Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, May 23, 20239:00 am[PLUS Course] Developing a Ransomware Program Using the MITRE ATT&CK FrameworkExecutive Director, Information Security & Cyber Protection, Sumitomo Pharma AmericasRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmRansomware is a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data. You can unknowingly download Ransomware onto a computer by opening an email attachment, clicking an ad, following a link, or even visiting a website that’s embedded with malware.
Ransomware attacks are becoming more targeted, sophisticated, and costly, even as the frequency of attacks remains consistent. Since early 2018, the incidence of broad, indiscriminate Ransomware campaigns has declined, but losses from Ransomware attacks have increased significantly, according to complaints received by FBI case information. Although state and local governments have been particularly visible targets for Ransomware attacks, threat actors have also targeted health care organizations, industrial companies, and the transportation sector.
This course helps organizations design, build, update, maintain a comprehensive Ransomware Program.
Course Outline:
Part 1: Ransomware Overview – The Current Threat Landscape
- What is ransomware and how does it work?
- How ransomware attacks have changed—from 2016 to today
- Today’s ransomware attacks: big game hunting
- Ransomware attacks against critical infrastructure
- Ransomware and cyber insurance
Part 2: Ransomware Attacks and the MITRE ATT&CK Framework
- Discuss ransomware attack stages (initial access, lateral movement, privilege escalation…)
- Review the MITRE ATT&CK Framework (tactics, techniques, procedures)
- Map ransomware attack stages to the MITRE Attack Framework
Part 3: Ransomware Controls Frameworks, Guides, and Best Practices
- NIST IR 8374: Cybersecurity Framework Profile for Ransomware Risk Management
- CISA MS-ISAC Ransomware Guide
- NIST SP 1800-25: Identifying and Protecting Assets Against Ransomware & Other Destructive Events
- NIST SP 1800-26: Detecting and Responding to Ransomware & Other Destructive Events
- NIST SP 1800-11: Recovering from Ransomware & Other Destructive Events
Part 4: Building a Ransomware Program Based on the NIST Risk Management
- Step 1: Prepare – Essential activities to prepare the organization for a ransomware attack
- Step 2: Categorize– Architect, design, organize critical systems, information, and security tools
- Step 3: Select – Choose the ransomware controls (i.e., CISA_MS-ISAC Ransomware Guide)
- Step 4: Implement – Using security tools / sensors to apply ransomware controls to critical assets
- Step 5: Assess – Determine if controls are in place, operating as intended, producing desired results
- Step 6: Authorize – Communicate ransomware program / assessment with executive management
- Step 7: Monitor – Continuously monitor
9:00 am[PLUS Course] Cybersecurity and Cyber Risk EconomicsLeader in Cybersecurity Strategy, Innovation, and EconomicsRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmIt seems like every week there is a new cybersecurity incident making headlines. With so much negative attention, it is easy to see why some people–especially regulators–believe that cybersecurity is “failing,” but such a broad sentiment couldn’t be further from the truth. The truth is, neither the internet as a whole nor any of its connected entities will ever be 100% “secure.” While people realize this, the incidents and other failures loom large, even in the face of great silent successes. In reality, cybersecurity programs have complexities and nuances that matter, and our field must get better at communicating the concepts of complexity, risk, and economics.
This course is structured into four parts:
Session 1 – Cybersecurity Economics:
This session will provide a broad coverage of economic concepts and issues in managing a cybersecurity program. Key topics include: Concepts and Overview; Willingness to Accept/Willingness to Pay; Scarcity; Cognitive Biases; Perception of Risk; Benefit-Cost Analysis; Perverse Incentives; Unintended Consequences.Session 2 – Cybersecurity Risks:
This session will cover key cybersecurity-related risk discussion that incorporates history, risk in external disciplines, mathematical concepts, and more. Key concepts covered will include: The Risk Equation (frequency, impact, threats, vulnerabilities); Risk Heuristics; Estimating Value and Loss; the Attacker’s Equation; Calibrating Risk Matrices; Key Risk Indicators; Cyber Risk Quantification.Session 3 – Cybersecurity Controls:
This session will focus on the core disciplines of cybersecurity operations – identity management, vulnerability management, trust management, and threat management. It will highlight their goals and objectives, administrative processes, and technical solutions. Key concepts covered: Frameworks; RACI Matrices; Four Disciplines; Managing Resources – Time and Costs of People Process and Technologies. Examples: Benefit-Cost Analyses; Automation Justification; Return on Security Investment.Session 4 – Cybersecurity Metrics and Measures:
This session will tie the sessions together by applying the economics, risk, financial, and technical elements together with a full program that begins with operational details and rolls them up into a full strategic cybersecurity plan suitable to discuss with executives and board of directors. Key concepts covered will include: Cybersecurity Efficacy; Receiver Operating Characteristic (ROC) Curves; Asset and Activity Classification; Top Ten Strategic Metrics; The One Metric to Rule Them All.Our field is at a key point in its history. It is time to demonstrate cybersecurity leadership by creating programs that are diligent and not negligent; provide compliance with applicable regulations; and demonstrate the efficiency and effectiveness necessary to align with business objectives.
These sessions will be packed with examples, exercises, and anecdotes. Limited seating is available on a first-come, first-served basis. Sorry, no recording will be allowed.
- Wednesday, May 24, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amInfraGard Chapter MeetingOpen to all attendeesRegistration Level:Open Sessions
8:00 am - 8:50 amDiscussion topic and agenda TBD.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Opening Keynote] Ukraine vs. Russia: The Cyber WarCNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterSession description coming soon.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amClosing the Awareness Gap: How to Report to Your BoardChief Information Security & Privacy Officer, Bed Bath & BeyondRegistration Level:Conference Pass
10:15 am - 11:00 amSession description coming soon.
10:15 amEthics of DataSr. Director, Privacy and Information Governance, Carnival CorporationRegistration Level:Conference Pass
10:15 am - 11:00 amSession description coming soon.
10:15 am[SentinelOne] The Future of Cybersecurity Is AutonomousRegistration Level:Open Sessions
10:15 am - 11:00 amSession description coming soon.
11:10 am[Panel] There’s a Bad Moon on the Rise – Are You Ready?Identifying the Current Threat LandscapeRegistration Level:Open Sessions
11:10 am - 11:55 amLike the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.
The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.
Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.
11:10 amThe Need for Business CertificatesCISO, Needling WorldwideRegistration Level:Conference Pass
11:10 am - 11:55 amSession description coming soon.
11:10 am[Crowdstrike] Stop Breaches and Drive BusinessRegistration Level:Open Sessions
11:10 am - 11:55 amSession description coming soon.
12:00 pm[Executive Panel] Making the Cybersecurity MusicVP & CISO, AdientDirector, Cybersecurity Risk, Privacy & Compliance, PGA Tour SuperstoreRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterOver the last few years, the workforce and the way we work has entirely shifted and evolved. Much like conducting a grand orchestra, cybersecurity executives are now called upon to more than just conduct procedures and make “good music.” Listen to local cybersecurity executives who are in the trenches navigating the “new normal,” the threats impacting the industry, and their different key takeaways and lessons learned along the way. This discussion is followed by a live Q&A, so come prepared to ask your local executives your burning workforce questions!12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pmWhere Are We with Security Critical Infrastructure?Fellow and Director of Cybersecurity, FluorRegistration Level:Conference Pass
1:15 pm - 2:15 pmThe need for cybersecurity in critical infrastructure environments (e.g., energy pipelines, power plants, nuclear facilities, petrochemical sites, water treatment plants) is at critical levels. In this discussion, we’ll be looking at the current state of cybersecurity in these types of ICS/OT environments. We’ll also look at recent cyber developments in the Russian invasion of Ukraine.
1:15 pm[Panel] Lucy in the Cloud with DiamondsSecuring Your Cloud EnvironmentRegistration Level:Open Sessions
1:15 pm - 2:15 pmCan you “imagine” if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? While it is possible for that to happen with their hit-laden collection of songs today, it’s merely a tiny example of how businesses operate at a minimum in a hybrid cloud environment—many in a cloud-only platform.
With that comes security issues and another major area which cybersecurity professionals must work diligently to protect.
Our panel of experts share the good, the bad, and the ugly of operating in a cloud environment, what it takes to make the move to hybrid or multi-cloud successful, how to protect data from insider and outsider threats, and what it takes to provide the support DevOps teams need.
1:15 pmRansomware: How to Stay out off the Front PagesRegistration Level:Open Sessions
1:15 pm - 2:15 pm2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pmBack to the Basics: Don't Be Distracted by the Shiny Objects and BuzzwordsDirector, Information Security & Compliance, Paradies LagardèreRegistration Level:Conference Pass
2:30 pm - 3:15 pmAre information security programs learning the lessons from organizations in the news? Probably not, as many of the reported breaches are due to failures of basic information technology processes. Simply put, organizations are failing at fundamental security tasks which if implemented would lead to fewer breaches and greater security for their data.
We will explore the basics, why they matter, and when failure to implement the basics led to breaches.
2:30 pmISSA Chapter Meeting [Open to all attendees]Empowering Digital Citizens at HomeCSO, Castle Black; Founder, Savvy Cyber Kids; NACD Board Leadership FellowRegistration Level:Open Sessions
2:30 pm - 3:15 pmSession description coming soon.
2:30 pmCybersecurity as a Business DriverRegistration Level:Conference Pass
2:30 pm - 3:15 pmSavvy would-be customers be research companies and typically prefer to do business with those who have good cyber hygiene. How can a strong security posture be a business driver for your organization?
3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pm[Closing Keynote] Risk Management: Understanding How to Assess and Communicate Cybersecurity RisksCybersecurity Director, Gannett FlemingRegistration Level:Open Sessions
3:45 pm - 4:30 pmSession description coming soon.
3:45 pmCyversity Chapter MeetingOpen to all attendeesRegistration Level:Open Sessions
3:45 pm - 4:30 pmSpeaker and session details to come.
Hear from leaders of the Atlanta chapter of Cyversity. https://www.cyversity.org/events/category/atlanta
- Atlantic Data SecurityBooth: TBD
Since 1993, Atlantic has been representing industry leading security products to help get customers to an acceptable level of IT security risk. Atlantic works extensively with both large enterprises and SMB markets, understanding their business goals before any solution is recommended. Atlantic’s strict focus ensures that customers receive the highest level of both service and support.
- CloudflareBooth: TBD
Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.
Secure your websites, APIs, and Internet applications.
Protect corporate networks, employees, and devices.
Write and deploy code that runs on the network edge. - CrowdStrikeBooth: TBD
CrowdStrike is the leader in cloud-delivered next-generation endpoint protection. CrowdStrike has revolutionized endpoint protection by being the first and only company to unify next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service—all delivered via a single lightweight agent.
- CRESTBooth: TBD
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- Cyversity Atlanta ChapterBooth: TBD
Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.
- EndaceBooth: TBD
Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.
- Envision Technology AdvisorsBooth: TBD
Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.
- InfraGard Atlanta Members AllianceBooth: TBD
InfraGard Atlanta Members Alliance (IAMA) is a non-profit organization serving as a public-private partnership among U.S. Businesses, individuals involved in the protection and resilience of the U.S. critical Infrastructure and the Federal Bureau of Investigation.
InfraGard National Members Alliance (INMA), which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together.
IAMA is the Atlanta chapter of InfraGard. It is a local association of persons who represent businesses, academic institutions, state and local law enforcement agencies, non-profit organizations and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.
- ISSA Metro Atlanta ChapterBooth: TBD
The ISSA Metro Atlanta chapter has developed over the years into one of the largest ISSA chapters worldwide and the largest IT Security organization in the Metro Atlanta area. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.
- NetskopeBooth: TBD
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- OortBooth: TBD
Oort is an early-stage Boston-area startup focused on the intersection of Edge Computing and Cybersecurity. They are pioneering a new model for efficiently delivering security-as-a-service for remote workers, IoT devices, and branch offices using hundreds of globally-distributed data centers at the Edge of the Internet.
- SentinelOneBooth: TBD
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- ZeroFoxBooth: TBD
Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.
Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.
- Larry Wilson, CISSP, CISA, InstructorExecutive Director, Information Security & Cyber Protection, Sumitomo Pharma Americas
Larry Wilson is a senior consultant and was formerly the Chief Information Security Officer for the University of Massachusetts President's Office. In the CISO role, Larry was responsible for developing, implementing and overseeing compliance with the UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the UMass cybersecurity program, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, The NIST Cybersecurity Framework Foundations, The NIST Cybersecurity Framework Practitioners, Engineering, Technology and Business Labs and Workshops based on the NIST Cybersecurity Framework, etc. Larry has also worked with multiple companies in multiple industries to help design, build and maintain their Cybersecurity Programs and evaluate their current security posture.
- Pete Lindstrom, InstructorLeader in Cybersecurity Strategy, Innovation, and Economics
Pete Lindstrom has an extensive expertise in cybersecurity but is best known as an authority on strategic cybersecurity topics such as metrics, estimating risk, and measuring the benefit of security programs. He focuses on applying these core economic and risk management principles to new cybersecurity architectures and platforms. Pete has over 25 years of industry experience as an IT auditor (PwC), IT security practitioner (Wyeth), and industry analyst (IDC). Pete served as an officer in the U.S. Marine Corps and received a bachelor's degree in Business Administration (Finance) from the University of Notre Dame.
- Col. Cedric LeightonCNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC
Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.
Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.
- Antonio AndrewsChief Information Security & Privacy Officer, Bed Bath & Beyond
- Jennifer Harkins GaroneSr. Director, Privacy and Information Governance, Carnival Corporation
Jennifer Harkins Garone is the Senior Director of Privacy and Information Governance for North American brands of the Carnival Corporation since July 2018. Prior to this role, she spent 10 years at Microsoft leading privacy in diverse roles and organizations, including IT, HR, and corporate privacy.
Jennifer launched her career in marketing working on top brands like Apple, American Express, and AT&T. She has also done a short stint in sports marketing at an NHL team. It was while running direct marketing at Citizens Bank that Jennifer gained privacy responsibilities. It made perfect sense as financial services privacy law requires the mailing of a privacy statement to customers once a year. She was then the Americas' Privacy Leader for GE Money in Stamford, CT.
Fellow of Information Privacy (FIP) and early IAPP member, Jennifer is also a former Chairperson of the DMA Ethics Policy Committee and a member of the Mobile Marketing Associate, ANA and Word of Mouth Marketing Association privacy committees. In 2012, she received the Microsoft Engineering Excellence privacy award and various internal Microsoft privacy awards. She is a frequent speaker at privacy conferences.
Jennifer is active in her local community, serving as a Board Member of Eastside Heritage Center and as a Medina City Councilperson.
While the roles, industries, and brands have been different, what has always remained true is the ability to learn quickly and apply the fundamentals of business while driving results. Jennifer is married and has two delightful children. Born in New York, educated at Hofstra and Harvard. In her free time, she runs, skis, and reads. And next to curling up and reading with her kids, her next favorite place to be is on an airplane, going somewhere.
- Panel Discussion
- Joe BennettVP & CISO, Adient
Joe Bennett is the Vice President and Chief Information Security Officer for Adient. A security leader known for developing and implementing strategic plans to support business objectives, Joe blends leadership and team building to execute an overall security program. As Chief Information Security Officer, Joe has built a security framework that consistently delivers results by aligning security initiatives with business goals. Substantial improvements have been made in analyzing and framing enterprise risk factors, reducing risk through process and controls, and improving overall data security through solid governance processes.
With a career path that spans over 25 years from local to global companies, Joe has consistently developed security programs that turn around Security and IT organizations while reducing risk and improving compliance with multiple regulations and contractual obligations with appropriate controls and cost. With work in every populated continent, Joe has consistently demonstrated his understanding of managing enterprise risk while balancing business and customer needs.
- Alicia Laing ClarkeDirector, Cybersecurity Risk, Privacy & Compliance, PGA Tour Superstore
Alicia Laing Clarke is the Director of Cyber Security, Risk and Privacy (Head of Security) for PGA Tour Superstores. Alicia oversees PGA Tour Superstore (PGATSS) Cyber Protection, Risk, Compliance and Privacy of all PGATSS assets and data. She is responsible for protecting PGATSS from cyber activities and leading PGATSS’s response to cyber threats. Prior to assuming the role of Head of Security, Mrs. Laing Clarke was the Director of Risk and Vulnerability Management within the ACI Worldwide of the largest financial processor and services provider. Where she led and oversaw the development of cyber capabilities for all the ACI Worldwide running the vulnerability and penetration testing program. Mrs. Laing Clarke 20+ years security experience stem from various industries ranging from financial, retail, transportation, non-profit and health care. She has a strong background in developing security strategy and roadmaps and risk assessments. She has extensive knowledge and exposure in many network security techniques and solutions such as vulnerability assessment, key management and compliance, privacy, secure configuration, vendor management, BCP/BIA/DR, and other security technologies. She also provides subject matter expertise support for information security related issues to the business clients and to help identify pragmatic security solutions.
Mrs. Laing Clarke obtained her first degree which was a Bachelor of Science and Minor in Mathematics from CUNY Hunter College; as well as master’s in information security from James Madison University. She has acquired several security certifications that have demonstrated mastery as a Certified Information System Security Professional (CISSP), CIS Auditor (CISA), and CIS Manager (CISM). Mrs. Laing Clarke is a wife, mother of two, loves to shop and travel the world.
- Panel Discussion
- Michael HolcombFellow and Director of Cybersecurity, Fluor
Michael Holcomb is the Fellow and Director of Cyber Security for Fluor, one of the world's largest construction, engineering and project services companies with 60,000 employees around the world. In his role at Fluor, Michael is responsible for vulnerability management, incident detection/response, penetration testing, and industrial controls for the global organization. He also teaches cybersecurity as an adjunct instructor at Greenville Technical College.
- Panel Discussion
- Michael MarsilioDirector, Information Security & Compliance, Paradies Lagardère
Michael Marsilio is the Information Security and Compliance Officer for Paradies Lagardère, where he is responsible for information security, risk management, privacy and compliance. Michael plays a strategic role in protecting Paradies Lagardère IT resources, infrastructure and information assets, and helps drives global security initiatives. He has more than 25 years of experience in building and managing security and compliance programs for both public and private companies and has a substantial track record in PCI, PII, PHI, IT General Controls and developing cybersecurity policy for financial, retail and legal organizations.
Prior to joining Paradies Lagardère, Michael was the Global Director and CISO at DTI (now Epiq), the industry leader in the legal e-discovery space. Taking the organization’s security program from a green field to ISO 27001 certified data centers globally.
- Ben HalpertCSO, Castle Black; Founder, Savvy Cyber Kids; NACD Board Leadership Fellow
Ben Halpert is a man on a mission: to educate and empower today’s digital citizens in the workplace, at schools, and at home. By day, he is the CSO at Castle Black providing individuals cybersecurity, online privacy, and digital hygiene services with 24/7 human support. By night, he champions cyber ethics education throughout society via the 501(c)3 nonprofit Savvy Cyber Kids he founded in 2007.
Ben enjoys being on boards of organizations looking to enhance value and organizational resilience for the stakeholders they serve. Ben is honored to speak and keynote at conferences and events worldwide. He has presented at the World Economic Forum, NACD directorship training, RSA Security Conference, GISEC Global, InfoSec World, SecureWorld, Cyber Future Foundation, IEEE, ACM, CSO50, CIO/CISO Summits and many other events over his career. Ben was invited to present at TEDxKids@Vilnius (Raising Savvy Cyber Kids) and TEDxSaintThomas (Technology addiction and what you can do about it). Based on his early research and experience in the then emerging field of Cloud Computing,
Ben was invited to publish Auditing Cloud Computing: A Security and Privacy Guide through John Wiley & Sons. Ben was a contributing author to Readings and Cases in the Management of Information Security and the Encyclopedia of Information Ethics & Security, wrote the security column for Mobile Enterprise Magazine and has contributed to seven NIST special publications. Page 1 of 3 Through Savvy Cyber Kids, Ben provides cyber ethics educational and awareness sessions for parents, teachers, and students – from preschool through high school.
Ben is the award-winning author of The Savvy Cyber Kids at Home children’s book series (The Family Gets a Computer, The Defeat of the Cyber Bully, and Adventures Beyond the Screen). As a trusted voice on a variety of cyber security issues, Ben has made numerous TV and radio appearances and has been featured in newspapers and magazines such as The New York Times, Wired, Bloomberg, BBC, Kiplinger, Good Morning America, Good Day Atlanta, CNN HLN, Fox News, RogersTV, RTVI, 11 Alive, WSB-TV, among others.
- Tamika BassCybersecurity Director, Gannett Fleming
Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your cybersecurity community for learning and professional growth. Sign up today!
