Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, October 26, 20169:00 amUsing the NIST Cybersecurity Framework to Build and Mature an Information Security ProgramCISO, Uplight; Co-Host, Colorado = Security podcastRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pm - Thursday, October 27, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
7:00 am - 3:00 pm7:30 amAdvisory Council VIP Kickoff Breakfast - Let's Talk About Risk (VIP / INVITE ONLY)Registration Level:VIP / Exclusive
7:30 am - 8:30 am8:30 amDarkTrace: The Enterprise Immune System: Using Machine Learning For Next Generation Cyber DefenseVP, DarkTraceRegistration Level:Open Sessions
8:30 am - 9:15 am8:30 amMobile Computing: Threats, Vulnerabilities and Risk FactorsChief Information Security Officer, City of Palo AltoRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amProductivity Tools or Security Blindspots?Registration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am8:30 amISSA Session: Building and Securing a True Disaster Recovery within the CloudSenior Cloud Security Engineer, NetflixRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Blockchain As Security?U.S. Dept. of Justice, Stanford UniversityRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:30 am - 10:15 am10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibit Floor11:15 amDefending Against Cyber Threats in Complex EnvironmentsRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amGaining Better Visibility into Risk- The Future of GRCManaging Director, Grant ThorntonRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amRadware: Cyber War Chronicles - Stories From the Virtual TrenchesDirector of Security, RadwareRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amWar Stories from the Trenches – Information Security SurvivalRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm12:00 pmVIP Lunch Roundtable – VIP/Invite OnlyRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Radware The Current Economics of Cyber AttacksSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
12:15 pm - 1:00 pm1:15 pmEnsilo: We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat?Co-Founder & CEO, enSiloRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:00 pm1:15 pmPanel: Current ThreatscapeRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:00 pm1:15 pmPanel: Rise of the Cyber CriminalRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:15 pm1:15 pmTomorrow’s Datacenter Security is Needed TodayRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:00 pm2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibit floor2:30 pmDash for Prizes Winners AnnouncedRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
2:30 pm - 2:45 pmLocation / Room: SecureWorld Exhibit Floor3:00 pm4 Tips for CIOs to Secure Mobile EndpointsRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmArbor Networks: Advanced Threat & DDoS LandscapePrincipal Security Technologist, NETSCOUT ArborRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmBreaking the Kill Chain - How to Prevent, Detect, and Mitigate Threats to Your OrganizationRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmGlobalization of Cyber CrimeAssistant to the Special Agent in Charge, United States Secret Service, San Francisco Field OfficeRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm
- Alert LogicBooth: 207
Whether your company is transitioning infrastructure to the cloud, taking advantage of managed hosting services, or continuing to rely on owned data centers, Alert Logic offers intrusion detection, vulnerability assessment and log management solutions that are coupled with 24/7 monitoring and expert guidance services from our security operations center. More than 1,500 enterprise customers trust Alert Logic to secure and protect their digital information, and rely on us for keeping in step with increasingly complex regulatory issues. In addition to our team of GIAC analysts dedicated to careful observation and assessment of threats to your data, our research team stays on top of emerging developments so we can stop potential security breaches before they strike. We also have a dedicated support team ready to answer any questions you have about our products and services.
- NETSCOUT ArborBooth: 103
For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.
- <BRMABooth: TBD
BRMA is Northern California’s largest business recovery association. We are pleased that you found our web site. This must mean that you have an interest in disaster recovery planning, business recovery planning, or emergency response management. Our membership and programs may have the answers to your questions, or we may be able to direct you to those answers.
- <Business Resiliency and Relief FoundationBooth: TBD
The Business Resiliency and Relief Foundation was first formed as a foundation to assist small and medium sized businesses with aid and relief after a disaster and assist them with their needs to enable them to continue to function and operate.
- CiscoBooth: TBD
Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.
- <CSO CouncilBooth: TBD
The CSO Council is a non-profit corporation that supports a community of CSOs enabling the members to leverage experience and expertise of each other for the more effective and timely protection of their organization’s critical information assets. The CSO Council organizes conferences, panel discussions, webinars and special events to facilitate communications among its members and the information security community.
- CyberArk SoftwareBooth: 108
CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.
- DarktraceBooth: 247
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.
- <Digital Forensics Association (DFA)Booth: TBD
The Digital Forensics Association (DFA) is a non-profit organization dedicated to fostering education, providing networking opportunities and conducting research to benefit the digital forensics community.
- enSiloBooth: 203
enSilo protects businesses around the world from data breaches and disruption caused by cyber attacks. The enSilo Endpoint Security Platform comprehensively secures endpoints in real-time pre- and post-infection without alert fatigue, excessive dwell time or breach anxiety while also containing incident response costs by orchestrating automated detection, prevention and incident response actions against advanced malware. enSilo’s patented approach stops advanced malware with a high degree of precision, provides full system visibility and an intuitive user interface and combines next-generation antivirus (NGAV), application communication control, automated endpoint detection and response (EDR) with real-time blocking, threat hunting, incident response, and virtual patching capabilities in a single agent. The platform can be deployed either in the cloud or on-premises and supports multi-tenancy.
- Fidelis CybersecurityBooth: 241
Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy.
By integrating bi-directional network traffic analysis across your cloud and internal networks with email, web, endpoint detection and response, and automated deception technology, the Fidelis Elevate platform captures rich metadata and content that enables real-time and retrospective analysis, giving security teams the platform to effectively hunt for threats in their environment. Fidelis solutions are delivered as standalone products, an integrated platform, or as a 24×7 Managed Detection and Response service that augments existing security operations and incident response capabilities. Fidelis is trusted by Global 1000s and Governments as their last line of defense. Get in the hunt. For more information go to www.fidelissecurity.com.
- ForcepointBooth: TBD
Forcepoint is transforming cybersecurity by focusing on what matters most: people’s behavior as they interact with critical data and systems. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform, protecting the human point for thousands of enterprise and government customers. Our solutions include Cloud Security, Network Security, Data & Insider Threat Security.
- ForeScout Technologies, Inc.Booth: TBD
ForeScout Technologies, Inc. has pioneered an agentless approach to network security to address the explosive growth of the Internet of Things (IoT), cloud computing and operational technologies (OT). We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of today’s vast array of physical and virtual devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2018, more than 2,900 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions.
- <GirlsCanHackBooth: TBD
GirlsCanHack’s mission is to make the world of cybersecurity accessible to women, motivate them to pursue a career in this field, and support them while doing it. “Women are natural hackers. They have the mindset. They just need technical skills.”
- InfraGardBooth: TBD
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- <ISACA Sacramento ChapterBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
- ISACA Silicon Valley ChapterBooth: TBD
ISACA-SV is proud to serve our Bay Area constituents. Our mission is to serve those involved with various aspects of information security, assurance, risk management, privacy, audit, and similar topics associated with IT control and governance related activities.
The Silicon Valley Chapter of ISACA® was started in 1982, and has grown to over 800 members. Our members reside throughout the Bay Area centering in the Silicon Valley. We are a very active chapter, and have won multiple awards over the years, including two worldwide awards.
- International Information Systems Security Certification Consortium, Inc., (ISC)²®Booth: TBD
Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.
We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.
- ISSA New EnglandBooth: TBD
The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.
Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.
Visit the National Headquarter’s website at www.issa.org.
- NETSCOUTBooth: 236
NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.
- RadwareBooth: 200
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- <SiriusBooth: TBD
Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.
- Spirent CommunicationsBooth: TBD
As a leader in test, measurement, assurance, and security solutions for next-generation devices and networks, Spirent empowers cyber security champions to tame the complexity of balancing security with high availability business demands. We provide expert guidance and methodologies to help our customers find clarity in the face of complexity, overcome the challenges of a fast-approaching future, and ultimately deliver on their promise to their own customers.
- TechTargetBooth: TBD
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThalesBooth: TBD
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- VenafiBooth: TBD
Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.
With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms; four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.
For more information, visit: www.venafi.com.
- Alex WoodCISO, Uplight; Co-Host, Colorado = Security podcast
Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.
- Randy CheekVP, DarkTrace
Randy Cheek has over 10 years experience in the enterprise software industry across a number of roles, both commercial and technical. From startups to Fortune 500 companies, he has led teams responsible for key strategic accounts and has consistently led business growth throughout his career. As one of the first members of Darktrace US, he offers a unique perspective on the security industry and its approaches to cyber defense. Randy holds a degree in Applied Mathematics and resides in the Bay Area.
- Raj PatelChief Information Security Officer, City of Palo Alto
As CISO since early 2012, Raj has established an Information Security Steering Committee comprised of executive management, and developed an information security strategy and roadmap for future activities. In support of the strategy to ensure the confidentiality, integrity and availability of the information systems that support the operations and assets of the City, he has implemented an ISO 27001-based (Information Security Management Systems) security framework and created a new Information Security and Privacy Policies.
Prior to joining the City of Palo Alto, Raj held positions as Director of Information Security and Compliance at Kaiser Permanente, Chief Information Security Marshal at Oracle Corporation/Sun Microsystems, and Senior IT Manager for Development and IT Security at Sun Microsystems. It was during this period that he published Business Process Outsourcing (BPO) Security Policy and Specifications, which became an industry-leading practices to ensure security and privacy.
- Jeremy HeffnerSenior Cloud Security Engineer, Netflix
Mr. Heffner is a software and security professional who has worked on numerous commercial and government projects. His passion is for securing and building scalable, survivable, and fault-tolerant distributed systems. His focus includes cyber attack and defense, information gathering and analysis, and scaling systems globally through automation and dynamic optimization.
- Kathryn HaunU.S. Dept. of Justice, Stanford University
Please note: Kathryn will be speaking in her personal, not official capacity.
Based in San Francisco, Kathryn Haun is a federal prosecutor with the U.S. Department of Justice and is its first-ever coordinator for emerging financial technologies. Since 2006, she has served as an Assistant U.S. Attorney, first in the Washington D.C. area and later in San Francisco, California. She has investigated and prosecuted hundreds of violations of federal criminal law in U.S. courts, with a focus on organized crime syndicates, cybercrime, the Dark Net, and fraud. Kathryn speaks frequently to international and domestic audiences on the intersection of emerging technologies and government regulation. In addition to her role at the Justice Department, she teaches Stanford Law School’s first-ever course on Cybercrime and Digital Currency and is frequently called on by U.S. and international policymakers for her expertise in these areas.She has successfully investigated and prosecuted corporate compliance failures, and negotiated criminal resolutions with Fortune 500 tech companies. Kathryn has also served as lead counsel in numerous jury trials, including RICO murder and organized crime cases, all to successful verdict, and led several high-profile, complex investigations including against Ripple Labs, Inc. and against the former federal agents investigating the Silk Road marketplace.
- Orus DearmanManaging Director, Grant Thornton
- Ben DesjardinsDirector of Security, Radware
Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.
Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Gary SockriderPrincipal Security Technologist, NETSCOUT Arbor
Gary is an industry veteran bringing over 25 years of broad technology experience ranging from network security to routing and switching, data center, mobility and collaboration. His previous roles include security SME, consultancy, customer support, IT and product management. He seeks to understand and convey the constantly evolving threat landscape, as well as the techniques and solutions that address the challenges they present. Prior to joining Arbor in 2012, he spent 12 years at Cisco Systems and held previous positions with Avaya and Cable & Wireless.
- Shawn BradstreetAssistant to the Special Agent in Charge, United States Secret Service, San Francisco Field Office
Shawn M. Bradstreet is the Assistant to the Special Agent in Charge at the San Francisco Field Office. In this capacity, Mr. Bradstreet is the supervisor of the San Francisco Electronic Crimes Task Force and previously supervised the Bay Area Financial Crimes Task Force. Mr. Bradstreet is a 17-year veteran of the U.S. Secret Service.
Mr. Bradstreet is a 17-year veteran of the U.S. Secret Service. He started his career as a Uniform Division Officer at the White House Branch. He transferred to the New York Field Office serving on the New York Electronic Crimes Task Force, Financial Crimes Squad, Counterfeit Section, and the Protection squad. Mr. Bradstreet relocated back to Washington, D.C. where he served on the Presidential Protective Division under Former President George W. Bush and President Barack H. Obama. Mr. Bradstreet most recently served a three year assignment in the Criminal Investigative Division at Secret Service Headquarters in Washington D.C.
Mr. Bradstreet is a native of Northern Maine and received a Bachelor of Arts in Criminal Justice at Cedarville University in Ohio.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes