- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, March 9, 20227:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:- VIP / Exclusive
7:30 am - 8:20 amThis roundtable discussion is for our Advisory Council members only.
7:30 amISSA New England Chapter Meeting and PresentationOpen to members and prospective members | Breakfast providedSr. Principal, Security Risk Management, VerizonRegistration Level:- Open Sessions
7:30 am - 8:20 amDiscussion moderated by David Dumas, chapter vice president.
7:30 am[PLUS Course] Developing a Comprehensive Ransomware Security ProgramPart 1Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
7:30 am - 8:30 amRansomware is a specific and extremely harmful type of malware used by cybercriminals to extort money from individuals, organizations, and businesses. The infections block access to your data until you make a ransom payment, at which point you’re supposed to regain access. In reality, nearly 40% of the victims who pay the ransom never get their data back and 73% of those who pay the ransom are targeted again later – which is why everyone must protect against ransomware. In the past year, targeted ransomware attacks against government agencies, educational establishments, and healthcare providers have raised the stakes for those charged with protecting organizations. Ransomware attacks not only damage business, but also put health, safety, and lives at risk.
Active Directory has become a popular pathway for ransomware attacks. The main reason cybercriminals target Active Directory is because it serves as a gateway to the rest of the network as a service for managing, networking, grouping, authenticating, and securing users across corporate domain networks. Users and computers rely on Active Directory to access various network resources. As such, cybercriminals understand that ransomware attacks on Active Directory can wreak havoc on any organization, making it an excellent extortion mechanism.
In the fight against ransomware, organizations need to strategically prepare to protect against and respond to attacks. However, many IT organizations struggle to prioritize the appropriate initiatives to combat and mitigate the impact of ransomware. With more tools, technologies and processes than ever, a comprehensive ransomware security program is a must to help detect, prevent, respond and limit the overall exposure to ransomware and other destructive attacks. This comprehensive training course will help organizations to design, build, and manage a comprehensive Ransomware Security Program.
Part 1: Ransomware Overview (90 Minutes)
1.1 – Background & Introduction
- What is ransomware?
- How do ransomware attacks work?
- How ransomware attacks have evolved (2016) – WannaCry and Petya / NotPetya
- How ransomware attacks have evolved (2021) – REvil and Ryuk
- Top six Ransomware Attacks of 2021 / 2022
1.2 – Today’s Ransomware Problem
- Human Operated Ransomware Attacks (Double Extortion)
- Supply Chain Attacks
- Ransomware as a Service (RaaS)
- Attacking Unpatched Systems
- Phishing Emails
- Penetration Testing Tools (Cobalt Strike)
1.3 – Ransomware Attacks against Information Technology (IT) Networks and Systems
- Ransomware attack stages (initial access, lateral movement, privilege escalation, extortion, encryption)
- The Ireland Health Service Elective (HSE) ransomware attack
- How Conti Ransomware works
- Lessons learned from the HSE Ransomware Attack
1.4 – Ransomware Attacks against Operational Technology (OT) Networks and Systems
- Ransomware attack stages (initial access, lateral movement, privilege escalation, extortion, encryption)
- The Colonial Pipeline ransomware attack
- How DarkSide Ransomware works
- Lessons learned from the Colonial Pipeline Ransomware Attack
Part 2: Understanding Ransomware Attacks (90 Minutes)
2.1 – The MITRE ATT&CK Framework
- What are the current Attack Models and how do they work?
- What is the MITRE ATT&CK Framework?
- What are MITRE Tactics?
- What are MMITRE Techniques?
- What are MITRE Procedures?
- What is the MITRE D3FEND Matrix?
2.2 – Mapping Ransomware Tactics, Techniques, Procedures (TTPs) to MITRE ATT&CK
- Mapping REvil Ransomware to the MITRE ATT&CK Framework
- Mapping Conti Ransomware to the MITRE ATT&CK Framework
- Mapping Maze Ransomware to the MITRE ATT&CK Framework
- Mapping Ryuk Ransomware to the MITRE ATT&CK Framework
- Mapping DarkSide Ransomware to the MITRE ATT&CK Framework
2.3 – Pen Testing Tools and the MITRE ATT&CK Framework
- The Pen Testing Execution Standard (PTES)
- NIST SP 800-115 Technical Guide to Information Security Testing and Assessment
- The Cobalt Strike Penetration Testing Platform
- Mapping Cobalt Strike to the MITRE ATT&CK Framework
2.4 – Understanding Cyber Threat Intelligence (CTI)
- What is Cyber Threat Intelligence (CTI)?
- How does Cyber Threat Intelligence Work?
- Who are the main providers of Cyber Threat Intelligence?
- What are the main themes of Cyber Threat Intelligence in 2021?
Part 3: Building a Ransomware Security Program (90 Minutes)
3.1 – Ransomware Security Controls / Guides
- CISA_MS-ISAC Ransomware Guide
- Higher Education Ransomware Playbook
- CSBS Ransomware Self-Assessment Tool
- NIST IR 8374 – NIST Cybersecurity Framework (CSF) Guidance on Ransomware
- US Government Interagency Technical Guidance – How to Protect your Networks from Ransomware
- Canadian Centre for Cyber Security Ransomware Playbook
3.2 – NIST SP 1800 Practice Guides on Ransomware
- NIST SP1800-25 – Identifying and Protecting Assets Against Ransomware and Other Destructive Events
- NIST SP 1800-26 – Detecting and Responding to Ransomware and Other Destructive Events.
- NIST SP 1800-11 – Recovering from Ransomware and Other Destructive Events
3.3 – Free Cybersecurity Tools and Services > https://www.cisa.gov/free-cybersecurity-services-and-tools
- Tools that focus on reducing the likelihood of a damaging cyber incident
- Tools that focus on detecting malicious activity quickly
- Tools that focus on responding effectively to confirmed incidents
- Tools that focus on maximizing resilience to a destructive cyber event
3.4 – Building a Ransomware Security Program
- Cybersecurity Program Assessment: based on CIS Security Controls Scorecard
- Ransomware Program Assessment: based on CISA MS-ISAC Ransomware Controls Scorecard
- Develop a Plan of Action and Milestones (POA&M)
- Document an Executive Summary
- Conduct Read Team, Blue Team, Purple Team and Table-Top Exercises
7:30 am[PLUS Course] Cloud Computing: Know Where You Want to GoPart 1: Understanding Today's Heterogeneous EnvironmentDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members AllianceRegistration Level:- SecureWorld Plus
7:30 am - 8:30 amIn today’s modern computing world, many of us are seeking the benefits of Cloud Computing. We’ve learned that it’s not always cheaper and that we have to design smartly in order to gain advantages, secure the architecture, and reduce risk. The major vendors in this space are attempting to make the transformation easier with their offerings and competitiveness. There is a plethora of offerings out there and it can get confusing unless you take the time and plan ahead, talk with others in similar industries and learn from events like this one.
In this course, we’ll take a holistic view of managing security and minimizing risk in the cloud. How to best develop operational effectiveness, take advantage of smart automations, and learn which metrics are right for us and our heterogeneous challenges. We’ll learn about the threats out there today and how to best keep them at bay.
Whether you are in the Cloud, looking to upgrade your residence there, or whether you are looking to move into the Cloud realm, this course is for you if security, risk reduction, automation, and metrics, is something you are concerned about. Enroll in this course and let’s talk about it. We’ll hold four one-hour sessions to get us started with our secure digital transformation.
Part 1: Know Where You Want to Go – Understanding Today’s Heterogeneous Environment
- Fundamentals of Cloud Computing
- Discover AWS
- Discover Azure
- Discuss the other vendors, GCP, Rackspace, and more.
Part 2: Review of Security Architectures
- Review the many layers of Security in the Cloud
- Discuss modern day service weaknesses and attacks
- Learn some nuances of modern day design
Part 3: Design Principles for Security
- Harden your baselines
- Follow the frameworks
- Use the tools effectively
Part 4: Assessment of Secure Design
- Establish metrics (OKRs, KPIs, KRIs, and more)
- Realize the advantages of cloud reporting systems
- Reporting to the Board
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 3:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:30 am[Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret ServiceFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceAssistant to the Special Agent in Charge, U.S. Secret ServiceTechnical Staff Assistant (Special Agent), Boston Field Office, United States Secret ServiceManaging Partner, SideChannelRegistration Level:- Open Sessions
8:30 am - 9:15 am9:15 amNetworking BreakRegistration Level:- Open Sessions
9:15 am - 9:45 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:45 amBenefiting from CISA's Expanding Role in CybersecurityDirector, Cybersecurity Architecture, Draper Labs; Colonel, U.S. Army Reserve; President, New England Chapter, MCPARegistration Level:- Conference Pass
9:45 am - 10:30 amKey Takeaway:
Walk away from this session with a better understanding of how you can partner with and benefit from CISA and its resources.For years, cybersecurity leaders have been asking for more help from the federal government, and it is finally happening. Now more than ever, the federal government has free resources to help you fight against sophisticated cyber actors and nation-states with the ability to disrupt, destroy, or threaten the delivery of essential services. With the risk and potential consequences of cyber events, strengthening the security and resilience of cyberspace has become an important homeland security mission, and CISA can help.
9:45 amPCI 4.0: What Is Coming?Director, Audit and Compliance, CipherTechs, Inc.Registration Level:- Conference Pass
9:45 am - 10:30 amPCI 4.0 is coming out at the end of first quarter 2022. There are many changes that are involved with wording, testing, and the forms for submission. This session will talk about some of the changes that may affect you for the SAQs and the ROCs, such as what additional documentation and activities you will need prior to having PCI 4.0 implemented by the end of 2024 going into 2025.
9:45 amChains of Behavior: From Ransomware to Supply ChainsVP & CISO, ZscalerRegistration Level:- Open Sessions
9:45 am - 10:30 amOur collective goal is to reverse the advantage in cyber conflict enjoyed by attackers and to give defenders an asymmetric edge. To date, that hasn’t been working as most of our tools and technologies are geared to yesterday’s cyberwar. The key here is to of course align with the business and deploy people, process, and technology correctly; but we need to lean into behavioral telemetry, new data structures, and focus on the results we want. This will help us get ahead of emerging Supply Chain threats now visible beneath the waterline and to counter the scourge of ransomware. It’s time to put the older technologies and processes of security in their right place and to embrace new and emerging technologies that work, to experiment, and to innovate in ways that the industry has lacked for at least a decade. We are headed to a future-proof security stack, and it’s attainable now!
9:45 amHacking Your Organization: 7 Steps Cybercriminals Use to Take Total Control of Your NetworkData-Driven Defense Evangelist, KnowBe4Registration Level:- Open Sessions
9:45 am - 10:30 amThe scary fact is that the majority of data breaches are caused by human error. With so many technical controls in place hackers are still getting through to your end users. How are they so easily manipulated into giving the cybercriminals what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.
In this session, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.
Roger will show you:
- How detailed data is harvested using public databases and surprising techniques
- Tricks used to craft a compelling social engineering attack that your users WILL click
- Cunning ways hackers deliver malicious code to take control of an endpoint
- Taking over your domain controller and subsequently your entire network
But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it’s too late!
10:40 amCongratulations on CISO, Now What?CISO & Data Privacy Officer, EmburseRegistration Level:- Conference Pass
10:40 am - 11:25 amIn this talk, Bill Bowman will lay out a plan for your first year on the job. He will give you guidance on building relationships, finding the skeletons, advocating for funding, and building your team. Identifying the risks, articulating a path forward, and maturing the organization will be the take- aways. If you are forced into the role or finally arriving after years of building your brand, this talk will give you confidence to walk into your boss’s office tomorrow morning and chart the path forward as the Chief Information Security Officer.
10:40 amAn Enlightened Path to AppSec Nirvana from Code to CloudDirector of Application Security, GoodLeap LLCRegistration Level:- Conference Pass
10:40 am - 11:25 amKey Takeaway:
You’ll leave with an executable roadmap to improving the security of your applications.This session will be high-level and cover the various elements of a comprehensive application security program and how the pieces fit together. We’ll also review the various secure development models to equip you with a choice of standards you can adopt. Finally, we’ll cover sequencing and speed so you can follow a path to achieving your own AppSec nirvana.
Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)
10:40 amA Macroscopic Review of Cloud Exploits and ExposuresPrincipal Data Scientist, Rapid7Registration Level:- Open Sessions
10:40 am - 11:25 amIn this talk, we’ll take a moment to systematically review some of the most prominent cloud exploits in 2021 that have since been publicly disclosed. We’ll cover details about the industry distributions that were known to be harmed, the types and scale of exposures that occurred, and the underlying factors that contributed to exposure.
We’ll also supplement that review of the state of cloud security in 2021 with an assessment of internet-wde telemetry collected across the entirety of the IPv4 space to identify exposures that could hint at opportunistic targets within cloud infrastructures.
With this knowledge, organizations can take focused, proactive measures to mitigate the risks facing cloud implementations.
10:40 amCongrats on the Anniversary of the Unknown Breach – Where Is the Threat Actor Now?Sr. Security Consultant, GigamonRegistration Level:- Open Sessions
10:40 am - 11:25 amIf you talk to any mason out there, they will tell you that there are two types of cement: cement that is going to crack and cement that has already cracked. Likewise, there are two types of business environments: those that will be breached and those that are already breached.
In this session, we will talk about those environments already breached. We will identify considerations you need to keep in mind before a threat actor extorts money from the business, steals your intellectual property, causes irreversible harm to the business’s reputation, or attempts to compromise your employees.
11:30 am[Lunch Keynote] Demystifying Zero Trust and Its Role in CybersecurityCEO & Co-Founder, ThreatLockerRegistration Level:- Open Sessions
11:30 am - 12:30 pmLocation / Room: Keynote TheaterThe Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
11:30 amAdvisory Council Lunch Roundtable - (VIP / Invite Only)The Future of WorkRegistration Level:- VIP / Exclusive
11:30 am - 12:30 pmSponsored By:
12:30 pmNetworking BreakRegistration Level:- Open Sessions
12:30 pm - 1:00 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pm[Panel] Cloud: Doing More with LessSr. Security Consultant, GigamonSecurity Strategist, MimecastSenior Principal Engineer, ForgeRockSr. Systems Engineer, Abnormal SecurityDirector of Cloud Security Sales, FortinetCISO, Cyber Guide LLCRegistration Level:- Open Sessions
1:00 pm - 1:50 pmLocation / Room: Keynote TheaterThe cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.
1:00 pm[Panel] The Current Threat LandscapeVP of Product, BalbixSr. Solution Architect, CymulateSolutions Engineer, TessianVice President, Product, Recorded FutureDirector, Solutions Engineering and Alliances, AutomoxCybersecurity Threat Hunter and Incident Responder, Eversource EnergyRegistration Level:- Open Sessions
1:00 pm - 1:50 pmLocation / Room: Room 103If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
1:00 pmSpeed Kills Malware: Why 20ms Makes All the DifferenceDirector of Sales Engineering, Deep InstinctRegistration Level:- Open Sessions
1:00 pm - 1:50 pmDuring this session, we will examine the approaches to prevent and detect threats with AI, ML, and DL, and dive into how deep learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more on the chronology of an unknown attack and why 20ms is the difference between security and a breach.
- 1.5 secs: Ransomware begins to spread, infect, and encrypt
- 3 secs: Malware has control and elevated privileges
- 1 minute: Avg time to detect unknown malware
2:00 pmA Whole Lotta BS (Behavioral Science) About CybersecurityExecutive Director, National Cybersecurity AllianceRegistration Level:- Conference Pass
2:00 pm - 2:45 pmLet’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security. We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.
2:00 pmIncident Response: Look Who's TalkingAmericas Lead for Human Cyber Risk and Education, EYRegistration Level:- Conference Pass
2:00 pm - 2:45 pmKey Takeaway:
Learn the essential elements of crisis communications and reputation control for the cybersecurity team and the elements not exercised in most Incident Response plans.The ability to control the narrative during a cyber event will shape public perception of the company’s preparedness for a cyber event. In a cyber crisis, for everyone outside of the technical teams, perception is reality, and that reality may affect the company’s reputation long after the incident is over. Businesses have a significant reliance on technology; a breach of customer trust can be just as devastating as a network breach. Employees who are unsure of the circumstances will not hesitate to share on social media. Does the Incident Response plan account for reputation control? How will the company handle crisis communications during a cyber incident?
2:00 pmThreat Detection: Beyond PreventionSenior Solution Stragegist, ConnectWiseRegistration Level:- Open Sessions
2:00 pm - 2:45 pm2:00 pmISACA New England Chapter MeetingOpen to all attendeesRegistration Level:- Open Sessions
2:00 pm - 2:45 pm2:45 pmNetworking BreakRegistration Level:- Open Sessions
2:45 pm - 3:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:15 pmAccessIT - How Does Your Crisis Management Playbook Stack up During a Real-World Conflict?CISO, Steward Health CareCISO, Houghton Mifflin HarcourtVP, Infrastructure & Security, Emsi Burning GlassCISO, AfinitiRegistration Level:- Open Sessions
3:15 pm - 4:00 pmLocation / Room: Keynote TheaterWith the threat of cyberwarfare looming stateside, is your company prepared for the possible digital infrastructure and data attacks against them? Hear Andrew Smeaton, CISO for DataRobot, share his experiences of executing a crisis management plan in the midst of real-time warfare. Andy will be joining us to share what he has witnessed happen on the ground in Ukraine and discuss with fellow CISO panelists how InfoSec executives are pivoting their cyber skills to aid in humanitarian efforts and why your organization should be reviewing your crisis management playbook to adapt to conflict in real-time.
3:15 pm"Birds of a Feather" Discussion GroupTopic: Prioritizing Current ThreatsSecretariat Security Liason, Massachusetts Executive Office of Health and Human ServicesRegistration Level:- Open Sessions
3:15 pm - 4:00 pmDiscussion moderator: James Cusson
What are the security issues that keep you up at night? Connect with peers who are experiencing similar pain points and experts who can offer best practices in a casual, collaborative environment.
3:15 pmHappy HourSponsored by Atlantic Data SecurityRegistration Level:- Open Sessions
3:15 pm - 5:00 pmLocation / Room: Boylston Hallway3:15 pm[PLUS Course] Developing a Comprehensive Ransomware Security ProgramPart 2Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
3:15 pm - 4:30 pm3:15 pm[PLUS Course] Cloud Computing: Know Where You Want to GoPart 2: Review of Security ArchitecturesDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members AllianceRegistration Level:- SecureWorld Plus
3:15 pm - 4:30 pmWhether you are in the Cloud, looking to upgrade your residence there, or whether you are looking to move into the Cloud realm, this course is for you if security, risk reduction, automation, and metrics, is something you are concerned about. Enroll in this course and let’s talk about it.
- Review the many layers of Security in the Cloud
- Discuss modern day service weaknesses and attacks
- Learn some nuances of modern day design
- Thursday, March 10, 20227:00 amRegistration openRegistration Level:7:00 am - 3:00 pmLocation / Room: Registration Desk / Lobby
Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 am[Advisory Council Roundtable] Learn from Your Peers: What's Working and What's Not with Application SecurityVIP / Invite OnlyDirector, WhiteSourceRegistration Level:- VIP / Exclusive
7:30 am - 8:20 amLocation / Room: 101Application security is a rapidly changing area, given the rapid adoption of cloud-native architectures, open source software, containers, and DevOps. Surveys indicate that application security is the #1 area of new investment by large enterprises. Attend this session to share with your peers and learn how other organizations are struggling (or succeeding!) with their application security programs. Specific topics that will be explored during this session include:
- Lessons learned from the Log4j exercise
- How security teams can gain developers’ trust and collaboration
- Can a single set of security tools meet the needs of different development teams
- How can you best secure Infrastructure as Code
7:30 am[PLUS Course] Developing a Comprehensive Ransomware Security ProgramPart 3Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
7:30 am - 8:30 am7:30 am[PLUS Course] Cloud Computing: Know Where You Want to GoPart 3: Design Principles for SecurityDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members AllianceRegistration Level:- SecureWorld Plus
7:30 am - 8:30 amWhether you are in the Cloud, looking to upgrade your residence there, or whether you are looking to move into the Cloud realm, this course is for you if security, risk reduction, automation, and metrics, is something you are concerned about. Enroll in this course and let’s talk about it.
- Harden your baselines
- Follow the frameworks
- Use the tools effectively
8:00 amExhibitor Hall openRegistration Level:8:00 am - 3:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:30 am[Opening Keynote] CISO Panel: The Future of WorkCISO, City of BostonCISO, DraperCybersecurity Advisor (CSA), Integrated Operations Division | Region 1, CISACISO, Massachusetts Bay Transportation Authority (MBTA)Registration Level:- Open Sessions
8:30 am - 9:15 amLocation / Room: Keynote Theater9:15 amNetworking BreakRegistration Level:- Open Sessions
9:15 am - 9:45 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:45 amReframing the Conversation around Cybersecurity FatigueFrom Military Conflict to Therapy and AddictionCISO, Steward Health CareRegistration Level:- Conference Pass
9:45 am - 10:30 am9:45 am5 Steps to Zero TrustSenior Director of Sales Enablement, VaronisRegistration Level:- Open Sessions
9:45 am - 10:30 amProtecting the edge of your network isn’t enough in a world where anyone can access data from anywhere. The principles of Zero Trust turn the traditional perimeter-centric model on its head and focus on securing what matters most: the data.
See how a data-centric approach to security can help you defend against ransomware, APTs, and insider threats.
We’ll break down how to get to Zero Trust, covering how to:
- Identify sensitive data with scalable classification
- Create an audit trail around sensitive data
- Architect microperimeters by limiting who has access to data
- Monitor for potential threats
- Use automation for remediation and response
Learn about what Zero Trust means and concrete steps you can take to implement it in practice.
9:45 amThe 3 Biggest Challenges Security Teams HaveAnd How to Overcome ThemChief Evangelist, Team CymruRegistration Level:- Open Sessions
9:45 am - 10:30 amIn this session, we’ll look at three practical challenges that seriously impede an organization’s security strategy. In the 2021 State of Threat Hunting and the Role of the Analyst survey, 66% of 1778 respondents said they lacked visibility into their own network and 56% said they lacked visibility across their supply chains.
Lack of visibility, the existence of legitimate business processes that cannot be blocked, and the fact that large organizations are plagued with alerting noise present challenges that can only be overcome by looking at your enterprise and third-party ecosystem from the perspective of the cyber attacker.
During this presentation, we’ll illustrate the operational and financial outcomes associated with making external threat hunting a strategic priority. We also walk through a Cobalt Strike C2 mapping exercise as an example of what elite teams at many organizations are doing today to put themselves in a position to do the following…
-
- Block phishing attacks
- Identify impending attacks against themselves and third parties
- Detect compromises within supply chain enterprises
- Improve alert validation and prioritization
- Optimize incident response from root cause analysis to remediation
9:45 amWhy Wait? Find Cloud Risks and Threats in Real Time with Stream DetectionPrincipal Security Architect, SysdigRegistration Level:- Open Sessions
9:45 am - 10:30 amCloud service providers offer cost-effective and efficient collection and storage of cloud logs, which is a rich source of data for DevOps and security teams. Copying logs out of the cloud to query them later is expensive and complex to manage. With stream detection, you can find risks and threats in real-time and fix issues faster while saving time and money.
Rich Schofield, Principal Security Architect at Sysdig, will share how stream detection has evolved from the era of securing network computing and is being applied for securing the cloud and containers today.
10:40 amA Holistic Approach to Third-Party Risk ManagementVP, CISO, Surgery Partners, Inc.Registration Level:- Conference Pass
10:40 am - 11:25 amKey Takeaway: Tips on creating a holistic third-party risk management program.
This session will show how Blue Cross & Blue Shield of Rhode Island (BCBSRI) manages third-party risk. The team will give you a sense of how they have expanded beyond traditional “questionnaires” into a full-cycle program encompassing threat intelligence, privacy, business continuity, enterprise risk, and exception management.
Presentation Level: GENERAL (InfoSec best practices, trends, solutions, etc.)
10:40 amDriving Business Strategy and Growth Using CybersecuritySr. Demand and Delivery Director, Data ProtectionRegistration Level:- Conference Pass
10:40 am - 11:25 amTraditionally, cybersecurity is often viewed as a means to reducing risks to an organization, thwarting the attacks of threat actors and securing company assets and infrastructure. When we examine the strategic goals and objectives that organizations undertake to promote their growth and success, we can often identify the interlinkage between business objectives and the services cybersecurity provides. By shifting the focus on how cybersecurity could enable an organization to bring products to market faster, make it easier for customers to conduct business with the company, create an environment to attract and retain employees and become the vendor of choice to our customers, we can strengthen our relationship with executive leadership and board of directors, become a trusted partner to the business, serve as a trusted advisor to line of business owners and shift the paradigm of cybersecurity from risk reduction cost center to a business enablement service line. 10:40 amDéjà Vu All Over Again: The Student Body Left ProblemCISO of North America, CheckmarxRegistration Level:- Open Sessions
10:40 am - 11:25 amRecent Common Vulnerabilities and Exposures (CVE) announcements like Apache Log4j have upended software teams all over the world. Scheduled work comes to a grinding halt, and triage and emergency surgery must be performed on applications. If not prepared, this unplanned work can derail productivity for weeks or even months. The longer it takes, the more pressure is applied by management. You can reduce the impact.
Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps.
A potential scenario: the security team has called an emergency meeting. A new vulnerability has been publicly disclosed that impacts not only your software, but your company and your customers. Will the required remediation take hours or even weeks to complete? It depends on your preparedness.
To improve your readiness and reduce impact, we will look at tips and actions you can take now.
- Learn more about the scope of the mess that was created by the Log4j CVE.
- Why most companies struggled to address it quickly.
- What steps you can take now to be ready for the next one.
10:40 amThreat Perception and Security GraphGlobal Security Strategist, Google Cloud SecurityRegistration Level:- Open Sessions
10:40 am - 11:25 amLocation / Room: 103Trevor Welsh, who leads Global Security Strategy at Google, will discuss how detection can evolve to address threats of today and tomorrow. This includes conversation about insider work being done to shift left in the detection and response process.
11:30 am[Lunch Keynote] Cybersecurity Training & Education: An 'All-Hands' Approach to Filling the Skills GapFounder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston CollegeCEO & Founder, HYCU, Inc.Director of Cybersecurity, Massachusetts Port AuthorityFulbright Scholar, Boston College Cybersecurity Graduate ProgramsRegistration Level:- Open Sessions
11:30 am - 12:30 pmLocation / Room: Keynote TheaterIt is estimated that there will be 3.5 million cybersecurity job openings in 2025 and, by some estimates, the global cybersecurity workforce needs to grow at 145 percent each year simply to keep pace with the demand for skilled talent. All of this while each day there is a headline grabbing news piece involving another cyberattack resulting in the theft of digital information (e.g., sensitive and private personal data, intellectual property, trade secrets, financial information, classified and confidential materials) or the disruption of government and business functions. What to do?
In our address, we will discuss and provide practical advice on:
- Ways in which academia, private industry, and government have been collaborating to address the cybersecurity skills gap and, through research, address today’s cyberthreats;
- Strategies to develop training programs not only for cyber professionals, but also staff, administrators, business managers, and executives; and
- A path forward to address the skills gap and the need for diversity in the profession
11:30 amAdvisory Council Roundtable Lunch [VIP / Invite Only]Topic: De-Risking IT/OT ConvergenceDirector, North America Systems Engineering, Skybox SecurityRegistration Level:- VIP / Exclusive
11:30 am - 12:30 pmThe convergence of operational technology (OT) and IT systems creates complexity and places organizations at high risk of cyber-attacks. The proliferation of networked sensors (IoT) has increased the attack surface, taxing the responsiveness of network perimeter security and vulnerability management teams. Concepts like ZTA and SASE, while conceptually beneficial, can introduce even more uncertainty to the hybrid environment. These problems used to be confined within the data center walls but Digital Transformation projects have greatly increased the scope of challenges. It’s not just an IT problem anymore as industrial control systems and the like look to leverage the benefits of automation and centralized control via the network.
We will explore some of these challenges, approaches taken by your fellow leaders, and outcomes.
12:30 pmNetworking BreakRegistration Level:- Open Sessions
12:30 pm - 1:00 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pm[Panel] The Battle to Control the EndpointsCEO & Co-Founder, ThreatLockerCEO & President, Apexa IQSenior Sales Engineer, Open SystemsSenior Security Solutions Architect, SecuronixResearch Security Officer, Massachusetts Institute of TechnologyRegistration Level:- Open Sessions
1:00 pm - 1:50 pmLocation / Room: Keynote TheaterIn a recent survey, the SecureWorld media team uncovered that a whopping 30% of IT professionals admitted they didn’t actually know if they had visibility on all the endpoints within their organizations! With close to a thousand endpoints (in the majority of those surveyed) that included: servers, office PCs, printers, employee-owned devices, smart watches, IoT—the list goes on and on. What does the cloud do to impact this count? What was missed? Join our experts as they help us gain better visibility into the battle to control ALL the endpoints.
1:00 pm[Panel] Securing the Code: AppSec and DevOps 101Principal Security Strategist, SynopsysPresident & Co-Founder, HackEDUPrincipal Security Engineer, Salt SecurityCISO of North America, CheckmarxRegistration Level:- Open Sessions
1:00 pm - 1:50 pmEveryone says you’ve got to bake security into the development process, but it doesn’t always get done. Speed to market and “other considerations” can get in the way of good, clean secure code. Some developers share code or borrow from open-source platforms on the internet. Is that safe? How do you work with your DevOps teams to create a collaborative, proactive environment where they have the time and resources to build that security in from the beginning? How do you deal with burnout and fatigue? Our panel will address these concerns and more to help you get a handle on securing the code.
1:00 pmCNAPP: Finding the Worst Security RisksEnterprise Solutions Engineer, WizRegistration Level:- Open Sessions
1:00 pm - 1:50 pmAre you familiar with the new category of CNAPP? Security challenges in the Cloud are different than those that exist on perm, but the overall processes to build and maintain a secure environment are the same. A cloud-native application protection platform is a simplified security architecture that enables enterprises to holistically benefit from the cloud-native ecosystem. It enables them to leapfrog the cost and complexity of siloed security products to a continuous security fabric without major investments in tools or developer talent. Learn first hand from the experts on the ROI/Benefits of CNAPP and real-world approaches to deploying in your existing environment.
2:00 pmThe Last 2%: The Defense in Depth Layers No One Wants to Talk AboutPerception Management, Value, and TrustVP & CISO, Blue Cross Blue Shield of MassachusettsRegistration Level:- Conference Pass
2:00 pm - 2:45 pmHaving an effective security program is more than just having great technology. It’s about turning data into information and information into action. True success comes in the form of the business “wanting” you involved because they trust you and value the services your team provides. It doesn’t happen overnight and like any other part of your program, it needs to be deliberately designed in.
2:00 pm(ISC)2 Chapter Meeting - Open to all attendeesDiscussion Topic: Cyber Pros, Know Your WorthBoard Member, (ISC)2 Eastern Massachusetts; President, CyberSNRegistration Level:- Open Sessions
2:00 pm - 2:45 pmLocation / Room: 103The labor market has changed dramatically over the last two years for cybersecurity professionals. Learn how to communicate the value of your experience, skills, and credentials to maximize your income potential over the course of your career.
- Understand the value of your skills, experience, and interests in today’s market
- Identify the highest impact areas for personal and career development
- Surface and share what you truly do and have it valued appropriately by the market
- Be informed about the market to make smarter career and job decisions
2:00 pmRemediating Critical Vulnerabilities in 12 Hours or Less: Lessons Learned from Log4jSVP, Customer Solutions Architecture and Engineering, QualysRegistration Level:- Open Sessions
2:00 pm - 2:45 pm2:00 pm[Panel] Don't Let the Past Cloud Your Vision, Look Ahead to the Future of Cloud SecurityPrincipal Architect, Sales Engineering, ImpervaHead of Engineering, East US, Check Point Software TechnologiesDirector of Netskope Threat Labs, NetskopeSr. Sales Engineer, Orca SecurityDirector, Security Architecture, AccessIT GroupRegistration Level:- Open Sessions
2:00 pm - 2:45 pmPrior to the COVID-19 outbreak, people had mixed feelings and results when it came to cloud security, partly because they didn’t really understand it. Now, as we are climbing out of the pandemic, organizations are sharing their success stories from the cloud over the last few years. Join our experts as they share some of these successes, as well as a new path forward!
2:45 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
2:45 pm - 3:15 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:15 pmDiversity Is the Result of Inclusive CulturesFounder and CEO, CyberSN and Secure DiversityRegistration Level:- Conference Pass
3:15 pm - 4:00 pmThis talk centers on a 9-piece framework to help you create inclusive cultures that will result in diverse workplaces, called the Standards of Inclusive Behavior. We will explore how each of the nine standards for interactions impacts our professional environments and how to use this framework to create equality and diversity of thought. When we establish a baseline of standards for human interactions that are framed through the window of cybersecurity, our teams and organizations can excel because expectations are clear and fair.
Our security, privacy, economic well-being, and mental health depend on the ability to engage others positively and this is a skill that employers rarely teach.
3:15 pmExperiment-Driven Threat ModelingCounter Threat Unit Researcher, SecureworksRegistration Level:- Open Sessions
3:15 pm - 4:00 pmCreating and maintaining useful threat models amid an ever-evolving threat landscape is no easy task. In this talk, Trenton will share how your organization can effectively leverage collaborative adversaries to run experiments that improve threat models and exercise defenders.
3:15 pm[PLUS Course] Developing a Comprehensive Ransomware Security ProgramPart 4Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
3:15 pm - 4:30 pm3:15 pm[PLUS Course] Cloud Computing: Know Where You Want to GoPart 4: Assessment of Secure DesignDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members AllianceRegistration Level:- SecureWorld Plus
3:15 pm - 4:30 pmWhether you are in the Cloud, looking to upgrade your residence there, or whether you are looking to move into the Cloud realm, this course is for you if security, risk reduction, automation, and metrics, is something you are concerned about. Enroll in this course and let’s talk about it.
- Establish Metrics (OKRs, KPIs, KRIs, and more)
- Realize the advantages of cloud reporting systems
- Reporting to the Board
4:00 pmCISO Happy HourVIP / Invite OnlyRegistration Level:- VIP / Exclusive
4:00 pm - 5:30 pmJoin your fellow CISOs and senior leaders for complimentary hors d’oeuvres, beverages, and conversation following the conclusion of Day 1. This is a great opportunity to network with other security professionals from the area and to discuss the hot topics from the day.
Hosted by The Cyber Breakfast Club™ and sponsored by CyberSN and CYBER BUYER. Register here: https://www.eventbrite.com/e/274216989397
- Abnormal SecurityBooth: 136
Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.
- AccedianBooth: 125
Accedian is the leader in Performance Assured Networking™ for mobile backhaul, business services, and cloud connectivity. Our solutions provide service providers and network operators with visibility into their networks, and this differentiating ability empowers them to optimize, improve, and manage the performance of their network, thereby delivering the best possible experience to their subscribers.
- AccessIT GroupBooth: AccessIT Partner Pavilion
AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.
AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.
- Apexa iQBooth: 247
ApexaiQ™ is the Most Relevant IT risk rating score in the market.
The Apexa platform discovers and rate your entire IT estate in minutes.
KNOW EXACTLY WHERE YOU STAND AND WHAT TO DO NEXT.
With ApexaiQ™ you instantly get:
- Insight into every device on your network.
- A Comprehensive single-dashboard view with security gaps — including IT hygiene and obsolescence status.
- Compliance and audit reports.
- A Prioritized list of exactly what’s needed to make lifecycle improvements, reduce technical debt, and eliminate security risks.
- Arctic Wolf NetworksBooth:
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- Area 1 SecurityBooth: 235
Area 1 Security is the only company that preemptively stops Business Email Compromise, malware, ransomware and targeted phishing attacks. By focusing on the earliest stages of an attack, Area 1 stops phish — the root cause of 95 percent of breaches — 24 days (on average) before they launch. Area 1 also offers the cybersecurity industry’s first and only performance-based pricing model, Pay-per-Phish.
Area 1 is trusted by Fortune 500 enterprises across financial services, healthcare, critical infrastructure and other industries, to preempt targeted phishing attacks, improve their cybersecurity posture, and change outcomes.
Area 1 is a Certified Microsoft Partner, and Google Cloud Technology Partner of the Year for Security.
- Armis, IncBooth: 114
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
- ASISBooth:
ASIS International is the world’s largest membership association for security professionals. With hundreds of chapters across the globe, ASIS is recognized as the premier source for learning, networking, standards, and research. ASIS ensures its members and the security community have access to the intelligence and resources necessary to protect their people, property, and information assets. www.asisonline.org
- Atlantic Data SecurityBooth: 114
Since 1993, Atlantic has been representing industry leading security products to help get customers to an acceptable level of IT security risk. Atlantic works extensively with both large enterprises and SMB markets, understanding their business goals before any solution is recommended. Atlantic’s strict focus ensures that customers receive the highest level of both service and support.
- AuthomizeBooth: 253
Authomize continuously monitors your identities, access privileges, assets, and activities, in order to secure all your apps and cloud services. Our granular visibility across IaaS, SaaS, and various data services enables organizations to ensure effective control over their access privileges and the security of their assets.
- AutomoxBooth: 338
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- BalbixBooth: 242
Balbix is the world’s leading platform for cybersecurity posture automation. Using Balbix, organizations can discover, prioritize and mitigate unseen risks and vulnerabilities at high velocity. With seamless data collection and petabyte-scale analysis capabilities, Balbix is deployed and operational within hours, and helps to decrease breach risk immediately. Balbix counts many global 1000 companies among its rapidly growing customer base and was named a “Cool Vendor” by Gartner in 2018.
- BlackBerry CybersecurityBooth: 125
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
- BlackCloak, IncBooth: 246
BlackCloak provides digital protection for corporate executives, Board Members, and high-profile and high-net-worth individuals and their families. Its award-winning Concierge Cybersecurity & Privacy™ Platform combines proprietary software with white-glove client service to prevent cyberattacks originating in an enterprise leader’s personal life from moving laterally into the organization. The Platform also protects individuals and their families from financial fraud, identity theft, targeted cyberattacks, reputational damage and other threats to privacy and security. Thousands of CISOs, CIOs, CFOs, and General Counsels trust BlackCloak to protect the personal privacy, devices, and homes of their most important personnel so they can continue to focus exclusively on what they do best: protecting the enterprise from cyberattack.
- Black KiteBooth: 129
At Black Kite, we’re redefining vendor risk management with the world’s first global third-party cyber risk monitoring platform, built from a hacker’s perspective.
We’re committed to improving the health and safety of the entire planet’s
cyber ecosystem with the industry’s most accurate and comprehensive cyber intelligence. While other security ratings service (SRS) providers try to narrow the scope, Black Kite provides the only standards-based cyber risk assessments that analyze your supply chain’s cybersecurity posture from three critical dimensions: technical, financial and compliance.
Check us out at: https://blackkite.com/
- CentripetalBooth: 134
Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.
- Checkmarx Inc.Booth: 341
Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.
- Check Point Software TechnologiesBooth: 114
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- CobaltBooth:
Cobalt’s Pentest as a Service (PtaaS) platform is modernizing traditional pentesting. By combining a SaaS platform with an exclusive community of testers, we deliver the real-time insights you need to remediate risk quickly and innovate securely.
- ConnectWiseBooth: 345
ConnectWise is the world’s leading software company dedicated to the success of IT solution providers through unmatched software, services, community, and marketplace of integrations. ConnectWise’s innovative, integrated, and security-centric platform – Asio™ – provides unmatched flexibility that fuels profitable, long-term growth for partners. ConnectWise enables ITSPs to drive business efficiency with automation, IT documentation, and data management capabilities – and increase revenue using remote monitoring, cybersecurity, and backup and disaster recovery technologies. For more information, visit connectwise.com.
- Consortium NetworksBooth:
Consortium Networks is committed to providing businesses with the most relevant, up-to-date technology information, with a focus on cybersecurity.
- CorelightBooth: 250
Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com
- Critical StartBooth: 114
Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.
- Cybercrime Support NetworkBooth: n/a
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- CyberhavenBooth: 241
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- CybereasonBooth: 301
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- CymulateBooth: 339
Cymulate SaaS-based continuous security validation makes it simple to measure and improve your security posture across the full attack kill-chain. Every assessment is scored and includes actionable remediation guidance to mitigate risk and optimize security control effectiveness. Cymulate enables you to take data-driven decisions and manage your security resources efficiently.
- CynetBooth: 177
Cynet 360 is the world’s first autonomous breach protection platform. Cynet eliminates the need of complex multi-product stacks, making robust breach protection within reach for any organization.
- Deep InstinctBooth: 357
Deep Instinct is a cybersecurity company that applies deep learning to cybersecurity. The company implements advanced artificial intelligence to the task of preventing and detecting malware.The company was the recipient of the Technology Pioneer by The World Economic Forum in 2017.
- EndaceBooth: 171
Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.
- EntrustBooth:
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.
- Envision Technology AdvisorsBooth: 155
Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.
- ExtraHopBooth: 234
ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com
- ForgeRock / Ping IdentityBooth: 348
ForgeRock is a global leader in digital identity that delivers modern and comprehensive identity and access management solutions for consumers, employees, and things to simply and safely access the connected world. Using ForgeRock, more than 1,300 global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data—consumable in any cloud or hybrid environment. The company is headquartered in San Francisco, California, with offices around the world.
For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media.
- FortinetBooth:
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
- GateScannerBooth: 146
GATESCANNER® utilizes Content Disarm and Reconstruction technology to prevent file-based malware attacks on multiple attack vectors. Traditional anti-malware protection solutions are not enough in today’s complex reality of APTs and sophisticated hackers—requiring security layers for the prevention of advanced file-based malware. The GATESCANNER CDR suite ensures that files from all routes are Zero-Day and malware-free. The CDR process transforms all files into safe, neutralized, and harmless copies while maintaining full file fidelity and usability.
- GigamonBooth: 355
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- Security JourneyBooth: 245
HackEDU’s spring 2022 acquisition of Security Journey brings together two powerful platforms to provide application security education for developers and the entire SDLC team. The two officially became one in August 2022 and are now Security Journey. Two platforms, one path to build a security-first development culture.
- HUB TechBooth:
HUB Tech partners with its clients becoming part of their support team. We work beside you to ensure you have a strategy that allows you to transform your Information infrastructure to keep up with the needs of your organization and your users. We have developed proprietary tools and strategies that have enabled us to lower cost and increase the quality of service to our client base, especially to state agencies, municipalities and school districts, where cost is a deciding factor in everyday decision making.
Our mission is simple – to take full ownership for all that we do, to protect those who trust in us, and to make lifelong clients from every customer contact.
- ImpervaBooth:
Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.
- IOvationsBooth:
IOvations, founded in 2006, is a value added reseller focused on protecting the data, infrastructure and applications of our customers through a combination of services and products that extend to the end point, traditional network and cloud environment. Some of the things that make us unique include multiple industry awards, a long history of working with clients who appreciate how easy we are to work with, and our strong engineering expertise providing value and thought leadership.
- ISACA New England ChapterBooth: 122
The New England Chapter of ISACA® was founded in 1976. From the modest beginnings of its first meeting—which was held at Valle’s Steak House on Route 9 in Newton, Massachusetts—the chapter has grown to over 2000 members across four states (MA, NH, ME, VT).
The primary objective of the New England Chapter is to provide quality Information Systems audit and security-related education to support its members and their professional certifications.
- ISC2 Eastern MassachusettsBooth: 145
Advancing Information Security One Community at a Time
As anyone seriously involved in the information security profession can attest, peer networking is an invaluable resource. ISC2 Eastern Massachusetts Chapter provide members with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create new ways to earn CPE credits! - ISC2 Maine ChapterBooth: 145
The ISC2 Maine Chapter is a professional association authorized by the ISC2 the World’s Leading Cybersecurity Professional Organization created by ISC2 members and information security professionals living and working in Maine.
The ISC2 Maine Chapter is dedicated to providing education and regular meetings to help information security professionals in Maine. Our chapter benefits from a diverse membership that works in various organizations across important sectors such as healthcare, financial services, national defense, government, service providers, and many more.
- ISSA New EnglandBooth: 139
The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.
Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.
Visit the National Headquarter’s website at www.issa.org.
- KnowBe4Booth: 342
We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
- LaceworkBooth: 135
Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.
- MetricStreamBooth:
MetricStream, the independent market leader in enterprise and cloud applications for Governance, Risk, Compliance (GRC) and Quality Management, makes GRC simple.
MetricStream apps improve business performance by strengthening risk management, corporate governance, regulatory compliance, vendor governance, and quality management for hundreds of thousands of users in dozens of industries, including Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-Tech and Manufacturing.
MetricStream is headquartered in San Jose, California, with an operations and R&D center in Bangalore, India, and sales and operations support in 12 other cities globally.
- MimecastBooth: 360
Mimecast empowers our customers to help mitigate risk and manage complexities across a threat landscape driven by cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.
- MorphisecBooth:
Morphisec is the world leader in providing advanced security solutions for midsize to small enterprises around the globe. We simplify security and can automatically block modern attacks from the endpoint to the cloud. Unlike traditional security solutions relying on human intervention, our solutions deliver operationally simple, proactive prevention. We protect businesses around the globe with limited security resources and training from the most dangerous and sophisticated cyber attacks.
- NetskopeBooth:
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- New England Cyber Fraud Task Force (NECFTF)Booth:
The NECFTF is composed of officials from state and local law enforcement throughout Massachusetts, New Hampshire, Rhode Island, Vermont and Maine and is charged with preventing, detecting and mitigating complex cyber-crime threatening payment systems and critical infrastructure. The five task force officers represent the Concord Police Department, the Grafton County Sheriff’s Office, the Manchester Police Department and the Nashua Police Department.
- OktaBooth: 343
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- Open SystemsBooth: 333
The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. We are deeply passionate about protecting organizations from that storm.
We provide a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection. And Mission Control, our integrated NOC and SOC, is staffed by experts, not only in threat hunting and cyber hygiene, but also in the proper configuration and maintenance of the Microsoft security stack. So we can leverage what you already own.
The combination is changing the lives of our customers, giving them security traditionally reserved for only the largest organizations. We give them “shelter from the storm”. That is our passion.
- Orca SecurityBooth:
We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.
- Qualys, Inc.Booth: 106
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
- Rapid7Booth: 222
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- Recorded FutureBooth: 265
Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.
- ReliaQuestBooth: 130
ReliaQuest, the force multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud native security operations platform, GreyMatter. ReliaQuest’s GreyMatter is built on an open XDR architecture and delivered as a service anywhere in the world, anytime of the day, by bringing together telemetry from tools and applications across cloud, on-premises and hybrid cloud architectures. Hundreds of Fortune 1000 organizations trust ReliaQuest to operationalize security investments, ensuring teams focus on the right problems while closing visibility and capability gaps to proactively manage risk and accelerate initiatives for the business. ReliaQuest is a private company headquartered in Tampa, Fla., with multiple global locations. For more information, visit www.reliaquest.com.
- SecureworksBooth:
Dell Secureworks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Dell SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.
- SecuronixBooth:
Securonix is redefining threat detection and response for today’s hybrid cloud, data-driven enterprise. Securonix Next-Gen SIEM and XDR are powered by the most advanced analytics and built on a scalable, flexible cloud native architecture. Securonix leverages behavioral analytics technology that pioneered the UEBA category to reduce noise, prioritize high fidelity alerts, and enable fast and precise response to insider and cyber threats.
- SentinelOneBooth:
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- Skybox SecurityBooth: 346
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
- SynopsysBooth: 230
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
- SysdigBooth: 347
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud services. Only Sysdig has the deep visibility needed to see all threats, vulnerabilities and suspicious activity. With Sysdig you can secure the build pipeline, detect and respond to runtime threats, continuously validate compliance, and monitor and troubleshoot cloud infrastructure and services.
Sysdig is a SaaS platform, built on an open source stack that includes Falco and sysdig OSS, the open standards for runtime threat detection and response. Hundreds of organizations rely on Sysdig to secure containers, Kubernetes and cloud services.
- Team CymruBooth: 232
Team Cymru’s mission is to save and improve human lives. We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.
Our business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.
Community Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.
Since 2005, our reputation remains unchallenged.
- TessianBooth: 102
Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like March Capital, Sequoia, Accel, and Balderton and has offices in San Francisco, Boston and London.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- TevoraBooth: 330
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- ThalesBooth: 142
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- ThreatLockerBooth: 225
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- UpGuardBooth: 137
UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.
- VaronisBooth: 260
Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
- VectraBooth:
Vectra® is the leader in hybrid cloud threat detection and response. Vectra’s patented Attack Signal Intelligence detects and prioritizes threats across public cloud, SaaS, identity, and networks in a single platform. Vectra’s Attack Signal Intelligence goes beyond simple anomaly detection to analyze and understand attacker behavior. The resulting high-fidelity signal and deep context enables security operations teams to prioritize, investigate and respond to cyber-attacks in progress sooner and faster. Organizations worldwide rely on the Vectra platform and MDR services to stay ahead of modern cyber-attacks. Visit www.vectra.ai.
- WEIBooth: 315
Why WEI? We go further.
At WEI, we’re passionate about solving your technology problems and helping you drive your desired business outcomes. We believe in challenging the status quo and thinking differently. There are a lot of companies that can take today’s technology and create a great IT solution for you. But we do more. We go further. And we have the customer, vendor and industry awards to prove it. WEI is a premier technology partner, who always puts our customers first while providing the most innovative solutions for over 29 years.
- Whalley Computer AssociatesBooth: 335
Whalley Computer Associates, Inc. (WCA) employs some of the region’s best engineers and is equipped to accommodate all computer and communication needs for businesses of all sizes in every industry. As an aggressive entrepreneurial business, we’re capable of responding to your needs with a level of flexibility and speed that other organizations can only dream of.
While we’ve grown tremendously since 1979, we remain a friendly, flexible, family-owned business that prioritizes the needs of our customers. As we’ve evolved, we’ve expanded our reach to service customers throughout the nation. To provide each customer with superior service, we now employ over 140 computer professionals and 10,000 affiliated technicians and engineers. In response to making these advancements, VarBusiness magazine ranked WCA as being a high-level engineering firm in the largest 1% of all Solution Providers in North America.
- WhiteSourceBooth: 325
WhiteSource is the pioneer of open source security and license compliance management. Founded in 2011, its vision is to empower businesses to develop better software by harnessing the power of open source. WhiteSource is used by more than 800 customers worldwide, from all verticals and sizes, including 23% of Fortune 100 companies, as well as industry leaders such as Microsoft, IBM, Comcast, and many more. For more information, please visit www.WhiteSourceSoftware.com.
- WizBooth: 329
We’re on a mission to help organizations effectively reduce risks in their Cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights that don’t waste time.
Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.
- WiCyS New England AffiliateBooth:
- David DumasSr. Principal, Security Risk Management, Verizon
David Dumas, CISSP, CISM, ISSA Distinguished Fellow, is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. He has 32 years in the security field, working at Digital Equipment and Verizon. He has been on the ISSA New England Chapter Board since 1998.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Gene KingsleyDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members Alliance
Gene has worked as a dedicated resource in the Information Security space for over 25 years, among industries such as Higher Ed, Healthcare, Finance, Federal Government agencies, and others. He has focused on Operations, Strategy, and Resiliency. In his spare time, he volunteers as a national leader among the InfraGard National Members Alliance, assisting in governance, audit, and program development.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Casey McGeeAssistant to the Special Agent in Charge, U.S. Secret Service
Casey McGee is an Assistant to the Special Agent in Charge in the New York Field Office of the U.S. Secret Service. He leads efforts to increase public and private partnership in the investigation of complex transnational criminal investigations involving the use of digital assets. In an executive developmental role, ATSAIC McGee served as the Advisor to the Vice President of Global Intelligence at Coinbase where he identified opportunities for joint USSS/Coinbase initiatives and partnered with various leaders across both organizations to implement cross functional programs. He holds a Juris Doctor from Vermont Law School and a Bachelor of Science from the University of Notre Dame.
- Jeffrey MorissetteTechnical Staff Assistant (Special Agent), Boston Field Office, United States Secret Service
Prior Federal Employment
United States Border Patrol (USBP) – Casa Granda Station, AZ
Employed as an agent of the U.S. Border Patrol, July 1997 – January 2000
Training: US Border Patrol Academy (6 months), Charlestown, SCCurrent Federal Employment
United States Secret Service (USSS) – Boston Field Office
Employed as an agent of the U.S. Secret Service since January 2000Duties of USSS Special Agent include:
o Protection of the President of the United States, the Vice President, Former Presidents and their families, and others authorized by statute.
o To detect and arrest any person violating Federal laws relating to financial obligations and securities of the United States and foreign governments.
o In the performance of these duties, to arrest any person committing any offense against the United States.Duty Assignments:
U.S. Secret Service – Boston Field Office (1/2020-present)
• Technical Staff Assistant
- Manage the Tier 1 New England Digital Forensics Lab
- Manage Network Intrusion Responses to include Ransomware Attacks on systems
U.S. Secret Service – Providence Resident Office (12/2016-1/2020)
U.S. Secret Service – Boston Field Office (12/2012-12/2016)
U.S. Secret Service – Presidential Protective Division (3/2009-12/2012)
U.S. Secret Service – Special Operations Division – Counter Assault Team (1/2006-3/2009)
U.S. Secret Service – Washington Field Office (5/2002-1/2006)
U.S. Secret Service – Phoenix Field Office (1/2000-5/2002) - Richard BerthaoDirector, Cybersecurity Architecture, Draper Labs; Colonel, U.S. Army Reserve; President, New England Chapter, MCPA
Richard Berthao is the Director of Cybersecurity Architecture for Draper Laboratory. He previously served more than 20 years in the federal government. This service began with over 19 years as an IT Director in the Massachusetts National Guard, Department of Defense (DoD). He continued as a Cybersecurity Advisor for Connecticut & Massachusetts, within the Cybersecurity & Infrastructure Security Agency (CISA) of the Department of Homeland Security (DHS). Additionally, he is an adjunct faculty member at Nichols College in Massachusetts, teaching graduate courses on cybersecurity governance, policy, and fundamentals. He also continues his more than 34 years of military service in the US Army Reserve as a Cyberspace Operations Officer. Along with his work experience, he serves in a volunteer role as the New England Chapter President of the Military Cyber Professional Association.
- Sandy BacikDirector, Audit and Compliance, CipherTechs, Inc.
Sandy Bacik, CISSP, ISSMP, CGEIT, CISA, CDPSE, PCI QSA, is CipherTechs’ Director Audit & Compliance, has over 20 years’ direct information security and operational experience in the areas of IT Audit and Compliance, BCP/DR, Incident Response, Physical security, Privacy, Regulatory Compliance and Audit, Policies/Procedures, Operations, and Management and is a former CISO. With an additional 15 years in Information Technology Operations. Ms. Bacik has been heavily involved with local, national, and international security industry events. Ms. Bacik is the author of Building an Effective Security Policy Architecture and a contributing author to the past years of Information Security Management Handbook.
- Sam CurryVP & CISO, Zscaler
Sam Curry has over 25 years of IT security industry experience. Curry served as CTO and CSO at Arbor Networks, where he was responsible for the development and implementation of Arbor’s technology, security, and innovation roadmap. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management positions, including CSO and Chief Technology in addition to SVP of Product Management and Product Marketing, including RSA Labs. Curry has also held senior roles at Microstrategy, CA, and McAfee.
- Roger GrimesData-Driven Defense Evangelist, KnowBe4
Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.
- Bill BowmanCISO & Data Privacy Officer, Emburse
Bill Bowman has been the first CISO at five different organizations over the last 20 years. He has been in Educational Technology, Financial Technology, and B2B Growth companies. He was the founding President for the (ISC)2 Eastern Massachusetts organization 10 years ago. Bill lives in Framingham with his wife and five children.
As CISO, Mr. Bowman is responsible for managing the global responsibilities associated with Information Security, Physical Security, Privacy, Disaster Recovery, Business Continuity, Incident Response, and Insurance. Mr. Bowman has successfully implemented PCI-DSS, SOC 1, SOC 2, ISO 27001, ISO 27701, ISO 27017, and ISO 27018. Specialties: Executive Core Qualifications: Leading Change, Leading People, Results Driven (Metrics), Risk based decision making, Business/Industry Acumen, Building Coalitions. Management development, Talent development Technical Qualifications: Information Security, IT & business risk, IT governance & compliance (SOX 404), Regulatory compliance (GDPR), DR/BC, Mobility, Networking, Cloud security, Cloud privacy, Application vulnerability management, and other technical and non-technical related items.
- David BarkerDirector of Application Security, GoodLeap LLC
David Barker is Director of Application Security for GoodLeap LLC, a Fintech company providing a point-of-sale platform for sustainable home solutions. GoodLeap marks David’s fourth creation of a Code-to-Cloud Application Security program. His pedigree includes companies like Dell EMC, Stanley Black & Decker, and PTC. David has both an MBA and an MS in IT and wields his combination of business and technical acumen with repeated success.
- Kwan LinPrincipal Data Scientist, Rapid7
Kwan is the Principal Data Scientist on the Rapid7 Labs Research and Advocacy team. He routinely monitors and analyzes large-scale honeypot and Internet-scan data using statistical and machine learning methods. Recently, Kwan helped Rapid7 launch Project Doppler, a platform tool that enables customers to assess their public internet exposure. Kwan is a former Certified Public Accountant and holds degrees in International Security and Economics from the Fletcher School of Law and Diplomacy and Brown University.
- George J. SmithSr. Security Consultant, Gigamon
George has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down the road. Additionally, Smith has contributed to hardware and software R&D for high-technology companies, including General Electric, 3Com (acquired by HP), and Wang Labs.
From an early stage, he was fortunate enough to be actively involved in the birth of IP/Ethernet-based networking, evolving WAN technologies, distributed communications, and hardware applications when groundbreaking efforts in computer communications were taking place. Smith was honored to be part of a team that ushered in the age of digital sports broadcasting and utility development.
Smith is part of Covington's "Who's Who of Networking Professionals," Professional of the Year, and a VIP Member in good standing. Driven to stay ahead of change, Smith continually reinvents himself to keep pace with technology's fast-paced evolution. He has a passion for developing his ability to understand and explain complicated techniques and bringing out the business implications. He thrives on creating the ideal business solutions for his customers and enjoys the human side of networking by fostering long-term relationships. His vision and passion for technology and the solutions it provides enhance his abilities in the workforce.
In his free time, George enjoys spending time with his family, flying aircraft, being in stage musicals and plays, and giving back to the community through volunteer efforts.
- Danny JenkinsCEO & Co-Founder, ThreatLocker
Danny Jenkins is the CEO and Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security. Danny is a leading expert in cybersecurity with over two decades of experience in building and securing corporate networks, including many roles on red teams and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust. Before ThreatLocker, Danny co-founded MXSweep, a global provider of email and internet security SaaS applications that sold exclusively through the channel. Danny was also the CEO at Sirrustec, specializing in whitelabeled channel delivered email security.
- George J. SmithSr. Security Consultant, Gigamon
George has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down the road. Additionally, Smith has contributed to hardware and software R&D for high-technology companies, including General Electric, 3Com (acquired by HP), and Wang Labs.
From an early stage, he was fortunate enough to be actively involved in the birth of IP/Ethernet-based networking, evolving WAN technologies, distributed communications, and hardware applications when groundbreaking efforts in computer communications were taking place. Smith was honored to be part of a team that ushered in the age of digital sports broadcasting and utility development.
Smith is part of Covington's "Who's Who of Networking Professionals," Professional of the Year, and a VIP Member in good standing. Driven to stay ahead of change, Smith continually reinvents himself to keep pace with technology's fast-paced evolution. He has a passion for developing his ability to understand and explain complicated techniques and bringing out the business implications. He thrives on creating the ideal business solutions for his customers and enjoys the human side of networking by fostering long-term relationships. His vision and passion for technology and the solutions it provides enhance his abilities in the workforce.
In his free time, George enjoys spending time with his family, flying aircraft, being in stage musicals and plays, and giving back to the community through volunteer efforts.
- Bob AdamsSecurity Strategist, Mimecast
Bob Adams is a Cyber Security Strategist at Mimecast. Originally joining Mimecast nearly 7 years ago as a Sales Engineer, Bob was recruited to Product Management after developing various unique ways of investigating cyber-attacks and highlighting Mimecast’s services. Bob now continues to use his time to help educate companies on protecting themselves against advances cyber threats.
- Keith DalySenior Principal Engineer, ForgeRock
Keith Daly is currently a Senior Principal Sales Engineer for ForgeRock.
Over the past 20 years, Keith has been on all sides of the Identity Management space in numerous industries, with roles ranging from systems architect within leading corporations, to developer and team lead at systems integrators, to technical sales and engineering roles at solution vendors.
While having worked in the cyber security field for most of his career, Keith is passionate about enabling normal, non-IT-specialized people to safely and simply manage their online resources and identities. Since front-end simplicity is often accomplished through back-end system complexity, his enduring professional goal is to help customers deliver innovative and effective solutions for their identity challenges.
- Stephen ClarkDirector of Cloud Security Sales, Fortinet
Stephen Clark has over 25 years experience in the information security space having spent time at Check Point, Cisco, and Palo Alto Networks. Stephen also spent time working in the security consulting field working primarily with the Fortune 1000.
He is presently the Director of Cloud Security Sales for Fortinet. Today he helps manage and set the direction for cloud security within the Fortinet Sales team. The product portfolio includes Next Generation Firewalls, Web Applications Firewalls, CASB and Containers.
- Thomas HartCISO, Cyber Guide LLC
Thomas F Hart - Tom has been in the IT field since 1978(EDP), starting as a programmer trainee (Assembler and COBOL). First computer worked on was an IBM360 system (PCs were a long way off). He has been a Programmer, Systems Analyst, Operating Systems Programmer, Network Systems Programmer, DR / BCS Specialist, IT Auditor, GRC, Sr. Security Analyst, Contractor/Consultant, Security Conference Panelist- Moderator-Organizer-Speaker. Tom has been involved in the InfoSec community via ISC2, ISACA, SANS, HOPE, BSides, Secure World and others. He has worked in the Banking, Defense, Utilities, Gov. and Health Care industries in his career. Most recently he has founded Cyber Guide LLC consulting firm.
- Chris GriffithVP of Product, Balbix
Chris Griffith leads product management for Balbix. Chris brings over 15 years as a product, business development and strategy leader in security and technology. Prior to Balbix, Chris led tech alliances for Hewlett Packard Enterprise’s (HPE) security portfolio. Chris also ran product management for HPE’s Data Security business and drove strategic acquisitions in corporate development. Chris holds an MS from Stanford and a BS from Princeton, both in Mechanical Engineering, and an MBA from UCLA Anderson.
- Mike DeNapoliSr. Solution Architect, Cymulate
Mike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners know that their security controls are defending the organization, without speculation.
- Ashley BullSolutions Engineer, Tessian
Ashley is a Solutions Engineer at Tessian, providing customers with solutions to address their email security objectives. She is responsible for leading technical product demonstrations and evaluations, and is an expert in email security, endpoint security, insider threats, and behavior analytics and Human Layer Security. Prior to joining Tessian, Ashley worked at VMware Carbon Black.
- Jamie ZajacVice President, Product, Recorded Future
Jamie Zajac has over 10 years of experience in security and data protection roles and is currently the Vice President of Product Management for Recorded Future, an advanced security intelligence company. Jamie holds a B.S. in Meteorology and Computer Science from Embry-Riddle Aeronautical University and a MBA from UMass.
- Katherine ChipdeyDirector, Solutions Engineering and Alliances, Automox
Katherine Chipdey has spent her career in Cybersecurity, consulting on how to simplify our understanding of the threat landscape and building programs for thousands of customers around EDR, SOAR, and MDR. At Automox, she helped build out the Solutions Engineer Team, where she focused on automating IT operations, reducing risk, and bridging that gap between security and IT for prospects and customers alike. Katherine now manages the technical channel relationships, enabling other IT and Security experts on how to use Automox in order to help their customers meet business needs and critical security goals like never before. Katherine has most enjoyed the opportunity to use her background and experiences in the the field to meet security/ IT teams, and enable them to be as successful as possible with their initiatives. Where a relationship can be made, she will try, as those meaningful interactions and the growth, learning, and connection they bring are invaluable to her. Outside of work, she could spend forever talking about her travels, archery, and pups.
- Moderator: Peter KurekCybersecurity Threat Hunter and Incident Responder, Eversource Energy
- Brian BlackDirector of Sales Engineering, Deep Instinct
Brian is a Philadelphia based Distinguished Sales Engineer with 20+ years of experience in Cybersecurity and Intelligence. Brian leads Deep Instinct’s security engineering team, overseeing North and South American territories. He is a thought leader and technology evangelist with a wealth of knowledge on AI, Deep Learning, and Machine Learning. In his off time he can often be found on the lecture circuit giving talks around online security and state sponsored threat actors, when he’s not fishing or competing in online CTF hacking competitions.
- Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Alexandra PanaretosAmericas Lead for Human Cyber Risk and Education, EY
With a background in broadcasting and operational security, Alex specializes in secure communications and education, awareness program development, the psychology of social engineering, human-based risk mitigation, and behavior analytics. She has over 12 years of experience developing and implementing security awareness, communication, and education strategies in Fortune 50/100 companies and other global enterprises. Alex is OPSEC Manager II Certified by the U.S. Army and the Joint Information Operations Warfare Center (JIOWC). She volunteers with local law enforcement agencies educating parents, community groups, and youth organizations on information security and social media safety in her free time.
- Esmond KaneCISO, Steward Health Care
Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.
- Selva Vinothe MahimaidasCISO, Houghton Mifflin Harcourt
Selva Vinothe Mahimaidas is an Information Security Leader with more than 20 years of experience in all phases of information security. Selva currently serves as Chief Information Security Officer (CISO) at Houghton Mifflin Harcourt, an American publisher of textbooks, instructional technology materials, assessments, reference works, and fiction and non-fiction reaching both young readers and adults in over 150 countries worldwide.
- Eric GauthierVP, Infrastructure & Security, Emsi Burning Glass
Eric Gauthier, CISSP, is a technology leader with 20 years’ experience working at the intersection of Information Security, IT, and DevOps. Eric is both a technical architecture and security leader having held positions in various settings including the corporate, academic, and service provider spaces building security programs, leading security and privacy compliance programs, and securing cloud-native and cloud-focused organizations especially those with SaaS and eCommerce product portfolios. Eric is currently the VP for Infrastructure and Security at Emsi Burning Glass, the leader in labor market insights. He is also a principal consultant for Side Channel Security and a member of the Cloud Security Alliance’s DevSecOps working group. His current focus is driving the adoption of DevSecOps - the integration of security into traditional IT, Development and Operations teams - for SaaS, eCommerce, and other technology focused organizations.
- Andrew SmeatonCISO, Afiniti
Andrew holds over 22 years of experience in the banking, financial services, and healthcare industries. He is experienced in all facets of IT/IS Security & Risk Management including acquisitions and disaffiliations, and has a track record of developing and implementing security strategies from inception through execution. In addition to his corporate experience, Andrew has also served on the executive boards for international conferences and advised government agencies on information security subjects. Andrew’s regulatory compliance experience includes FSA, PRA, FDIC, ISO 27K, COBIT, HIPAA, PCI-DSS, GLBA, Mass 201 CMR 17.00, SOX 404.SAMA, and NYDFS.
- James CussonSecretariat Security Liason, Massachusetts Executive Office of Health and Human Services
- Happy Hour
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Gene KingsleyDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members Alliance
Gene has worked as a dedicated resource in the Information Security space for over 25 years, among industries such as Higher Ed, Healthcare, Finance, Federal Government agencies, and others. He has focused on Operations, Strategy, and Resiliency. In his spare time, he volunteers as a national leader among the InfraGard National Members Alliance, assisting in governance, audit, and program development.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Gene KingsleyDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members Alliance
Gene has worked as a dedicated resource in the Information Security space for over 25 years, among industries such as Higher Ed, Healthcare, Finance, Federal Government agencies, and others. He has focused on Operations, Strategy, and Resiliency. In his spare time, he volunteers as a national leader among the InfraGard National Members Alliance, assisting in governance, audit, and program development.
- Greg McCarthyCISO, City of Boston
Greg McCarthy is the first Chief Information Security Officer for the City of Boston and career public servant. Since joining the City of Boston’s Cybersecurity Team in 2010, Greg has managed the implementation of numerous information security solutions, developed the City's first cybersecurity awareness program for employees and successfully enforced the use of multi-factor authentication for all employees. In his role, Greg continues to lead efforts to strengthen the cybersecurity capabilities across the City and further the team’s mission through modernizing technology, partnerships, and regular training. Greg is a cybersecurity leader and change agent who is focused on strengthening cybersecurity for the City of Boston and all municipal governments through partnership and collaboration.
- Kevin BurnsCISO, Draper
- Monsurat OttunCybersecurity Advisor (CSA), Integrated Operations Division | Region 1, CISA
- Scott MargolisCISO, Massachusetts Bay Transportation Authority (MBTA)
Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business continuity, and operational efficiency. Reputation for leading new initiatives focused on transforming operations, establishing partner/industry relationships, increasing revenue, and reducing cost and risk exposure. Proactive leader with intense focus on customers and beneficial outcomes.
- Esmond KaneCISO, Steward Health Care
Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.
- Stephen FrethemSenior Director of Sales Enablement, Varonis
Stephen has worked in the IT Industry since 2000 and in the security industry for the previous eight. Based out of the Twin Cities, Stephen has spent time at some of the largest organizations including Target, US Bank, Honeywell, and United Health Group. In his current role at Varonis, Stephen works with organizations around the US helping organizations protect their data from insider threats and cyberattacks.
- David MonnierChief Evangelist, Team Cymru
David has been with Team Cymru since 2007. Prior, he served in the U.S. Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team Cymru, he has been an engineering leader, a Community Services team member, and a security analyst. David led efforts to secure the firm's intelligence infrastructure and established processes the firm relies on today. Currently, David assists CSIRT teams worldwide and fosters data sharing partnerships.
- Rich SchofieldPrincipal Security Architect, Sysdig
Rich Schofield is a Principal Security Architect at Sysdig. Based in Boston. Rich has over 25 years experience in DevOps and Security at companies large and small, including HPE, Opsware and BBN. Over the past 4 years at Sysdig he has focused on security and visibility for Cloud and Kubernetes environments.
- Jon FredricksonVP, CISO, Surgery Partners, Inc.
Jon Fredrickson is Vice President & Chief Information Security Officer for Surgery Partners. Prior to Surgery Partners, Jon has held various leadership & CISO positions across healthcare in both the provider and payor markets. Jon has developed a pragmatic approach to implementing cyber security solutions and assisting his organizations in properly measuring and managing cyber risk. He graduated from the University of Rhode Island with a B. A. in Economics. Jon is a member of the Association for Executives in Healthcare Information Security, the Healthcare Sector Coordinating Council (HSCC) and is a Certified Information Security Manager.
- Toby ZimmererSr. Demand and Delivery Director, Data Protection
Toby Zimmerer is a Senior Demand and Delivery Director in Optiv’s Data Governance, Privacy, and Protection practice, where he assists organizations with building programs and implementing solutions focused on protecting high value information and assets. He has more than 24 years of professional experience developing information security strategies, designing information security programs, developing information security solutions and leading teams with deploying and operating information security programs. Toby has an MBA, a BS in electrical engineering, a CISSP certification, a CCSK from the Cloud Security Alliance, and is a US Navy veteran.
- Peter ChestnaCISO of North America, Checkmarx
Pete Chestna serves as the CISO of North America at Checkmarx, where he provides customers and prospects with practical advice for building successful application security programs. Bringing more than 15 years of direct AppSec practitioner experience, Pete has held roles ranging from developer and development leader to his most recent position as the Global Head of AppSec for the Bank of Montreal.
Over the years, Pete has led organizational transformations from Waterfall to Agile to DevOps and from monolith to microservice architectures. He is certified as both a scrum master and product owner. Stemming from his experience as both an avid practitioner and consultant, Pete has spoken internationally at numerous prominent security and developer conferences including DevOpsDays, All Day DevOps, OWASP AppSec, and DevSecCon.
Pete has been granted three patents. He enjoys whiskey tourism, astronomy model rocketry, and listening to Rush in his spare time.
- Trevor WelshGlobal Security Strategist, Google Cloud Security
Trevor is a Global Security Strategist with Google Cloud Security. Trevor leverages extensive experience in public sector, financials, retail / logistics, manufacturing, healthcare, and high tech to solve complex security analytics challenges. A former leader with Anomali, and companies like Splunk, ArcSight, and Fortinet, Trevor brings insight, coaching, and a knack for building bridges. Trevor’s security passions include the SOC-Cloud gap, the efficacy of threat intelligence, Hybrid cloud security automation, data visualization, the blending of ITOps and IT Security, petascale analytics, and threat detection.
- Professor Kevin R. Powers, J.D.Founder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston College
Kevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Program at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College’s Carroll School of Management’s Business Law and Society Department. Along with his teaching at Boston College, Kevin is a Cybersecurity Research Affiliate at the MIT Sloan School of Management, and he has taught courses at the U.S. Naval Academy, where he was also the Deputy General Counsel to the Superintendent.
With over 20 years of combined cybersecurity, data privacy, business, law enforcement, military, national security, higher education, and teaching experience, he has worked as an analyst and an attorney for the U.S. Department of Justice, U.S. Navy, U.S. Department of Defense, law firms in Boston and Washington, D.C., and as the general counsel for an international software company based in Seattle, Washington. Kevin also is an expert witness and consultant with the Analysis Group and serves as a Director for the Board of Reading Cooperative Bank, a Trustee for the Board of Boston College High School, an Advisory Board Member for HYCU, Inc. and CyberSaint Security, and as a Member of the Boston College Law School Business Advisory Council. From 2016-2017, he was the Panel Lead for the Collegiate Working Group for the U.S. Department of Homeland Security's National Initiative for Cybersecurity Education (NICE). Kevin regularly provides expert commentary regarding cybersecurity and national security concerns for varying local, national, and international media outlets.
- Simon TaylorCEO & Founder, HYCU, Inc.
Simon Taylor is the CEO of HYCU where he creates and executes on the vision and strategy for one of the world's leading multi-cloud backup and recovery SaaS businesses. Prior to HYCU, Simon held senior executive positions at Comtrade Software including President and CEO as well as Chief Strategy Officer of The Comtrade Group where he evaluated technology development, partner relationships and strategic investments for the $400M+ Comtrade Group. Simon sits on the board of directors of College Bound Dorchester and is an active member of YPO (Young Presidents Organization) in Boston. A Boston Business Journal 40 Under 40 Award winner, Simon holds an MBA from Instituto de Empresa (Madrid) and an BSc Operations Technology from Northeastern University.
- Jarret WrightDirector of Cybersecurity, Massachusetts Port Authority
Prior to his role as Director of Cybersecurity at MassPort, Jarret has served as Deputy Director of Corporate Security for over 2 years where he focused on maintaining a
safe and secure environment at all Massport facilities while working with departments, law enforcement partners, and stakeholders to strengthen our capabilities to prevent and respond to different threats and emergencies. Before joining MassPort, Jarret was a Senior terrorism official at the National Counterterrorism Center (NCTC), DHS Protective Security Advisor for New England, and a U.S. Navy Intelligence Officer. He is a graduate of Boston College and holds a Masters in Cybersecurity Policy & Governance from Boston College. - Dr. Caroline McGroary, PhD, FCAFulbright Scholar, Boston College Cybersecurity Graduate Programs
Dr. Caroline McGroary is a Chartered Accountant and an Assistant Professor of Accounting at Dublin City University (DCU), Ireland. She has a Ph.D. in Professional Accounting Education and was recently awarded a Fulbright Scholarship by the Fulbright Commission of Ireland. Caroline will spend the coming year at Boston College as a Fulbright Scholar working alongside leading experts on the MS in Cybersecurity Policy & Governance Program. Her research will be focused on the role of the accountant in the area of cybersecurity, as well as the extent to which organizations and individuals understand the cyber risks to which they are exposed and whether they are adequately protected against them.
- Terry Olaes, ModeratorDirector, North America Systems Engineering, Skybox Security
Terry Olaes is director of North America systems engineering at Skybox Security. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security teams have provided Terry with a unique perspective on fortifying IT/OT security posture. Terry specializes in helping organizations devise the right cybersecurity strategies to help manage vulnerabilities and mitigate risks across IT, OT, and hybrid cloud environments. Previously, he has served in security management roles at Neiman Marcus and IBM. Terry has a BA in Business Administration and Management from the University of Phoenix.
- Danny JenkinsCEO & Co-Founder, ThreatLocker
Danny Jenkins is the CEO and Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security. Danny is a leading expert in cybersecurity with over two decades of experience in building and securing corporate networks, including many roles on red teams and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust. Before ThreatLocker, Danny co-founded MXSweep, a global provider of email and internet security SaaS applications that sold exclusively through the channel. Danny was also the CEO at Sirrustec, specializing in whitelabeled channel delivered email security.
- Lokesh AggarwalCEO & President, Apexa IQ
Lokesh Aggarwal has over 20+ years of hands-on experience in developing technology plans, prioritizing IT initiatives and coordinating the evaluation, deployment, and management of current and future technologies. He has a track record of guiding large scale transformations and projects through the development of IT capability roadmaps, deployment of disruptive technology and a partnership with cross-functional business leaders. He has a master's degree as Executive MBA and is BS in Computer Science and Technology. Currently he acts as multiple technology company's board of advisors and is a regular speaker on multiple global conferences.
- Michael MeltzSenior Sales Engineer, Open Systems
Mike Meltz has worked in the IT Security and infrastructure space for over 25 years and he specializes in the design and implementation of enterprise-level Cybersecurity technologies and business process improvements. His goal is to remain focused on creating a secure and quality-driven user experience while helping the organization grow and thrive. In his current role, Mike continues to help our clients manage and secure their organizations by designing SASE and MDR systems that meet the complex challenges of today's enterprise organizations.
Before joining Open Systems as a Senior Sales Engineer, Mike held various technology and strategy leadership roles at companies throughout the United States managing enterprise Infrastructure and Security teams as well as multiple roles as the designated CISO.
- Roy WattanasinResearch Security Officer, Massachusetts Institute of Technology
Roy Wattanasin is an information security professional. He is an avid speaker providing thought leadership at many conferences and webinars. Roy enjoys incident response and building security programs. He is involved with many computer security groups including the Boston Application Security Conference (BASC), OWASP Boston and other local associations. Roy is a member of multiple advisory groups, including SecureWorld Boston. He was previously an adjunct instructor at Brandeis University as part of the Health and Medical Informatics program. He is the co-founder of the decade-old program.
- Tim MackeyPrincipal Security Strategist, Synopsys
Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim applies his skills in distributed systems engineering, mission critical engineering, performance monitoring, large-scale data center operations, and global data privacy regulations to customer problems. He takes the lessons learned from those activities and delivers talks globally at well-known events such as RSA, Black Hat, Open Source Summit, KubeCon, OSCON, DevSecCon, DevOpsCon, Red Hat Summit, and Interop. Tim is also an O'Reilly Media published author and has been covered in publications around the globe including USA Today, Fortune, NBC News, CNN, Forbes, Dark Reading, TEISS, InfoSecurity Magazine, and The Straits Times. Follow Tim at @TimInTech on Twitter and at mackeytim on LinkedIn.
- Jared AblonPresident & Co-Founder, HackEDU
Jared Ablon is the President and co-founder of HackEDU. His experience includes serving as a CISO, leading cybersecurity teams at the Department of Defense, and founding two companies. Jared has a CISSP, MBA and an MS in Applied and Computational Mathematics focusing on computer/cyber security, and was named CISO of the Year by the Los Angeles Business Journal.
- Nick RagoPrincipal Security Engineer, Salt Security
Nick is a startup veteran and Internet technology entrepreneur with over 25 years of application development, testing, and cyber security experience. He is recognized as an industry expert in API development, API management, and API security. At Salt, Nick is helping guide and positively influence how organizations protect themselves from today’s emerging API security threats. Prior to joining Salt, Nick was an early contributor to the success of Kong, the world’s most widely used API Management platform. During his years of service at Kong, before leaving as one of its most tenured members of staff, Nick architected and implemented some of the largest and most mission critical API Management and digital transformation projects (Monolith to Microservice) in North America. Prior to Kong, Nick worked early on in various roles for security companies such as MobileIron (Mobile Device, Data, and Application Security - IPO 2014) and Vontu (Data Loss Prevention - acquired by Symantec) and previously founded his own Internet software development company. Nick holds degrees in Mathematics and Computer Science. When not knee deep in API's, code, microservices, containers, and other tech, you can find him up to his knees in snow, skiing throughout Maine, New Hampshire, and Vermont. Nick and his family reside in the Boston / New England area.
- Peter ChestnaCISO of North America, Checkmarx
Pete Chestna serves as the CISO of North America at Checkmarx, where he provides customers and prospects with practical advice for building successful application security programs. Bringing more than 15 years of direct AppSec practitioner experience, Pete has held roles ranging from developer and development leader to his most recent position as the Global Head of AppSec for the Bank of Montreal.
Over the years, Pete has led organizational transformations from Waterfall to Agile to DevOps and from monolith to microservice architectures. He is certified as both a scrum master and product owner. Stemming from his experience as both an avid practitioner and consultant, Pete has spoken internationally at numerous prominent security and developer conferences including DevOpsDays, All Day DevOps, OWASP AppSec, and DevSecCon.
Pete has been granted three patents. He enjoys whiskey tourism, astronomy model rocketry, and listening to Rush in his spare time.
- Sean BaggettVP & CISO, Blue Cross Blue Shield of Massachusetts
Sean Baggett is the Vice President and Chief Information Security Officer at Blue Cross Blue Shield of Massachusetts. Sean has been an IT and Security leader in the healthcare industry for over 20 years. He has a BS from the Massachusetts Maritime Academy and is a former U.S Navy Surface Warfare Officer. He currently holds CISSP and CISM certifications.
- Moderator: Mark AielloBoard Member, (ISC)2 Eastern Massachusetts; President, CyberSN
Having more than 30 years of IT and cybersecurity consulting/staffing experience, Mark joined Signature Consultants, one of the largest IT Staffing Firms in the U.S., to lead, build and cultivate the cybersecurity talent and workforce throughout the organization’s 26 locations, serving 100s of clients throughout North America. Former President of Cyber 360, a leader in cybersecurity staffing, he harnesses his expertise in the cybersecurity/information security labor market to deploy and support a vast network of cybersecurity professionals. His passion and purpose are keeping companies safe by providing cybersecurity consultants and employees.
- Jonathan TrullSVP, Customer Solutions Architecture and Engineering, Qualys
Jonathan Trull is a longtime security practitioner and CISO with over 18 years of experience in the cybersecurity industry and is currently the Senior Vice President of Customer Solutions Architecture and Engineering at Qualys. His career has spanned operational CISO and infosec roles with the State of Colorado, Qualys, Optiv, and Microsoft. While at Microsoft, Jonathan led the Microsoft Detection and Response Team (DART) whose mission was to respond to cyber security incidents around the globe ranging from cyber espionage initiated by nation-state actors to ransomware attacks and included the investigation of and response to the NOBELIUM threat actor campaign which leveraged the SolarWinds supply chain. Jonathan also serves as an advisor to several security startups and venture capital firms and supports the broader security community through his work with the Cloud Security Alliance, Center for Internet Security, and IANS. He is also an adjunct faculty member at Carnegie Mellon University where he mentors and coaches those attending the CISO Executive Education Program. Jonathan is a frequent speaker at industry conferences such as BlackHat, RSA, and SANS and holds several industry certifications including the CISSP, OSCP, CCSP, and GCFA. Jonathan is a veteran of the U.S. Navy finishing his career as a Lieutenant Commander supporting the Information Warfare Domain.
- Luke BabarindePrincipal Architect, Sales Engineering, Imperva
Luke Babarinde is a Principal Solutions Architect at Imperva with over 15 years of experience in cybersecurity. He is passionate about building effective solutions to assist organizations seeking to holistically address data challenges of which security is critical.
- Mark OstrowskiHead of Engineering, East US, Check Point Software Technologies
Mark Ostrowski is the Head of Engineering for the East region of US at Check Point Software Technologies. Mark has over 25 years’ experience in IT security and has helped design and support some of the largest security environments in the country. As an evangelist and member of the Office of the CTO at Check Point Software, Mark provides thought leadership for the IT security industry, outlining the current threat landscape and helping organizations understand how they can proactively mitigate and manage risk in our world of digital transformation. Mark actively contributes to national and local media discussing cybersecurity and its effects in business and at home on media outlets such as the Today Show on NBC, Good Morning America on ABC, and the Wall Street Journal.
- Ray CanzaneseDirector of Netskope Threat Labs, Netskope
Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.
- Stephen FitzgeraldSr. Sales Engineer, Orca Security
From writing detection rules and automations for SOC teams to assisting with compliance initiatives, cloud security has always been the focus of Stephen's career. Currently Stephen serves as a Senior Solutions Engineer at Orca helping customers architect and operationalize the Orca platform, as well as providing risk assessment reviews and guidance on security operations overall. Outside of his professional pursuits, he enjoys cars, computer hardware, and anything where he get's to play defense.
- Moderator: Gus ChiarelloDirector, Security Architecture, AccessIT Group
Gus Chiarello is the Director of Security Architecture and part of the technology consulting leadership team at AccessIT Group (AITG). Gus has over 10 years of experience in risk management and 16 years in IT professional services leading the development of AppSec MDR, MSP, and MSSP service practices. Through leveraging his background in both technology infrastructure and risk management, Gus provides exceptional CISO-level consultative guidance. Following an IT Service Management (ITSM) strategy, Gus provides a unique understanding of the relationship between the IT organization and the business units they support.
- Deidre DiamondFounder and CEO, CyberSN and Secure Diversity
Deidre Diamond is the founder and CEO of CyberSN, the largest cybersecurity talent acquisition technology and services firm in the U.S., transforming job searching and hiring for the cybersecurity industry. Standardizing all cybersecurity job functions into a common taxonomy of 45 roles, the CyberSN platform allows professionals to make anonymous, public profiles that match with employer-posted job descriptions using the same taxonomy. This innovation is disruptive and solves a serious national security issue. Deidre’s leadership style combines 25 years of experience working in technology and staffing, her love of the cybersecurity community, and a genuine enthusiasm for people. She has led large-scale sales and operations and built high-performance teams at Rapid7 and Motion Recruitment prior to founding her own organizations. She believes a company-culture established on ‘anything is possible’ attitudes and open communication frameworks, along with positive energy, career advancement, and kindness, enables her teams to have fun at work and reach beyond peak performance. She also encourages the use of EQ (Emotional Intelligence) skills: self-awareness, self-regulation, motivation, social skills, and empathy. Deidre has also founded SecureDiversity.org, a non-profit organization working to raise awareness for, and increase the hiring of, women and underrepresented humans in the cybersecurity workforce. She has also spoken at some of the biggest tech summits, conferences, and podcasts in the world including ISC2 Congress, RSA, ISSA International, and Hacker Halted.
- Trenton IveyCounter Threat Unit Researcher, Secureworks
Trenton has had the privilege of working with teams of skilled hackers to legally compromise some of the largest organizations in the world. Trenton has also worked on several high-profile incident-response engagements to help provide the adversarial mindset as organizations respond and recover. While his focus is currently offensive research and development, he spends much of his time fostering collaboration between Red and Blue teams.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Gene KingsleyDirector, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members Alliance
Gene has worked as a dedicated resource in the Information Security space for over 25 years, among industries such as Higher Ed, Healthcare, Finance, Federal Government agencies, and others. He has focused on Operations, Strategy, and Resiliency. In his spare time, he volunteers as a national leader among the InfraGard National Members Alliance, assisting in governance, audit, and program development.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes