googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 21, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, May 22, 2024
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Drag Racing & Cybersecurity: The Crossover
    • session level icon
    speaker photo
    CISO, United Musculoskeletal Partners
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    You’d be amazed what you can learn from everyday hobbies or obstacles to help you become a better practitioner. Krista Arndt shares a very personal story of survival after a bad drag racing accident in 2015. It was a life-altering experience and provided perspective on her personal and professional life that drives her every day as a loving mom and wife, volunteer, and successful CISO.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Leadership Strategies to Support Talent Development and Retention
    • session level icon
    speaker photo
    Cybersecurity Director, Gannett Fleming
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Session description coming soon.

    10:15 am
    Conquering the Past: Strategies for Overcoming Technical Debt in IT and Cybersecurity
    • session level icon
    speaker photo
    Director of Cybersecurity, Avelo Airlines
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    This presentation tackles the challenge of overcoming technical debt in IT and cybersecurity, defined as outdated or underinvested technology and infrastructure. It offers leaders practical strategies to update and enhance their technological assets. The talk covers the causes, impacts, and risks of technical debt and provides systematic approaches for its identification, assessment, and prioritization. Actionable steps for addressing technical debt will be shared, focusing on resource allocation, technology selection, and fostering a culture of continuous improvement. This is vital for professionals aiming to improve their cybersecurity posture and IT efficiency, leading to a more secure and future-proof organization.
    Learn to identify and assess technical debt in IT and cybersecurity, implement strategic remediation approaches, including resource allocation and technology selection, and foster a culture of continuous improvement to update infrastructure and align with industry standards regularly.
    10:15 am
    Reducing Risk Through Exposure Management
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Session description coming soon.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Using People, Process, and Technology to Build a World Class SOC
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Session description to come.

    11:10 am
    Vulnerability Insights from the Crowdsourced Ecosystem
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Session description coming soon.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    LUNCH KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    The Future of Encryption: Quantum Computing and AI
    • session level icon
    speaker photo
    Sr. Intelligence Analyst, Expedia Group
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    “The Future of Encryption: Quantum Computing and AI” explores the impending impact of quantum computing on current encryption methodologies and how AI can offer solutions. This presentation highlights quantum-resistant encryption algorithms, preparing audiences for the significant changes quantum advancements will bring. Case studies from startups and tech firms developing quantum-safe encryption solutions will provide practical insights. The key takeaway will emphasize the urgency of adapting to quantum computing developments to ensure robust, future-proof encryption strategies. This topic is crucial for understanding the evolving landscape of cybersecurity in the quantum/AI era.
    1:15 pm
    Securing Your Sensitive Assets in a Cloud-First World
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Key take-away: 
    How to rethink database security controls in a cloud-first world.

    For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:

    • Amount of data created, collected, and stored
    • Number of repositories storing sensitive data across clouds
    • Number of users and applications that need access to data
    1:15 pm
    [Panel] The Secret Potential of AI and ML: Empowering Cyber Superheroes with Artificial Intelligence
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.

    Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.

    Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Using Cloud Automation to Supercharge Your Security Program
    • session level icon
    speaker photo
    Enterprise Security Architect, Delta Air Lines
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    As organizations move to the cloud, it is becoming more difficult to manage the breadth of security tools and controls, including on-prem, in the cloud, and SaaS solutions. In this presentation, we will provide real-world practical ideas for using (cheap) serverless automation in the cloud to manage your security program.

    2:10 pm
    Cyversity Chapter Meeting: Artificial Intelligence – Threat, Opportunity, or Both?
    • session level icon
    speaker photo
    CISO, State of Georgia
    speaker photo
    Global Field CISO, Veritas
    speaker photo
    Education Working Group Lead, HISPI AI Think Tank - Project Cerebellum
    speaker photo
    Founder, HISPI AI Think Tank - Project Cerebellum
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    The increasing adoption of AI and related technologies globally provides a massive opportunity for humanity. However, as is the case with any disruptive technology, there are also threats that introduce significant risks. Effectively managing these inherent risks is key to leveraging AI in a balanced way.

    2:10 pm
    ISSA Metro Atlanta Chapter Meeting
    • session level icon
    Moments, Movement, and Magnificent Maxims
    speaker photo
    Director, Privacy Program, GoTo Foods
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    Inside Cybersecurity, we often find that life can turn in a moment. Which moment is going to be the lynchpin? It is anybody’s guess.  As members of ISSA, we deal with all manifestations of malware and malicious miscreants. We love to bring order from chaos and to attempt to do good in the world.  This presentation will give a new perspective on some old thoughts and try to make matters more meaningful here on the third rock from the Sun.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:30 pm
    [Closing Keynote Panel] The Future of the CISO
    • session level icon
    speaker photo
    CISO, Paradies Lagardère
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    Session description coming soon.

Exhibitors
  • Axonius
    Booth: TBD

    Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

  • Bugcrowd Inc.
    Booth: TBD

    By combining the world’s most experienced team of bounty experts and the market’s only enterprise-grade bug bounty platform, Bugcrowd connects organizations to a global crowd of trusted security researchers to identify vulnerabilities—before the  adversaries do.

  • Check Point Software Technologies
    Booth: TBD

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Cribl
    Booth: TBD

    Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.

    Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.

  • Envision Technology Advisors
    Booth: TBD

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • Lacework
    Booth: TBD

    Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.

  • One Identity + iC Consult
    Booth: TBD

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

    iC Consult is the world’s leading independent consultancy, systems integrator, and managed services provider for Identity & Access Management with 850+ employees worldwide. Our service portfolio covers Managed Services for IAM including advisory, architecture, implementation, integration, support, and operations. For more information, visit https://ic-consult.com.

  • ProcessUnity
    Booth: TBD

    ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources.

  • Skybox Security
    Booth: TBD

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • Thales
    Booth: TBD

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Krista Arndt
    CISO, United Musculoskeletal Partners

    Krista Arndt is the Chief Information Security Officer (CISO) at United Musculoskeletal Partners. As the CISO, Krista is responsible for the safety and security of all UMP and its practices' patients and employees. Krista accomplishes this by ensuring continued maturation and providing strategic direction for UMP's information security program in alignment with the business objectives. Additionally, Krista provides oversight of the security program's day to day operational effectiveness.

    Prior to joining UMP, Krista served as the Director of Security Governance, Risk and Compliance for Voyager Digital, a leading cryptocurrency trading platform, where she was responsible for the development, maturation, and maintenance of Voyager's security program. Krista has served in various leadership and operational roles within the information security profession for 14 years within the financial and defense sectors, bringing a deep understanding of how strong security and privacy practices can help enable best in class care and peace of mind for UMP and its practices' patients.

    Krista has a Bachelors Degree in Biology from Felician College and currently holds her Certified in Risk and Information Systems Control (CRISC) and Certified Information Security Manager (CISM) certifications.

    Krista is an active member of ISACA, Infragard's Philadelphia Chapter, as a member of both Neumann University's Business Advisory Council and Women in Cybersecurity-Delaware Valley Affiliate's Membership and Education Committees. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

  • speaker photo
    Tamika Bass
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    David Sledge
    Director of Cybersecurity, Avelo Airlines

    David Sledge is the Director of Cybersecurity for Avelo Airlines, where he collaborates with the CISA and FBI. He holds +20 IT and cybersecurity-focused professional certifications, including CISSP, CISM, and CIPM. He brings 16 years of experience in IT and security leadership, working with global Fortune 500 companies. Previous speaking engagements include keynote speaker and panelist. He is a current ISACA – Greater Houston Chapter Board Member and active member of SIM Houston, ISSA South Texas, OWASP Austin, and ISC2 Austin. A cybersecurity advisory board member at multiple universities and is recognized as an ambassador, mentor, and advocate in the cybersecurity industry.

  • speaker photo
    Skybox Representative
  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

  • speaker photo
    Bugcrowd Representative
  • speaker photo
    Lacework Representative
  • speaker photo
    Netwrix Representative
  • speaker photo
    Thales Representative
  • speaker photo
    Panel Discussion
  • speaker photo
    Bidemi Ologunde
    Sr. Intelligence Analyst, Expedia Group

    Bid is a seasoned intelligence analyst with years of experience and industry certifications in security operations, threat intelligence, cybercrime investigations, inter-agency collaboration, and lots more. He's currently a Senior Intelligence Analyst at Expedia.

  • speaker photo
    Panel Discussion
  • speaker photo
    Stuart Smith
    Enterprise Security Architect, Delta Air Lines

    Stuart Smith is the Enterprise Security Architect for Delta Air Lines reporting to the CISO. He is one of the senior security advisors to the security organization and is responsible for providing security input into various business and technology initiatives across the company. Stuart has over 23 years of professional experience in the cybersecurity field for both the Department of Defense and the private sector. He is a U.S. Army combat veteran, has a Masters in cybersecurity, and holds CISSP and CISM certifications.

  • speaker photo
    Steve Hodges
    CISO, State of Georgia
  • speaker photo
    Joye Purser
    Global Field CISO, Veritas
  • speaker photo
    Angela Hinton
    Education Working Group Lead, HISPI AI Think Tank - Project Cerebellum
  • speaker photo
    Taiye Lambo, Moderator
    Founder, HISPI AI Think Tank - Project Cerebellum
  • speaker photo
    Phillip Mahan
    Director, Privacy Program, GoTo Foods

    A standard biography for Phillip would mention his years of experience in Privacy, Security, Governance, and Audit. It would tell of the business sectors he has worked with, and perhaps even the companies and professional organizations he’s been affiliated with for the last 25+ years. This is not the standard bio.

    Telling stories and pulling connections together from places unexpected.

    Using Poetry, Literature, and Fairy Tales to make points understood by those not in the tech field. When speaking at conferences, he aims to take the listeners on a journey leading them somewhere they weren’t expecting when the story began.

    Phillip prefers people thinking of him more as someone who looks at the world differently but will help to get you where you need to be.

  • speaker photo
    Happy Hour
  • speaker photo
    Panel Discussion
  • speaker photo
    Michael Marsilio
    CISO, Paradies Lagardère

    Michael Marsilio is the Information Security and Compliance Officer for Paradies Lagardère, where he is responsible for information security, risk management, privacy and compliance. Michael plays a strategic role in protecting Paradies Lagardère IT resources, infrastructure and information assets, and helps drives global security initiatives. He has more than 25 years of experience in building and managing security and compliance programs for both public and private companies and has a substantial track record in PCI, PII, PHI, IT General Controls and developing cybersecurity policy for financial, retail and legal organizations.

    Prior to joining Paradies Lagardère, Michael was the Global Director and CISO at DTI (now Epiq), the industry leader in the legal e-discovery space. Taking the organization’s security program from a green field to ISO 27001 certified data centers globally.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Best practices & solutions, straight from the source

Join your local cybersecurity community for learning and professional growth!