Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, March 29, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
7:00 am - 3:00 pmLocation / Room: Registration Desk8:00 amExecutive Advisory Board Breakfast: "Certifications- What Are They Good For?" VIP/INVITE ONLYRegistration Level:VIP / Exclusive
8:00 am - 9:15 amLocation / Room: Room 2058:00 amSecureWorld Plus: Building a Successful Information Security Awareness ProgramCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Room 2098:00 amSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity FrameworkSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Room 2048:00 amSecureWorld Plus: Handling & Managing Security IncidentsPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Room 2018:30 amComputer Security For ML Business & GovernmentRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Room 2038:30 amInformation Security Solutions To Optimize Successful ImplementationsRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Room 2078:30 amLogicNow: Data Breach Risk Intelligence That MattersRegistration Level:Open Sessions
8:30 am - 9:15 pmLocation / Room: Room 2028:30 amPrivacy & Security Issues in Cloud ContractsManaging Partner, Scott & Scott, LLPRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Room 2108:30 amSecurity Governance for the Distributed Healthcare EnterpriseRegistration Level:Conference Pass
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Hunting The Electronic Criminals Boston StyleRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 am10:15 amISACA Chapter Meeting- Open to ISACA Members OnlyRegistration Level:VIP / Exclusive
10:15 am - 11:15 amLocation / Room: Room 20011:00 amExecutive Roundtables: Identity is the New Firewall--VIP/Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm11:15 amGarbo, D-Day and Ultimate Social EngineeringPresident, CISSP, O'Leary Management EducationRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amRadware: Cyber War Chronicles - Stories From the Virtual TrenchesSecurity Evangelist, North America, RadwareRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amThe Future of SecurityRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Room 20311:15 amTrend Micro: The State of the Online UndergroundDirector of Threat Research, Unit 42 Threat Intelligence, Palo Alto NetworksRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Room 20712:15 pmUsing Cybersecurity Career Lifecycle (tm) to Get In and Stay In the ProfessionRegistration Level:Conference Pass
12:15 pm - 1:00 pm12:00 pmExecutive Roundtable: Risk Acceptance -- VIP/Invite OnlyRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Radware - The Current Economics of Cyber AttacksDirector of Security, RadwareRegistration Level:Open Sessions
12:15 pm - 1:00 pm1:15 pmPanel: After the HackRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Room 2081:15 pmPanel: Current ThreatscapeRegistration Level:Open Sessions
1:15 pm - 2:00 pmLocation / Room: Room 2101:15 pmTavve: Prepping for the OSCP - Kali/ARM/NIST/FIPS/AES/PythonRegistration Level:Open Sessions
1:15 pm - 2:00 pmLocation / Room: Room 2032:15 pm(ISC)^2 Chapter Meeting - Open to All AttendeesRegistration Level:Open Sessions
2:15 pm - 3:00 pm2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibit Floor3:00 pmBig Red Dots - Risk Communication StrategyRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Room 2083:00 pmOpen Source Intelligence (OSINT) - Is There Any Privacy Left?Registration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmPanel: Locking Down the EndpointsRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Haverford3:00 pmSecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)Registration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (SecureWorld Plus Registrants ONLY)Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: Room 2043:00 pmSecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants Only)President, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:15 pmOptiv Happy HourRegistration Level:Conference Pass
3:15 pm - 6:00 pmLocation / Room: Town Stove & Spirits - Thursday, March 30, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
7:00 am - 3:00 pm7:30 amISSA Chapter Meeting / Breakfast- Member OnlyRegistration Level:VIP / Exclusive
7:30 am - 9:00 am8:00 amSecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)CSO, Security Mentor; Former CISO, State of MichiganRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Room 2098:00 amSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (SecureWorld Plus Registrants ONLY)Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Room 2048:00 amSecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)President, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Room 2048:30 amCompliance Step 1- Let's Begin With Data InventoryRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amInfraGard Chapter Meeting: Open to all AttendeesRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: Keynote Theater8:30 amPCI Compliance- NOT FOR DUMMIESRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Room 2078:30 amProtecting the Crown Jewels: How to Incorporate Security and Privacy Into Procurement and ContractingRegistration Level:Conference Pass
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
9:00 am - 3:00 pmLocation / Room: SecureWorld Exhibit Floor9:30 amOPENING KEYNOTE: Enhancing Enterprise Resilience through Software Assurance and Supply Chain Risk ManagementRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 am11:00 amExecutive Advisory Council Roundtable: After the Hack -- VIP / Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm11:15 amBitdefender: Know What You Don't Know: Address Hidden Threats to Your DatacenterRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Room 20211:15 amCheck Point: High Value Employees in the Crosshairs: New Developments in Cybersecurity for Mobile DevicesRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amCyber Insurance: Is it Worth it and is it Required?Registration Level:Conference Pass
11:15 am - 12:00 pm11:15 amCybereason: Defense Grade CybersecurityRegistration Level:Open Sessions
11:15 am - 12:00 pm11:00 amSecureAuth: Identity in Security- Know Who's in Your NetworkRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm12:00 pmAdvisory Council Roundtable Lunch: Let’s Talk About Risk - Lunch Served VIP/Invite OnlyRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Optiv- Beyond the Security Team: The Economics of Breach ResponseCISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)Registration Level:Open Sessions
12:15 pm - 1:00 pm1:15 pmGuidePoint Security: GRC- Trials & TribulationsRegistration Level:Conference Pass
1:15 pm - 2:00 pm1:15 pmPanel: Emerging ThreatsRegistration Level:Open Sessions
1:15 pm - 2:15 pm1:15 pmPanel: You've Got Humans on Your NetworkRegistration Level:Open Sessions
1:15 pm - 2:15 pm1:15 pmTanium:ASK – KNOW – ACT: Navigating the Breach LandscapeRegistration Level:Open Sessions
1:15 pm - 2:00 pm2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pm2:15 pmDash for Prizes & CyberHuntRegistration Level:Open Sessions
2:15 pm - 2:45 pm3:00 pmHow Adopting the Public Cloud Can Improve Your Enterprise SecurityRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmInfosec Rock Star: Geek Will Only Get You so FarRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmWeakening Cyber-Adversaries & Strengthening Cyber-AlliesRegistration Level:Conference Pass
3:00 pm - 3:45 pm
- <Boston, MA 2016Booth: 202
- <Boston, MA 2016Booth: 205
- <Boston, MA 2016Booth: 605
- <Boston, MA 2016Booth: 442
- <Boston, MA 2016Booth:
- <Boston, MA 2016Booth: 606
- <Boston, MA 2016Booth: 420
- <Boston, MA 2016Booth: 409
- <Boston, MA 2016Booth: 320
- <Boston, MA 2016Booth: 209
- <Boston, MA 2016Booth: 406
- <Boston, MA 2016Booth: 304
- <Boston, MA 2016Booth: 108
- <Boston, MA 2016Booth: 309
- <Boston, MA 2016Booth: 305
- <Boston, MA 2016Booth: 104
- <Boston, MA 2016Booth: 320
- <Boston, MA 2016Booth: 404
- <Boston, MA 2016Booth: 124
- <Boston, MA 2016Booth: 618
- <Boston, MA 2016Booth: 301
- <Boston, MA 2016Booth: 303
- <Boston, MA 2016Booth: 303
- <Boston, MA 2016Booth: 314
- <Boston, MA 2016Booth: 509
- <Boston, MA 2016Booth: 511
- <Boston, MA 2016Booth: 306
- <Boston, MA 2016Booth: 514
- <Boston, MA 2016Booth: 320
- <Boston, MA 2016Booth: 303
- <Boston, MA 2016Booth: 613
- <Boston, MA 2016Booth: 416
- <Boston, MA 2016Booth: 505
- <Boston, MA 2016Booth: 515
- <Boston, MA 2016Booth: 118
- <Boston, MA 2016Booth:
- <Boston, MA 2016Booth: 203
- <Boston, MA 2016Booth: 516
- <Boston, MA 2016Booth: 501
- <Boston, MA 2016Booth: 502
- <Boston, MA 2016Booth: 312
- <Boston, MA 2016Booth: 208
- <Boston, MA 2016Booth: 708
- <Boston, MA 2016Booth: 204
- <Boston, MA 2016Booth: 215
- <Boston, MA 2016Booth: 614
- <Boston, MA 2016Booth: 300
- <Boston, MA 2016Booth: 602
- <Boston, MA 2016Booth: 512
- <Boston, MA 2016Booth: 317
- <Boston, MA 2016Booth:
- <Boston, MA 2016Booth: 320
- <Boston, MA 2016Booth: 201
- <Boston, MA 2016Booth: 711
- <Boston, MA 2016Booth: 500
- <Boston, MA 2016Booth: 506
- <Boston, MA 2016Booth: 704
- <Boston, MA 2016Booth: 315
- <Boston, MA 2016Booth: 617
- <Boston, MA 2016Booth: 604
- <Boston, MA 2016Booth: 401
- <Boston, MA 2016Booth: 402
- <Boston, MA 2016Booth: 415
- <Boston, MA 2016Booth: 513
- <Boston, MA 2016Booth: 316
- <Boston, MA 2016Booth: 217
- <Boston, MA 2016Booth: 413
- <Boston, MA 2016Booth: 503
- <Boston, MA 2016Booth: 200
- <Boston, MA 2016Booth: 314
- <Boston, MA 2016Booth: 600
- <Boston, MA 2016Booth: 504
- <Boston, MA 2016Booth:
- <Boston, MA 2016Booth: 400
- <Boston, MA 2016Booth:
- <Boston, MA 2016Booth: 408
- <Boston, MA 2016Booth: 420
- <Boston, MA 2016Booth: 320
- <Boston, MA 2016Booth: 508
- <Boston, MA 2016Booth: 308
- <Boston, MA 2016Booth: 414
- <Boston, MA 2016Booth: 312, 108
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Robert ScottManaging Partner, Scott & Scott, LLP
Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s largest corporations, such as Schlumberger, PepsiCo, Iron Mountain and American Express, on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Kyle WilhoitDirector of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks
Kyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of world-renowned threat researchers that identify, track and unearth technical intelligence related to actor groups present in hack tools, attack frameworks, targeted attack campaigns, and malware families.
- Ben DesjardinsDirector of Security, Radware
Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.
Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Dawn-Marie HutchinsonCISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)
Dawn-Marie Hutchinson brings more than 15 years of enterprise information technology experience to her role as CISO of GSK. She is an innovative business partner with extensive experience serving on Enterprise Risk Management teams. Hutchinson is an expert in providing data privacy and security solutions to manage information risk, improve IT governance and strengthen internal controls. Hutchinson’s extensive experience in information security and privacy program development has served the healthcare, insurance, retail and higher education sectors.
While serving on the HITRUST working group for Data De-Identification, Hutchinson established standards and controls for the anonymization of patient level data and is credited with authoring the white paper for defining those levels, as well as use cases for the secondary uses of medical data. Additionally, she served on the HITRUST Privacy working group tasked with revising the HITRUST Common Security Framework to include additional privacy controls and the inclusion of NIST application recommendations.
Prior to joining GSK, Hutchinson was the CSO at Comm Solutions and also led the information security program at Urban Outfitters, based in Philadelphia. Her tenure in IT also includes work at Walt Disney World, Co., Banknorth Group, Inc., Independence Blue Cross, Protiviti, and Optiv.
Hutchinson currently sits on the Cyber Security Canon Committee, was the recipient of the CRM Women’s Power 50 award and hold accreditations that include Certified Information Security Manager (CISM), Certified in Risk and Information System Controls (CRISC), Certified Information Systems Auditor (CISA) and former Payment Card Industry Qualified Security Assessor (QSA). She is also a 2013 Master’s of Business Administration graduate of the Saint Joseph’s University Haub School of Business.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes