security, Network Forensics, "Enhanced Network Capabilities", and Information Security Management, his skills have been applied to ...
- Andrew MatushekSenior Special Agent, United States Secret Service
Andrew Matushek is a Senior Special Agent (SSA) with the United States Secret Service. He is also the Assistant Director of the Kansas City Electronic Crimes Task Force (ECTF) and has over 19 years of experience. He has previously served in Arizona, California, and Washington, DC, prior to landing in Kansas City. SSA Matushek is current activ...
- Tim MillerLead Cybersecurity Consultant, Trend Micro
Tim has over 10 years’ experience in Information Security and 33 years working with computer technology. He started his career with the Apple IIe in his first computer class, through achieving his master’s degree in Network Communications Management. Tim has been with Trend Micro for three years, and his experience in Information Security in...
- Intel Analyst from the FBI
- Lynn WatsonDirector of Compliance and Risk Management, Dinsmore & Shohl LLP
Lynn is the Director of Compliance & Risk Management for Dinsmore & Shohl, a national law firm with 1,300 attorneys and employees in 26 offices. Lynn oversees the cybersecurity team and is responsible for all firm security policies, procedures, technology, and initiatives, including the incident response program.
- Eric BucherSolutions Architect, Cequence Security
Eric Bucher has over 15 years of experience in the security industry with a technical concentration in financial fraud, advanced persistent threats, forensics, exfiltration, DLP, and overall attack surfaces.
- Eugene KesselmanFounder and CEO, TapJets
Eugene Kesselman is Founder and CEO of TapJets, the on-demand private jet charter company headquartered in Houston, Texas. Since 2015 the company has been using blockchain ledger technology to conduct its business and since 2016 became the first private aviation company to instantly accept cryptocurrency as a form of payment for its services....
- Gustavo CoronelSr. Cloud Security Architect, Check Point Software Technologies
Gustavo (Gus) Coronel is a Senior Cloud Security Architect with Check Point Software Technologies and has been involved with network security for over 25 years. His first foray into network security was serving as the first Firewall Administrator at the US Department of Transportation in 1994. Intrusion Detection, Vulnerability Assessments, P...
- Fred KwongCISO, Delta Dental Plan Associates
Fred Kwong is currently the CISO for Delta Dental Plans Association. He is a highly recognized thought leader in security and is often asked to speak and chair at national/international security conferences. Fred serves on several advisory boards and is often asked to consult on matters of security and leadership. He currently holds the CISSP...
- Joseph RogalskiSr. Director, Solution Engineering, eSentire Inc.
Joe Rogalski is an accomplished Technology and Security Professional with over 20 years of experience developing world-class programs and delivering technology-based solutions. He has served in a variety of technical and management positions during his career, including Security Strategist at Symantec and Information Security Officer at Firs...
- Axel PetersExecutive Sales Manager, baramundi Software USA Inc.
Axel Peters is Executive Sales Manager for baramundi software USA Inc., headquartered in Framingham, MA. Axel has his degree in IT Management and over six years of experience in professional Endpoint Management. In this time, he has advised over 250 customers from small businesses to global enterprises in Europe. He is well aware of the chall...
- Tasha PhelpsPresident & CEO, Phelco Technologies, Inc.
Protecting the integrity of information continues to be a strategic focus within Tasha's cybersecurity efforts. She has seen the impact of businesses being compromised by malicious threats, and shares how building contingency plans can be of value. Her approach is to align business processes with technical solutions to create powerful plans f...
- Zaki AbbasVP & CISO, Brookfield Asset Management
An accomplished Information Security and Technology leader with proven ability to develop and align strategies with business priorities and establish strong, trust-based partnerships across executive teams, key stakeholders and board members. Zaki has extensive experience in the insurance, real estate, banking, infrastructure, energy, investm...
- Chase CresgySr. Healthcare Cybersecurity Consultant, Crowe LLP
Chase Cresgy attended IUPUI and graduated with a BS in CIT concentrated in information security. He also holds the Security+ and CySA+ certifications. Information/cybersecurity has always interested Chase, and he believes it will be one of the greatest challenges society faces over the next decade. The world of cybersecurity is a fast, ever-c...
- Jay RobinsonDirector of Cyber Operations, BlackRock
BlackRock's Cyber Operations team manages the global 24x7 operations center responsible for cyber monitoring, incident response, cyber intelligence, cyber forensics, and vulnerability management.
- Bob RudisSr. Director, Chief Security Data Scientist, Rapid7
Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Bre...
- Joel WeinsteinPresident, Greater Boston Chapter, Association of Continuity Professionals
Joel Weinstein, a native of Washington DC, moved to Boston in 1977, formed his first company in 1986, and currently is in his second term as president of the Greater Boston Chapter of ACP. He has taught at Boston University, Northeastern University, Benjamin Franklin Institute, and ITT Technical Institute for over 40 years. Joel is interested...
- Adib SarakbySr. Sales Engineer, Mimecast
Adib Sarakby joined Mimecast as a Service Delivery and, after a year, was promoted to a Sales Engineer role. He works closely with the Sales, Marketing, and Educational teams to continually enhance Mimecast's products and promote Cyber Resilience. Email Security is Adib's passion, and as the threat landscape evolves, he splits his time betwee...
- Jonathan VillaPractice Director, Cloud Security, GuidePoint Security
Jonathan Villa has 19 years of experience as a technology consultant including 18 years of direct information security experience. For over 10 years Jonathan consulted to a large municipality across several competencies including PCI compliance and training, application architecture and security, vulnerability management, secure coding, web a...
- Antona DumasAssociate, XPAN Law Group
Antonia M. Dumas is an associate at XPAN Law Group, a certified Women’s Business Enterprise (“WBE”) and Women Owned Small Business (“WOSB”). At XPAN, Antonia works with clients to create proactive, streamlined, and global approaches to cybersecurity and data privacy. She performs audits, assessments and gap analysis of a client’s existing con...
- Les StevensVice President, Information Security, Equifax Canada
As Vice President of Information Security at Equifax Canada, Les Stevens is responsible for the identification, assessment, and mitigation of inherent, residual, regulatory, security, and compliance risks specifically associated with the business operations of Equifax International business units. His experience building and maintaining infor...
- Heather BearfieldIT Risk and Assurance Services Leader, Marcum Technology
Heather B. Bearfield is a principal in the firm’s Boston office and serves as the IT Risk and Assurance Services leader. She is also a member of the national Real Estate, Alternative Investment, Healthcare, and Financial Services Industry groups. In addition, Ms. Bearfield chairs the Marcum Diversity & Inclusion Committee. She has extensive e...
- Chris BradenVice President, Global Channels & Alliances, eSentire
Chris Braden is a veteran sales and channel executive, bringing over 20 years of experience building, leading, and executing successful programs around the world. In his current role as the Vice President, Global Channels and Alliances, he is responsible for eSentire's global channel program, overseeing strategic partner recruitment, internat...
- Mike FabricoSr. Technical Sales Director, TrapX Security
Mike Fabrico is a security expert that has worked for NASDAQ and has over 20 years of industry experience in implementing, architecting, and maintaining critical infrastructure networks. He is also an advisory board member on a number of successful cybersecurity companies worldwide for APT/malware, network intrusion, threat intelligence, digi...
- Rosemary ChristianFounder & President, Philadelphia Women and Cyber Security
Rosemary Christian is the founder and president of the Philadelphia Women & Cyber Security. She has worked in the cybersecurity industry for the last 3 years at AccessIT Group assisting customers with evaluations of their current cybersecurity programs to help them mature their overall security posture. She has a demonstrated passion, knowled...
- Parker CrookSenior Sales Architect, SentinelOne
Parker Crook has been in the security industry for over 10 years across multiple verticals. He has experience working on both blue and red teams and has been asked to speak at various regional security conferences. Some of his speaking engagements have covered topics such as purple-teaming, wargaming, orchestration, and his own research. Park...
- Matt WilsonChief Information Security Advisor, BTB Security
Matt Wilson is the Chief Information Security Advisor for BTB, based in southeastern Pennsylvania. Matt has spent his entire career in IT and has over 14 years of experience within Information Security. Throughout his career, Matt has fostered the development of assessment methodologies, toolsets, and techniques for the delivery of security a...
- Bruce FormanCISO, UMassMemorial Health Care
Bruce has several degrees including an MBA in Biotechnology and Health Industry Management. Prior to his current position at UMass, he held other IT Management positions, focusing on Information Security, Risk Advisory, and Security Strategy and Policy, as well as offering consultative services. Bruce is a past president of the Information Sy...
- Brian MinickCISO, Fifth Third Bank
Brian Minick is CISO at Fifth Third Bank. Brian has responsibility for the bank’s information protection program. Brian is a noted speaker and published author. He brings 20 years of technology and cybersecurity leadership and experience to this position. Prior, Brian was VP of Managed Threat Services at Booz Allen Hamilton following the acqu...
- Brian TobiaConsulting Systems Engineer, Cisco
Brian has been an IT practitioner, consultant, and pre-sales engineer for 15 years, focusing on network and virtualization security. He currently is a consulting systems engineer covering cloud security solutions at Cisco. He holds a CISSP along with other industry certifications.
- Andrew DuttonCISO, DuHart Consulting
Strategic Global Cybersecurity leader that is accomplished in complex multinational organizations. Strong interpersonal skills and communicator. Extensive experience in cybersecurity, compliance, governance, architecture. Expert in deployment of enterprise standards, processes, and policies. Strong project management experience. Dedicated and...
- Christopher StephenSenior Sales Engineer, SentinelOne
Chris Stephen is a Senior Sales Engineer at SentinelOne. Chris has over a decade of experience in the IT field, from his initial startup where he designed end-phase punch management systems for commercial and residential builders, to his work at Apple to his work in the medical industry. Chris is a ‘Jack-of-all-trades’ when it comes to IT.
- Grant AsplundChief Cyber Security Evangelist, Check Point Software Technologies
For more than 20 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber attacks in an increasingly complex world. As Check Point’s chief evangelist he travels the world enthralling audiences with his passionate and relational storytelling at conferences like RSA and Next100 CI...
- Kevin McPeakPrincipal Cyber Architect, U.S. Federal Government, Symantec
Kevin McPeak is Symantec’s Principal Cyber Architect for the U.S. Federal Government. In this capacity, he serves as the technical SME for eight distinct enterprise defensive technologies. In addition to his CISSP and ITILv3 certifications, Kevin also holds two Masters of Science degrees from Johns Hopkins University and Virginia Tech. In add...
- Ondrej KrehelCEO and Founder , LIFARS
Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise. He actively participates in many high-profile engagements around the world whereby his proprietary methodology is leveraged to achieve the most rapid root-cause analysis and remediation.
He’s the former Chief Information Security Officer ... - Katie CreaserSVP and Cybersecurity Practice Lead, Affect
Katie is a Sr. Vice President, Cybersecurity Lead at Affect, where she provides counsel to clients that are looking to bring PR and social media into their communications program as part of a thoughtful, holistic strategy. Katie is passionate about helping brands of all shapes and sizes find unique and creative ways to tell their story. She w...
- Seth RobertsonPrincipal, Nocturn Security
Seth is a dynamic information security leader with fifteen years’ experience building best-in-class programs – including launching a security startup, managing NASA’s incident response program, founding the Security Operations Center at a top Wall Street firm, and leading the security program for a global tech company. His work has been used ...
- Sandra FathiPresident, Affect
Sandra Fathi has spent the last 20 years helping technology, healthcare and professional services companies achieve their goals. As President and Founder of Affect, a public relations, marketing and social media agency, Sandra has successfully led the company with consistent growth since the agency’s inception in 2002. Sandra’s commentary has...
- Jimmy MillsSenior Solutions Architect, SSH.COM
Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.
- Kenneth OlmsteadInternet Privacy & Security Analyst, The Internet Society's Online Trust Alliance
Kenneth (Kenny) Olmstead is the Internet Security & Privacy Analyst that helps research, analyze, write, and review technical content relating to The Internet Society's Online Trust Alliance issues—identity, security, privacy, and data stewardship. He also helps with communications and engages the OTA Committees on technical and techno-policy...
- Jodi DanielsFounder & CEO & Privacy Consultant, Red Clover Advisors, LLC
Jodi Daniels, founder of Red Clover Advisors, is a Certified Informational Privacy Professional (CIPP/US) with more than 20 years of experience helping a range of businesses from solopreneurs to multi-national companies. Red Clover Advisors has helped hundreds of companies create privacy programs, achieve GDPR compliance, and establish a secu...
- Tasneem NipplewalaVP, Information Security; MSIA, CISSP, CCSP, Eastern Bank
Tasneem is a Senior Security Architect at Eastern Bank, the largest and oldest mutual bank in the country with $11B in assets. As part of her responsibilities, she provides internal clients security services when implementing new initiatives across the bank and insurance company to ensure the solutions are built with the highest security stan...
- Jason BarrCIO & CISO, Aptean
Jason is currently the CIO and CISO of Aptean, leading the IT, security and governance, cloud hosting services, and business systems teams. He's been in the technology sector for over 20 years and has a passion for taking things apart and making them better.
- Jeremy RuckerAttorney, Spencer Fane LLP
As a cybersecurity and data privacy attorney in the Dallas office of Spencer Fane LLP, Jeremy Rucker has assisted companies of all sizes in responding to data security and privacy incidents. The expertise of Jeremy and his Spencer Fane colleagues cover several industries including healthcare, banking and finance, insurance, energy, transporta...
- Dr. John OpalaVP, IT Security, McCormick
Cybersecurity thought leader with over 19 years of technical and leadership experience in multiple disciplines.
- Fred GordyDirector of Cybersecurity , Intelligent Buildings, LLC
Fred Gordy is the Director of Cybersecurity at Intelligent Buildings, LLC and is a nationally recognized thought leader, speaker and expert in building systems cybersecurity specializing in organizational and technical vulnerabilities. He has over 20 years of industry experience including information technology and building controls systems. ...
- Tom TollertonSr. Manager, IT Advisory, DHG
Tom has 15+ years of experience in the IT industry, and has extensive experience performing SOC 1 and 2 examinations and reporting, cybersecurity risk assessments, PCI compliance assessments, and system security assessments. Tom is one of DHG’s PCI Qualified Security Assessors and has completed multiple Reports on Compliance for PCI Level 1 m...
- Bryan BechardFractional CISO, CISO4hire
Bryan has been working in InfoSec for 20 years as an individual contributor and management of security professionals. Currently, he is the CISO of an auto finance company and Board member of the (ISC)2 Philadelphia chapter. Current certs: CISSP, CSSLP, CRISC.
- Velu JeganathanVP, Security Engineering Solutions Team, State Street Corporation
Velu Jeganathan has more than 20 years of IT experience, most of which is around Information Security. He has been extensivly involved in various roles in penetration testing, vulnerability management, security project consulting, and developing security processes, with an emphasis on integrating security into the project lifecycle.
- Vince FitzpatrickCyber Risk Program Manager, Christiana Care Health System
Vince Fitzpatrick has experience greater than some and less than others. Currently he is the Cyber Risk Program Manager at Christiana Care Health System (CCHS), one of the largest health care providers in the mid-Atlantic region, serving all of Delaware and parts of PA, MD, and NJ.
- Jim MenkevichSr. Sales Engineer, Netskope
Jim Menkevich is an Information Security, Privacy, and Risk Management professional with 19+ years of experience. Through his career, he has led teams in Cybersecurity, Enterprise Architecture, Systems Integration, and Application Development. Jim specializes in applying methodologies, frameworks, and ideas outside of the intended domain, whi...
- Joe WalshM.A.C.J. Program Director and Assistant Professor of Criminal Justice/Computer Science, DeSales University
Joe Walsh teaches digital forensics and computer security at DeSales University. He previously worked as a senior security consultant where he performed security assessments, conducted penetration testing, and responded to computer security incidents. He has been a police officer for 13 years and is a former member of the ICAC Task Force and ...
- Charles SgrilloProfessor of Cybersecurity, Drexel University
Charles Sgrillo is an adjunct professor of cybersecurity at Drexel University, teaching on topics such as IT Auditing, Cybersecurity, Penetration Testing, and Computer Forensics. During his time as a principal consultant, Charles has worked with over 50 businesses to implement the NIST Cybersecurity Framework. Along with teaching at Drexel Un...
- Christian EspinosaCEO, Alpine Security
Christian Espinosa is Alpine Security's CEO/Founder and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a US Air Force veteran with a BS in Engineering from the US Air Force Academy and MBA from Webster University. Christian holds multiple patents on cyberse...
- Daniel SmithHead of Security, Emergency Response Team, Radware
Daniel Smith is the Head of Security Research for Radware's Emergency Response Team and provides executive insight for SC Magazine. Daniel's research mainly focuses on network and application based vulnerabilities. As a white-hat hacker, his expertise in criminal tactics, techniques, and procedures (TTP) helps Radware develop signatures and m...
- Roy WattanasinInformation Security Leader, Healthcare Industry
Roy Wattanasin is currently a healthcare information security professional. Additionally, Roy is an avid speaker who has spoken at many conferences and webinars. Roy also enjoys data forensics & incident response and building security in. He is heavily involved with many computer security groups including OWASP Boston, ISSA and the local comm...
- Ron ReidyAudit Analytics Leader, Wells Fargo
Ron has been working in IT for over 30 years. Starting as a software engineer writing database programs on CP/M, MSDOS, VAX/VMS, and UNIX in C, Pascal, VAX/VMS assembler, and FORTRAN. After 15 years, he switched into a database administration role, managing large Oracle databases as well as smaller SQL Server and Sybase databases. Ron became ...
- Ernesto DiGiambattistaCEO & Founder, CYBRIC
Ernesto DiGiambattista founded CYBRIC to enable organizations to more easily, confidently and holistically answer the question “How secure are we?” Prior to founding CYBRIC and developing the CYBRIC Continuous Application Security Platform, Ernesto was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, responsibl...
- Michael BrownRear Admiral, U.S. Navy (Ret.), President, Spinnaker Security LLC; ACSC Board Clerk
Michael Brown, Rear Admiral, United States Navy (Retired) is the Founder and President, Spinnaker Security LLC, a cybersecurity consulting business focused on understanding, identifying and mitigating business risks associated with cybersecurity. Additionally, Brown brings executive leadership, including crisis management, from both public an...
- Salar Atrizadeh, Esq.Attorney at Law, Law Offices of Salar Atrizadeh
Salar Atrizadeh, Esq. is an attorney and IT expert with an extensive background in technology and computer information services. He has conducted seminars before legal and non-legal organizations on similar topics. Salar is licensed to practice in the State of California, District of Columbia, and the United States District and Bankruptcy Cou...
- Matt ConnorsIdentity and Access Management Program Manager, University of New Hampshire
Matt Connors is the Identity and Access Management Program Manager for the University of New Hampshire. His role sits at the cross section of enterprise infrastructure, client experience, and security; as well as leading IAM strategy and practice for a Tier 1 Research University. Matt enjoys collaborating and sharing knowledge with technolog...
- Edward DavisPresident & CEO, Edward Davis, LLC
Davis has been in law enforcement for 35 years. He served as the Police Commissioner of the City of Boston from December 2006 until October 2013. He administered 6 world championship celebrations and led the highly successful response to the Boston Marathon bombing. Prior to that, Davis was the Superintendent of the Lowell Police Department, ...
- Sean BaggettSr. Director, Information Security, Blue Cross Blue Shield of MA
Sean Baggett is the Senior Director of Information Security at Blue Cross Blue Shield of Massachusetts. After spending 10 years as a United States Naval Officer, Sean has worked exclusively in Information Technology and Cybersecurity. He has held senior leadership positions at Boston Medical Center & Massachusetts Eye and Ear Infirmary before...
- Bryan ScovillManager, Telecom & Network Ops, University of New Hampshire
Lead of the network security team at the University of New Hampshire for 18 years. Areas of focus include development and architicture in the UNH networking enviroment.
- Hazel CerraSenior Special Agent, United States Secret Service
Hazel Cerra is a Senior Special Agent (SSA) with the United States Secret Service out of the Philadelphia Field Office assigned to the Financial Fraud Division. She has over 19 years of experience in protection and investigations. She began her career investigating counterfeit currency, identity theft and credit card fraud. In 2009, she was t...
- Anahi SantiagoCISO, Christiana Care Health System
Anahi Santiago is the Chief Information Security Officer at Christiana Care Health System, the largest healthcare provider in the state of Delaware. Prior CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. In her role as CISO she has overall responsibility for the organization's cyber...
- Craig NewellManager, Information Security, Ontario Cannabis Store
Craig is in the business of mitigating privacy and data loss disasters. Constantly keeping abreast of new challenges and developments in the industry, he has evangelized risk-based security and control through the banking and utility industries, private business, governmental agencies, and now, online sale of a really exciting product. A beli...
- Bruce SchneierSecurity and Cryptography Expert and Author
Bruce Schneier is an internationally-renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the best-seller "Click Here to Kill Everybody"—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over ...
- Arvin VermaCybersecurity Strategist, InfraGard National Sector IT Subject Matter Expert
Arvin Verma is a highly motivated and talented cybersecurity professional with over 8 years of experience across a diverse set of cyber domains and industries such as Aerospace and Defense, Technology, Financial and Insurance, Commercial Retail, Manufacturing and several more. He has filed more than 4 invention disclosures in the field of cyb...
- Samantha DuttonPresident , DuHart Consulting
Dr. Samantha Dutton is the President of DuHart Consulting where she works with her husband in addressing cybersecurity business needs, as it impacts the human factor. She is also an Associate Dean and the Director of the Social Work Program in the College of Social and Behavioral Sciences at the University of Phoenix. She is a Licensed Clinic...
- Calvin NoblesCybersecurity Policy Fellow, New America Think Tank, New America
Dr. Nobles is a Cybersecurity Scientist and practitioner with more than 25 years of experience. He teaches cybersecurity at several universities. He recently retired from the Navy and is currently employed in the Financial and Services Industry. Dr. Nobles is a Cybersecurity Policy Fellow with the New America Think Tank. He authored a book on...
- Joseph FontecchioDirector of Infrastructure and Database Services, The University of Massachusetts
Joe is currently the director of infrastructure and database services for The University of Massachusetts Information Technology Services department, leading a team of security professionals who support infrastructure and applications used to host shared services. He holds a master’s degree in Information Technology from Worcester Polytechnic...
- Girish ChiruvoluDirector, Information Security Risk Management, Experian
Dr. Chiruvolu is a CISSP/CISM and has spent several years in the security industry and in particular Finance/e-Commerce and Enterprise industries on cloud/SaaS technologies. He is currently Director Information Security and risk management, and has lead several successful programs on several fronts of Information Security, Risk management and...
- Helen PattonCISO, The Ohio State University
Helen is the Chief Information Security Officer at The Ohio State University. She is part of the Enterprise Security team, and oversees Security, Privacy and Disaster Recovery across the university. Helen believes Security is a critical element of data integrity. She works to improve diversity in STEM, and mentors anyone needing career develo...
- Rori Boyce-WernerInformation Security Compliance Program Manager, University of New Hampshire
Rori Boyce-Werner is currently the Information Security Compliance Program Manager for the University of New Hampshire, where she was previously the Associate Director of IT Client Services and Identity and Access Management Service Owner.She holds a Bachelor’s of Science in Business Administration and is working towards her Masters of Cybers...
- Michael GoughFounder, IMF Security
Michael is a Malware Archaeologist, Blue Team defender, Incident Responder and logoholic. Michael developed several Windows logging cheat sheets to help the security industry understand Windows logging, where to start and what to look for. Michael is co-developer of LOG-MD, a free tool that audits the settings, harvests and reports on malicio...
- James BairdFounder and Manager, Cybersecurity Management Consultants, LLC
As a CISO, James has seen his role oversee all the programs and processes involved with Information Security, Operational Security, Technology Risk Management, and IT Compliance, . He has designed and implemented security programs using the ISO 27001, NIST RMF, NIST ICTSCRM, NIST CSF, and ITIL. James holds a Master of Science degree in Inform...
- Bryan InagakiSr. Director, Cybersecurity Risk Management & Solutions, Thermo Fisher Scientific
Bryan's path to information security was anything but direct, and he took a few detours in the worlds of small business, federal law enforcement and financial services before finding himself fully entrenched in the industry. As a physical security professional first and an information security professional second, Bryan enjoys the challenge o...
- John HeltSecurity Operations Center Manager, Discovery, Inc. (Formerly Scripps Networks)
I have considered myself a "hacker" from the moment I turned on my TI-99/4a. My insatiable curiosity has driven me through a career in IT Operations and InfoSec with both Hewlett Packard (10 years) and Discovery (Scripps Networks Interactive, 18 year). I hold a MS in Information Systems Management and current CISSP-ISSAP, CEH, and CCENT certs...
- Candy AlexanderPresident, ISSA International; CISO, NeuEon
Ms. Alexander has over 30 years of experience in the cybersecurity profession. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed corporate security programs. She is now working as a CISO and Cyber Risk Practice lead for NeuEon, Inc., assisting companies large and small to improve t...
- Sandy SilkDirector, Information Security Education & Consulting, Harvard University
Sandy Silk is the Director of Information Security Education and Consulting at Harvard University, Founder of Cyber Risk and Resilience Consulting, and a member of the Board of Advisors for the MS in Information Security Leadership at Brandeis University. She excels at bringing together executive leaders, business teams, and IT professionals ...
- Mike BrannonDirector, Infrastructure & Security, National Gypsum
Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."
- Brandi KeoughInformation Security Analyst, Novant Health
Brandi Keough is a Charlotte, North Carolina, native who started her college career at UNC Charlotte as a Chemistry major and graduated from Utica College in 2016 with her Bachelors of Science in Cybersecurity and Information Assurance with a concentration in Forensics and Investigations. Brandi is currently an information security analyst wi...
- Bernie McGuinnessIT Risk Lead, Campbell Soup Company
Bernie is a cybersSecurity professional with over 20 years’ experience, both hands on and regulatory compliance of multiple complex systems within the Department of Defense and the commercial space. He provides in-depth knowledge on Third-Party Risk Management, Information Security, Assurance, Audit, and IT Operations, within industry. Holder...
- Ian BurkeEnterprise Information Security Manager, Road Scholar
Currently the Enterprise Information Security Manager for Road Scholar in Boston, Ian Burke has been working in information security for over 20 years, completing his master’s degree in Information Assurance in 2013. He has worked for companies such as TJX and IBM in the business sectors and Middlebury College in the education sector. He has ...
- Dr. Raj SachdevProfessor, Researcher, Lawyer, Education
Dr. Raj Sachdev is a professor, researcher, and internationally qualified lawyer (USA and England/Wales). He holds several degrees in business and law and has guest spoken at such institutions as Oxford, Cambridge, Stanford and major industry conferences including having given a TEDx talk. Over the last 15 years, he has taught 50+ differe...
- Barry HerrinFounder, Herrin Health Law, P.C.
Barry Herrin is the Founder of Herrin Health Law, P.C., a boutique law practice located in Atlanta, Georgia. He regularly assists health care providers in all segments of the industry on health care operations and compliance, medical information privacy and confidentiality, cybersecurity, and data breach response. He is admitted to the bars o...
- Tariq ShaikhIT Program Manager, Aetna
Tariq Shaikh leads the Privileged Access Management practice for Aetna as part of their Global Security team. Tariq has more than 20 years of technology experience and is a certified project manager and information systems security professional. Tariq is an SME in the Privileged Access Management space and has spoken extensively about it at i...
- Zubaid KazmiSr. Manager and IAM Practice Lead, Sila
Zubaid is a Sr. Manager and Identity and Access Management Practice Lead at Sila. With close to two decades of consulting experience, he has helped Fortune 500 organizations develop Identity and Access Management strategies and solutions. Zubaid has worked with clients across multiple industries, including financial services, telecommunicatio...
- Greg BennettProgram Manager, Air Force CyberWorx, Center for Technology, Research and Commercialization
Air Force Officer for 22 years culminating as the Director of Research for a Department of Defense and Dept. of Homeland Security interagency research center delivering capability to the Homeland Security Enterprise and the Air Force. He was the CEO for a small business in Colorado Springs for 14 years and is currently the program manager and...
- Wayne TynesSr. Sales Engineer, Mimecast
Wayne Tynes is a Sr. Sales Engineer at Mimecast and has been designing solutions on Microsoft’s enterprise software stack for over 20 years, including working for Microsoft as a field sales engineer and SharePoint product manager. Wayne spent 5 years as a Solutions Architect at Avanade and was responsible for their Managed Services business i...
- Ashwin PatilSr. Security Analyst , Microsoft
Ashwin Patil currently works with Microsoft as Senior Security Analyst in Redmond, WA, with over nine years of Blue Team experience in security monitoring and Incident Response. His core work areas are security analytics, threat hunting using Big Data and SIEM technologies with strong interest in Data Science and Machine Learning to analyze s...
- Clint HarrisConsulting Systems Engineer, Cloud Security, Cisco
Clint is a Consulting Security Engineer with Cisco. He has over 19 years of experience in information security. Originally from New Zealand, he was an Avionics Engineer in the Royal New Zealand Airforce for five years before entering civilian life as a System Administrator with Peace Software. Experiencing a company breach and response first-...
- Rich ComptonPrincipal Network Security Engineer, Charter Communications
Rich Compton has been working at ISPs for the last 20 years. He was the very first Network Security Engineer at Charter Communications and has been working in the cable industry for the past 16 years. In his tenure at Charter, he has dealt with all facets of network security. He now focuses on DDoS detection and mitigation, stopping botnets, ...
- Tim McCainCISO, City of Aurora
Tim McCain is the Chief Information Security Officer for the City of Aurora, Colorado. He has been in the governance, risk, and compliance industry for 18 years at the manager, director, and CISO level of start-ups to multi-national corporations, including public and private sector. He sees his role as a business enabler, driving meaningful b...
- Aleta JeffressChief Information & Digital Officer, City of Aurora
Aleta Jeffress is the Chief Information and Digital Officer for the City of Aurora. She has over 20 years as a successful executive business leader and technologist building relationships between business and technology to enable digital transformation and market growth. She drives innovative strategies for business and IT leadership, and ...
- Kurt JohnsonSecurity Engineer, Check Point Software Technologies
Check Point Security Engineer, three years;
Pro Serve/Consultant, four years;
Sr. Engineer in Financial Services, six years;
Firewall Monkey, two years - Lt. Col. Robert SiauCyber Division Chief, Washington Air National Guard
Lt. Col. Robert A. Siau is currently serving as the Cyber Division Chief for the 252 Cyberspace Operations Group and duel-hatted to the Washington Joint Forces Headquarters as the Operational Cyber Planner.
Siau is a seasoned cyberspace operator, serving more than 17 years in cyber missions. During Siau's Command of the 262 COS he led ...
- Philip MarshallSr. Director, Product Marketing, SecurityScorecard
Phil Marshall is a security industry veteran with more than 17 years of experience in both network and data security. At SecurityScorecard, he oversees the company’s go-to-market strategy in partnership with the product management organization. Prior to joining SecurityScorecard, Phil worked at security firms Black Duck, Cryptzone, Rapid7, an...
- David CardwellClient Solutions Advisor, Optiv
David Cardwell is a client solutions advisor in Optiv’s major accounts team. In this role he specializes in aligning information security solutions that enable an organization to meet their current and future goals. David has more than 13 years of experience in information security, ranging from frontline support, consulting, and security arc...
- Kristopher DaneDirector of Digital Design, Thornton Tomasetti
Kristopher is the Director of Digital Design based out of the Seattle office of Thornton Tomasetti, an international structural engineering firm. Kris has 11 years of experience managing teams, administering technology, and developing custom tools to support the design of over 5 million square feet of structures around the world. In collabora...
- Seth KulakowDirector, Promontory
Seth is a director in Promontory’s cyber practice, where he advises clients on all aspects of tactical and strategic cybersecurity. He has more than 20 years of experience providing dynamic, secure, and cost-effective security solutions and programs. He has served in senior information security positions at companies ranging from startups to ...
- Emily ShipmanSr. Product Manager, RSA
Emily Shipman is a senior product manager, responsible for RSA Archer’s Integrated Risk Management offerings. Emily previously spent seven years in Archer’s presales consulting group, working with hundreds of GRC customers globally to develop tailored solutions for cutting-edge risk management. As a product manager, she drives Archer’s innova...
- Nick ButcherSr. Engineering Program Manager, Security/GRC, Microsoft
Nick is a senior program manager within the Digital Security and Risk Engineering group at Microsoft, where he is responsible for designing, developing, and deploying GRC (Governance, Risk, and Compliance) automation to support every division at the company. Focused on modernizing existing work efforts and building entirely new processes fro...
- Moderator: Derek IsaacsCAMMO Program CISO, Boecore Inc.
Author, speaker, and SME. Specialties and certifications include: CISSP, CRISC, CGEIT, Security+, C|EH, C|NDA, ITILv.3, C|CISO
- Eric WongSecurity Engineer, West, Comodo
Eric Wong is an experienced security engineer with 15 years in the security industry. He has worked with many different security technologies and F-500 clients over the years, focusing on architecting and deploying secure environments. Eric brings the unique expertise of working on both sides of the isle, from the client-side practitioner r...
- Cathy HallSr. Manager and Cybersecurity Architect, Sila Solutions Group
Cathy is a cybersecurity leader with 18 years of experience providing specialized IT Services to Fortune 500 companies and government agencies, specializing in Identity and Access Management, Information Security, Enterprise Applications and Business Process Management. Cathy brings a unique mix of Federal and Commercial cybersecurity experie...
- Zachary LimacherSr. Manager and PAM Practice Lead, Sila Solutions Group
Zachary Limacher is a cybersecurity leader, business architect, and strategist with 19 years of experience in architecting and implementing enterprise cybersecurity solutions. He has worked in both consulting and corporate roles. Prior to joining Sila, Zach led Access Management at Charles Schwab & Co. Zach is the Privileged Access Management...
- Stacy ScottManaging Director, Cyber Risk, Kroll
Stacy Scott is a Managing Director in Kroll’s Cyber Risk practice, based in Dallas. In addition to founding and operating her own consultancy, Stacy has served in high-profile roles with a leading cyber security consulting firm, a Big Four accounting firm, and the largest not-for-profit healthcare system in Texas. She joined Kroll with over 1...
- Deneen DeFioreSVP, Global Chief Information & Product Security Officer, GE Aviation
Deneen currently serves as SVP, Chief Information & Product Security Officer, for GE Aviation in Cincinnati, Ohio. And most recently she has taken on an expanded role for GE Aviation as co-leader of Aviation’s Digital League 2.0. She has also served as SVP, Chief Technology Officer, Security & Compliance, for GE Digital.
She is respons...
- Jesse HoodDirector, Darktrace
Jesse Hood is a Director at Darktrace, the world’s leading cyber AI company. Jesse has helped many enterprise organizations and SMB’s throughout Colorado and the neighboring states deploy cyber AI to detect and stop emerging threats. He works with businesses across a range of industries, including finance, healthcare, biopharma, local governm...
- Anne-Marie ScollayCISO, Axiom Law
As CISO for Axiom Law, Anne-Marie leads the information security strategy for Axiom's products/services, corporation, and governance, risk and compliance (GRC). Prior to joining Axiom, she built out and oversaw the infrastructure and security for a Seattle-based SaaS startup and global multi-nationals. Anne-Marie has a passion for operational...
- Colonel Jeffrey CollinsDirector, Air Force CyberWorx
Jeff “T-Rex” Collins (PhD, Carnegie Mellon University) is the Director of Air Force CyberWorx, a unit comprising a public-private research and design center located at the Air Force Academy in Colorado. Jeff is the former Deputy Director for Cyberspace Strategy and Policy at the Pentagon and Director of Staff for the Air Force CIO. He recentl...
- Co-Presenter: Rich MossHead of Delivery, Mirador, LLC
Rich Moss is a nationally known technology executive with 17 years of IT leadership experience. Rich started his career designing security and remote connectivity solutions. He has a proven track record of translating business requirements into technical objectives and ensuring execution of complex whole-corporate initiatives. Rich has develo...
- Bhuvaneswari RamkumarEngineering Team Lead and Product Owner, GE Digital
Bhuvana is a product leader in the field of IoT security. She has a decade of experience both in enterprise companies and startups, wearing engineering as well as product hats. In her current leadership avatar, she leads a team that has built and shipped a variety of IIoT security applications.
- JT GaiettoExecutive Director, Cybersecurity Services, Richey May & Co., LLP
JT has over 18 years of experience providing enterprise information security and risk management services to a variety of organizations, with a particular emphasis on the financial services industry. He has been a Certified Information Systems Security Professional (CISSP) since 2003, and holds an undergraduate degree in Computer Information ...
- Sam MasielloCISO, Gates Corporation
Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Sam currently serves as the CISO at Gates Corporation, where he is responsible for the company's data security, risk, and global compliance initiatives. Prior to Gates, he served as the CISO at TeleTech, where he oversaw the protection of ...
- Matt ShufeldtCISO, Cognizant Healthcare
Winner of the CTA APEX 2017 (inaugural) CISO of Year award, Matt Shufeldt is a leader in the Cyber Security community with 25+ years working professionally in multiple areas of Information Technology. Matt has been a CISO in multiple industries and is the current CISO for Cognizant Healthcare. As a passionate technologist and an avid believer...
- Barry KimballSystems Administrator, VFIS of Ohio
Barry is a Material Science Engineer turned IT System Admin Contractor. He runs the Cincinnati chapter of SMBA (Security Master Beer Appreciation) and is a member of ISSA. He enjoys tinkering with materials that make computers work—through logic electric circuits to board OS's and coding—covering a wide range of the field of IT. His favorite ...
- Matt ScheurerChair, CiNPA Security SIG, Financial Services industry
Matt Scheurer is a Systems Security Engineer working in the Financial Services industry and serves as Chair of the Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG). He holds a CompTIA Security+ Certification and possesses multiple Microsoft Certifications including MCP, MCPS, MCTS, MCSA, and...
- Gary McMullenLead Security Analyst, Great American Insurance
Gary McMullen is currently a Lead Security Analyst for the Financial/Insurance industry but has previously utilized his information security skill set to defend the Healthcare industry for nearly two decades. He currently resides in his second term as the president of the Cincinnati Tri-State chapter of the International Information System S...
- David HowardSecurity Administrator, 19-facility Healthcare System
David Howard is a CISSP, Certified Ethical Hacker, and holder of many other certifications. He also has 20 years of experience and currently is the senior member of the security staff of a regional hospital system. He is the host of Bring Your Own Security Radio, heard on iHeartRadio's app and many of their AM/FM stations nationwide, and is k...
- Nick FerrellTechnical Engineer, Trend Micro
Nick Ferrell has been helping Trend Micro customers across the world solve security challenges since 2011 as a senior engineer and professional services consultant. A primary focus of this work has been assisting enterprise organizations achieve a unified, automated, and effective set of security controls across diverse cloud and data center ...
- Matthew GioiaAssociate Director, IT Security & Compliance, St. Louis Community College
Matthew Gioia is Associate Director for IT Security & Compliance at St. Louis Community College where he works with students, faculty, and staff to secure student and employee data. Matthew believes the community is best served with an education partner focused on helping every student establish and work towards achievable goals, and that dev...
- Patrick WoodsAsst. Director, Cybersecurity & Technology / CISO, Missouri State Highway Patrol
Patrick J. Woods serves as the Chief Information Security Officer for the Missouri State Highway Patrol (MSHP) and the Assistant Director for Cybersecurity & Technology in the Patrol's Criminal Justice Information Services (CJIS) Division. In this capacity, Patrick directs the Patrol's cybersecurity and technology efforts to include network, ...
- Micah BrownVice President, Greater Cincinnati ISSA
Micah K. Brown is a member of the IT Security Engineering team at American Modern Insurance, part of the Munich RE Group. Over the past two years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations located in North and South America. In this role Micah has learned the many intr...
- Tom MooreConsulting Sales Engineer, Cloud Security, Cisco
Tom has more than 20 years of experience in the information security industry. He has extensive experience in corporate security policy review and design, auditing, vulnerability testing and analysis, network security and application administration. He has held positions as a chief security officer for a worldwide leader in broadcast televisi...
- Pratik LotiaSecurity Engineer III, Charter Communications
Pratik Lotia is a Security Engineer at Charter Communications, responsible for developing new architectures related to firewalls, IDS/IPS, and botnet detection.
- Mohamed MalkiDirector, Security Architecture, State of Colorado, Governor's Office of IT
Mohamed Malki, director of enterprise security architecture and HIPAA officer, has been key in transforming the State of Colorado’s security landscape. He’s been critical in building Colorado’s cybersecurity plan, designing Colorado's public cloud architecture and building the requirements for Colorado's Blockchain center of excellence. Moham...
- John MacintoshSr. Systems Engineer, Comodo Cybersecurity
John is a Senior Systems Engineer with over 10 years of experience in the security field. He’s previously worked with other cybersecurity firms such as Centrify, bringing trust to devices, users, and applications, and Barracuda Networks, where he worked on a wide range of perimeter defense technologies.
- Moderator: Jenifer ClarkInformation Security Analyst, Costco Wholesale
Experienced Information Security Professional with a demonstrated history of working in the retail industry. Skilled in Operations Management, Sales, Management, Point of Sale (POS) / Fuel Systems, and Inventory Control. Strive to find ways information security can enable and support business and operations teams with solutions. Actively supp...
- Brandon ReidSales Engineer, Mimecast
Mimecast Enterprise Sales Engineer with over 12 years’ experience in Information Technology and Security. Brandon has spent the better part of his career helping enterprise customer identify, architect and deploy cloud solutions. Most recently, he is focused on Mimecast’s enterprise customers in the Midwest. His goal is to ensure his customer...
- Stephanie ScheuermannManager, Threat Intelligence and Vulnerability Management, Ford Motor Company
- Paul GrollDirector of Cloud Services and Research, Department of Technology, Management, and Budget, State of Michigan
Paul Groll is a dislodged UP'er and a recovering coral reef theoretical ecologist. At some point, he got roped into a broad array of computer-related research projects at both the University of Hawaii (1984) and Michigan State University (1981, 1990). SCUBA tanks are heavy, so he eventually switched fields and moved into computer science (hey...
- Joe OlerichSystems Engineer, Radware
Joe Olerich is a Systems Engineer for Radware. He works on the front lines designing cutting-edge security solutions to aid organizations in defending against the growing threat landscape. Over his 15 years of experience, Joe has engaged in a variety of roles, from designing networks and managing infrastructure, to running network and applic...
- Zachary BriggsCorporate Compliance Counsel, Paycor
Zach Briggs is Corporate Compliance Counsel at Paycor, a human capital management SaaS company based in Cincinnati. He has a management degree from Purdue University and his Juris Doctor from Northern Kentucky University. Zach enjoys seeing how things work and making them work better. He is responsible for driving compliance initiatives acros...
- Dan CollinsSecurity Technical Solutions Architect, Cisco
Dan Collins is a Security Technical Solutions Architect for Cisco Systems. Dan has over 25 years in the Information Security industry, including nine of those years serving in the United States Air Force, focusing on Information Security.
- Jennifer CzaplewskiDirector in the Information Security Team, Target
Jennifer Czaplewski is a Director in the Information Security team at Target. She leads Product Analytics, Security Ninjas, Cyber Risk Management, and Product Security Engineering functions. Jennifer has been with Target for 12 years and in Information Security for 8 years. Prior to her time at Target, she led efforts in Corporate IT at Pfize...
- Jadee HansonCISO, Code42
As chief information security officer at Code42, Jadee Hanson leads global risk and compliance,
security operations, incident response, and insider threat monitoring and investigations. To her
position, she brings more than 15 years of information security experience and a proven track
record of building security programs.Sanur SikdarTechnical Specialist Manager, DeloitteSanur is experienced in enterprise and solution architecture, security architecture and design, cloud architecture, threat modeling, Secure DevOps, application development, software testing, and connected vehicle security.
John FaheyGlobal Channel Field Engineer, Comodo CybersecurityJohn Fahey is a Channel Field Engineer with Comodo Security Solutions. John has 20 years of various technical consulting roles, with deep and wide expertise across the modern IT infrastructure and security technologies and architectures, primarily serving enterprise clients, while also providing mid-market solutions. John’s previous role was ...
Robb ReckCo-Host, Colorado = Security podcast“Security only works when it’s in tune with the company it supports. Understanding what we are defending (and why) is more important than preventing, detecting or responding to threats. Understanding is dependent on high-quality relationships with stakeholders.”
Robb has built successful risk-based security programs in the software and...
Brian GorencDirector, Vulnerability Research, Trend MicroBrian Gorenc is the Director of Vulnerability Research with Trend Micro. In this role, Brian leads the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers ...
Scott GiordanoVP and Sr. Counsel, Privacy and Compliance, SpirionScott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management consulting experience. An IAPP Fellow of Information Privacy and a Certified Information Security Systems Professional (CISSP), Scott serves as Spirion’s subject matter expert on multinational data protection and its intersection with technology...
Brian CadyPrincipal Enterprise Security Architect, Providence St. Joseph HealthBrian Cady has been working in the information technology industry for more than 20 years with an exceptionally broad background focusing on security, architecture and future technologies. Brian has held leadership positions for IBM and Microsoft along with banking, airline and gaming companies. He is currently leading the Security Strategy &...
Lenny MalyVP, Cybersecurity Architecture & Engineering, Capital OneLenny is the former of VP of Cyber for Capital One, leading the Security Engineering and Architecture tower. Prior to that, Lenny was at Target, where he lead a number of security engineering organizations, including Cloud Security, Vulnerability Management, and Cybersecurity.
Timothy ColbyRegional Account Executive, Comodo CybersecurityTim has been selling and consulting in the Information Security industry for nearly 7 years. He has worked alongside security practitioners within Small-to-Medium size businesses up go Fortune 10 companies, delivering numerous security products and services throughout the years. Tim is responsible for developing Comodo Cyber Security’s chan...
Michael WestraConnected Vehicle Cyber Security Technical Manager, Ford Motor CompanyMichael Westra is the Connected Vehicle Cyber Security Technical Manager at Ford Motor Company focused on cybersecurity for connectivity into vehicles and connected technology, including embedded modems, infotainment, cloud, and mobile systems. Mike has 20 years at Ford, with roles including leading software architect for SYNC, Solution Archi...
Thaddeus HoffmeisterLaw Professor, University of DaytonLaw professor who is writing a book on IoT and the law.
Hema LakkarajuCEO & Founder, HAYAG CorpHema Lakkaraju has worked in the healthcare industry for 10 years in software and IT compliance.
Christine WantaCSO & Founder, CSO4Less (a cfw1 company)Over 35 years of security, technology, and business leadership experience with expertise in delivering complete, effective, and strategic security solutions across a breadth of industries, including those with regulatory requirements as well as Secret/Top Secret environments. Proven expertise in DLP solutions across industries including globa...
Brent LassiCISO, Bluecore, Inc.Brent Lassi is currently the CISO at Bluecore, Inc. He has nearly 20 years of experience in the information security field. Brent's previous roles include CISO at Carlson Wagonlit, Director of Information Security at UnitedHealth Group, CISO and VP of Information Security at Digital River, Inc. for a decade. He also co-founded one of the worl...
Brian BoboCISO, Sun Country AirlinesBrian Bobo is the Chief Information Security Office for Sun Country Airlines in Eagan, Minnesota. He is responsible for all aspects of the security and disaster recovery strategy, implementation, and effectiveness. Sun Country Airlines focuses on vacation destinations taking vacationers to the tropical beaches of Mexico, Costa Rica, and the...
Sujata RamamoorthySr. Director, Information Security, CiscoSujata is a Sr. Director of Information Security at Cisco and leads the group. Sujata and her team partner across Security & Trust Organization, Supply Chain, IT and various Product teams to deliver foundational capabilities to secure Cisco’s business operations and Cloud Offers. This includes establishing security standards, partnering to bu...
Jimmy SandersHead of Information Security, Netflix DVDJimmy has spent the better part of two decades securing data and systems from cyber threats. In addition to his duties at DVD.com, Jimmy has served as the San Francisco Bay Area chapter president of the Information Systems Security Association (ISSA) since 2014. He is also on the ISSA International Board of Directors. Furthermore, he has been...
Robert TroupExecutive Sales Manager, baramundi Software USA Inc.Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex netw...
Bruce SussmanDirector of Media & Content, Podcast Host, SecureWorldEmmy-winning journalist Bruce Sussman spent more than 20 years on TV screens in Portland, Oregon. During his "second career," he became fascinated by cybersecurity while working with CISOs at Gartner. He joined SecureWorld in 2017 to help grow its media division. Currently, he hosts the Remote Sessions daily web conference series and SecureWo...
Miles EdmundsonBusiness Information Security Officer, EquintiMiles has spent over 20 years in senior and executive leadership positions building cybersecurity programs with global and national companies across a variety of vertical markets. He has experience in risk assessments, remediation prioritization, business continuity management/disaster recovery, incident response, policy/standard development,...
John SchielPrincipal InfoSec Engineer, CenturyLinkJohn has over 12 years of hands-on experience in network and information security and security architecture. John was the primary DDoS architect and provided direction and support to Network Operations on how to best protect CenturyLink’s network from DDoS attacks. He has decades of cross functional network and application experience and toda...
Kurt AubuchonFounder and Principal Consultant, Portunus ConsultingKurt is a computer forensics and incident response consultant and an Assistant Professor of Cybersecurity at Maryville University. He has been in the IT field for nearly 20 years, with the last 11 focused on information security.
Chris SorensenSr. Cybersecurity Researcher, GE DigitalChris Sorensen has been in the IT industry for over 30 years practicing a wide range of specialties in multiple industries. He started in the Defense industry as a system administrator and developer before progressing to the Education sector where he taught system administration and security. From there he moved into the Automotive world wher...
Victoria ThomasCybersecurity Awareness Program LeaderVictoria L. Thomas is an award-winning senior leader with talent for designing, developing and implementing world-class, global cybersecurity awareness programs. With nearly 10 years experience, she brings a strong creative perspective to the field and provides practical solutions that not only build awareness, but also cultivate advocacy and...
Ryan AniolDeputy CISO, State of MinnesotaRyan Aniol is the Deputy CISO for the State of Minnesota. A cyber threat expert with over 19 years of cyber security experience, Ryan has specialized in cyber threat intelligence, threat actor profiling, incident response, penetration testing, and digital forensics spanning multiple industries. He is a recognized security researcher and thoug...
Lothar DetermannPartner, Baker McKenzieLothar has been helping companies in Silicon Valley and around the world take products, business models, intellectual property, and contracts global for nearly 20 years. He advises on data privacy law compliance, IT commercialization, copyrights, open source licensing, electronic commerce, technology transactions, sourcing, and international ...
Teresa MerklinPrincipal Engineer, Cybersecurity Engineering, Lockheed Martin Aeronautics CompanyTeresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Chr...
CSO CouncilTim WittenburgInformation Security Officer, FPX, LLCTim Wittenburg is the Information Security Officer at FPX, LLC, a B2B company providing industry-leading CPQ software that improves sales force productivity by preparing complete and accurate product quotations. As ISO, Tim is responsible for the delivery of a catalog of security and compliance services based on industry leading cybersecurity...
Co-Presenter: Joseph SzmadzinskiCEO, IT Management ResourcesJoseph R. Szmadzinski has served as interim and permanent CIO (over 12 times) or as an advisor to the chief executive teams/ officers to troubleshoot, restructure, and manage client systems during turnaround, growth, and profit improvement efforts. Joe has served clients in a wide variety of industries, including financial services, transport...
Milinda Rambel StoneVP & CISO, Provation MedicalMilinda Rambel Stone is an executive security leader with extensive experience building and leading security programs, including Information Security Governance, Vulnerability Management, Incident Investigation & Response, Security Awareness, and Risk Management & Compliance. With significant experience in creating and managing large-scale in...
Donald SmithPrinciple Security Architect, CenturyLinkDonald Smith is responsible for technology leadership, proposals, and strategic direction. His contributions include DCID 6/16, NISPOM chapter 8, DNS changer working group (DCWG), Conficker WG, and numerous security BCPs and RFCs. He has been a SANS handler since 2002. He has spoken at many conferences; including NANOG 33,42,52,71; University...
Kristin JudgeCEO & President, Cybercrime Support NetworkKristin founded nonprofit Cybercrime Support Network to be a voice for cybercrime victims. She’s been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology, to share best practices for online safety. Kristin was an SC Media "Women in IT Security Influencer" in 2017. ...
Tam NguyenCISSP, Cyber Threat Researcher, Federal Reserve Bank at ClevelandTam Nguyen is an IEEE and ACM peer-reviewed cybersecurity researcher whose with recent publications on Software Defined Network's security (CSNet - Paris, France), and instructional design evaluation of CEH v10 Online Course (IC4E - Tokyo, JP). Tam's research interests include large-scale cyber threat modeling, cyber behavioral science, and a...
Michael LandeckCISO & Executive Director, Social Interest SolutionsMike Landeck led the security implementation and then operationalized two of the country’s largest cloud-based healthcare IT projects. He has been responsible for the overall security of systems with financial transactions of over $4 billion per month, as well security programs regulated by HIPAA, SOX, PCI, FISMA (NIST 800-53), the IRS (FTI I...
Peter ChestnaContributing Editor, DevOps.comPete Chestna has more than 25 years of experience developing software and leading development teams, and has been granted three patents. Pete has been developing web applications since 1996, including one of the first applications to be delivered through a web interface. He led his company from Waterfall to Agile and finally to DevOps, in add...
Ryan MostillerCyber Security Regional Manager, FaureciaRyan has nearly 10 years of experience in defending large enterprise environments, specializing in Windows and Active Directory environments. Ryan has responsibility for Incident Response, Vulnerability Management, and the Management of all Security Tools and Controls. Ryan is a proud double alumnus from Oakland University as well as husband ...
Skip HansenVice President of IT Operations, APi Group, Inc.Keith ‘Skip’ Hansen is the Vice President of IT Operations at APi Group Inc., a multi-billion-dollar parent company to more than 40 independently managed life safety, energy, specialty construction and infrastructure companies located in over 200 locations worldwide. Skip is responsible for aligning APi’s information technology strategy with ...
John BassDirector, Global Data Risk, Duff & PhelpsJohn W. Bass is a director in the Global Data Risk Practice at Duff & Phelps. John is an acknowledged thought leader on risk management, the human dimensions of cyber risk, and insider threats. John was a Central Intelligence Agency (CIA) National Clandestine Service (NCS) operational executive with 27 years in national security and internati...
Jeremy BarnettSVP, Marketing and Business Development, NAS InsuranceJeremy Barnett is Senior Vice President of Marketing and Business Development for NAS Insurance, based in Los Angeles. Jeremy works across all NAS lines of business including Cyber, Specialty Products and Reinsurance solutions to provide brand strategy, product marketing, sales training, and producer support. Barnett is responsible for all co...
Ernie HaydenFounder & Principal, 443 Consulting LLCErnie Hayden is the Founder and Principal of 443 Consulting LLC. He holds a CISSP, CEH, GICSP (Gold), and PSP. Ernie's consulting experience includes work on every continent except Antarctica.
Mark LangfordPrincipal Consultant, Aberfoyle AssociatesMark is the Founder and Principal Consultant at Aberfoyle Associates, a Plano based cybersecurity consulting firm. Mark is a Board Member of the North Texas ISSA, was recently inducted into Infragard, and is called upon periodically to speak at cybersecurity industry events. He holds a Bachelor’s Degree in Management from Clemson University a...
Justin BermanCISO, ZenefitsJustin is the CISO at Zenefits. Previously he lead security at Flatiron Health, lead security architecture at Bridgewater Associates, and built business at Aspect Security. He focuses on data and adversary driven approaches to security, and on centering security in business value.
Steve BrownThe Bald Futurist, Former Chief Evangelist and Futurist, IntelSteve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.
Steve is passi...
Judy QuintonInformation Security Officer , CIBC Bank USAJudy Quinton is a driven professional and highly-skilled executive who is responsible for implementing innovative risk-based problems that address cybersecurity requirements while meeting strategic goals. Judy joined The PrivateBank, now known as CIBC Bank USA, as the Information Security Officer in 2011. Before that she worked at Xerox, HSBC...
Torsten GeorgeSr. Director, Product Marketing, CentrifyTorsten George is a security evangelist at Centrify and frequent speaker on cybersecurity, identity and access management, and risk management strategies worldwide. He regularly provides commentary and byline articles for media outlets, covering topics such as data breaches, incident response best practices, and effective cybersecurity defens...
Zoe LindseyCustomer Advocacy, Duo SecurityZoe Lindsey is Duo Security’s Advocate Manager, where she educates and advises organizations with unique compliance challenges including the healthcare, government, and financial industries on strong security policy and best practices. She has been hooked on tech since getting her first Commodore 64 at age 10, and joined Duo with a background...
Fatih OrhanVP, Threat Labs, Comodo CybersecurityWith more than 15 years of experience in the technology industry, Fatih Orhan brings a great deal of expertise to his role as director of Comodo Cybersecurity’s Threat Research Lab (CTRL). Working with over 200 security analysts, Orhan and his digital intelligence team are committed to using the best combination of cybersecurity technology an...
David BentonDirector, The American Society of Digital Forensics & eDiscovery (ASDFED)In 1994, David began his investigative career as a Counterintelligence Special Agent. During his tour, he conducted numerous investigations across multiple continents. After the military, he joined the Georgia Bureau of Investigation and left as a supervisor on their computer evidence recovery team. He worked for a fortune 25 company and late...
Richard DeveraSecurity Architect, Check Point Software Technologies, IncRichard Devera is the Security Architect at Check Point Software Technologies, Inc.. His background includes 20+ years of industry security experience. Richard is involved in providing best practices security strategies for all areas in networking. He is considered on of the thought leaders within the company providing strategic and technolog...
Pierre-Olivier Fur, CISSPCybersecurity Manager, RadwarePierre is a Cybersecurity Manager for Radware, where he brings 20 years of experience in the Information Security space. He holds a Master Degree in Computer Science and is a CISSP. Wearing various hats over the years as programmer, open source security expert, cryptography evangelist, network security architect, and CISO. Pierre is currently...
John ShaiaDirector, Steiner Electric CompanyJohn has over 30 years of experience in information technology with leadership in data center operations, software development, change management, network infrastructure, security, business continuity, acquisition integration, and transforming technology teams to become business focused.
Currently, John is a Director at Steiner Electri...
Charles WilliamsSolutions Architect, Trend MicroWith over 17 years in security and compliance, Charles is a technology evangelist enabling customers globally from a pre-sales and post-sales perspective to ensure proper deployment and configuration of endpoint, gateway, and datacenter security solutions.
Kim Dale, CISSP, CISAIT Audit Specialist , Federal Reserve Bank of ChicagoKim Z. Dale is an IT Audit Specialist at the Federal Reserve Bank of Chicago. Her previous work experience includes Northwestern University, the US Government Accountability Office (GAO), US Steel, and Management Science Associates. Additionally, she is a freelance writer, speaker, and playwright. Ms. Dale earned a master’s degree in informat...
Mary KavaneyChief Operating Officer, Global Cyber AllianceMs. Kavaney is the Chief Operating Officer for the Global Cyber Alliance (GCA), where she manages the daily operations of GCA, including strategy, personnel and legal responsibilities. She also engages in partnership development and outreach. Previously, Ms. Kavaney worked at the Center for Internet Security, where she developed relationships...
Aimee Larsen KirkpatrickGlobal Communications Officer, Global Cyber AllianceAimée Larsen Kirkpatrick is the Global Communications Officer for the Global Cyber Alliance (GCA), where she is responsible for strategic communications for the international nonprofit. Prior to GCA she was President of ALK Strategies, a communication and public affairs consulting practice. Aimée was formerly with the National Cyber Security ...
Alexandra PanaretosAmericas Lead for Secure Culture Activation, Ernst & Young LLPAlexandra Panaretos is the Americas Cybersecurity Lead Secure Culture Activation at Ernst & Young LLP. With a background in sports broadcasting and operational security, she specializes in security communications and education, awareness program development, the psychology of social engineering, and behavior analytics. She has over 11 years o...
Jeff ButlerFounder, JButler InternationalJeff Butler is a speaker, author and passionate millennial who helps organizations improve their relationships with millennial employees. Unlike other experts on millennials, Jeff has been in the trenches of what it means to be a millennial and what it takes to retain and keep them engaged. With Jeff ‘s versatile background, he has helped for...
Gary JohnsonSr. Director of Cybersecurity and IT Infrastructure, Kansas City Power & LightGary Johnson is a US Army veteran who has over 30 years of IT experience. He is the Sr. Director of Cybersecurity and IT Infrastructure for Kansas City Power & Light. Prior to that he spent 10 years at Cerner Corporation helping build their IT Infrastructure for the first five years and then led their security program the last five. He has a ...
Kenneth GeersSenior Fellow, Atlantic CouncilKenneth Geers (PhD, CISSP): NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate, TSN University of Kyiv Professor, Ukraine. 20 years US Government (US Army, NSA, NCIS, NATO); FireEye Senior Global Threat Analyst. Author “Strategic Cyber Security”, Editor “Cyber War in Perspective”, Editor “...
Tighe BurkePartner, JobplexTighe Burke is a Partner and Cybersecurity Practice Lead with Jobplex Inc. in Denver, securing the next-generation of leaders on behalf of technology clients around the globe. Tighe has developed powerful domain expertise executing searches for InfoSec functional roles as well as on behalf of security providers.
He previously spent 5 ...
Ryan EwingSpecial Agent, FBI Kansas City DivisionSpecial Agent Ryan Ewing has been with the FBI for over 8 years with assignments within Cyber Task Forces in the Miami Field Office, Columbia Field Office and Kansas City Field Office. He has had investigative cases for Cyber Criminal matters as well as Cyber National Security matters. Through the FBI continuing education program, he has held...
Steven ShalitaVice President, Marketing and Business Development, Pluribus NetworksSteven Shalita has 20+ years of technology experience across the Enterprise, Cloud and Service Provider technology segments. He has market and technology expertise spanning across Cybersecurity, network security, forensics, SDN/NFV, and IT infrastructure. He has spent a considerable amount of time in the performance monitoring marker and was ...
Celia CortesPresident, Seva 6 Security ConsultingCelia Cortes, is a Certified Forensic Interviewer (CFI), Licensed Private Investigator, and an Interviewer & Interrogations instructor. She has an extensive background in corporate security, investigations, security design, and personal safety. She is adept at planning, strategizing, and executing security and surveillance operations.
Aaron DeaconFounder & Managing Director, KC Digital DriveAaron Deacon is the founder and managing director of KC Digital Drive, a nonprofit civic organization with a mission to make Kansas City a digital leader and help cities adapt to disruptive technology change. He works with mayors, entrepreneurs and civic leaders in Kansas City and around the world to help build ecosystems that connect infrast...
Donna VieiraSecurity Risk and Compliance Analyst, Johnson County (KS) GovernmentDonna Vieira , CRISC, has been an Information Security Awareness Professional for since 1999. She is a Certified Risk and Information Systems Control (CRISC) through ISACA, which is designed for IT professional with hands-on experience with risk identification, assessment, evaluation, response and monitoring.
Justin Daniels
Speaker Directory