Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, February 10, 20169:00 amSecureWorld Plus- Using the NIST Cybersecurity Framework to Build and Mature an Information Security ProgramRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pm - Thursday, February 11, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
7:00 am - 3:00 pm7:30 amExecutive Round Table: 3rd Party Supply Chain- VIP/Invite OnlyRegistration Level:VIP / Exclusive
7:30 am - 8:30 am8:30 amCyber-Attack Recoverability Through Strong Backups and Tested Application RecoverabilityRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amHow Leaders Get Straight Talk on SecurityRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amThe One Big Mistake Most Companies Are Making-- Leaving Their Data ExposedRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amThreating the NeedleRegistration Level:Conference Pass
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Intelligence and CybersecurityCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
9:30 am - 10:15 am10:15 amConference Break/Exhibitor Product Demonstrations/Infused Water BarRegistration Level:Open Sessions
10:15 am - 11:15 am11:15 amEstablishing an Effective Cloud Vendor/3rd Party Due Diligence and Management ProgramRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amRadware: Cuber War Chronicles - Stories from the Virtual TrenchesRegistration Level:Open Sessions
11:15 am - 12:00 pm11:15 amSecureAuth: Don't be Tomorrow's Headline- User Authentication Strategies For Keeping the Bad Guys OutRegistration Level:Open Sessions
11:15 am - 12:00 pm11:15 amTenable Network Security: The DBIR Beyond the DBIRRegistration Level:Open Sessions
11:15 am - 12:00 pm12:00 pmExecutive Round Table: Emerging Technologies- VIP/Invite OnlyRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Radware- Safety, Sanctuary and Security: The Societal Impact of Ever-Permeating ConnectivityDirector of Security, RadwareRegistration Level:Open Sessions
12:15 pm - 1:00 pm1:15 pmIT Governance: Why You Don't Always Have to Keep Up with the JonesesRegistration Level:Conference Pass
1:15 pm - 2:00 pm1:15 pmIndustry Discussion Panel: Locking Down the EndpointsRegistration Level:Open Sessions
1:15 pm - 2:15 pm1:15 pmIndustry Discussion Panel: The Current ThreatscapeRegistration Level:Open Sessions
1:15 pm - 2:15 pm2:15 pmConference Dessert & Coffee Break/Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pm2:30 pmDash for Prizes & CyberhuntRegistration Level:Open Sessions
2:30 pm - 2:45 pm3:00 pmCybersecurity: A New ParadigmCISO, ForcepointRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmSeven Principles of Successful Security TransformationsRegistration Level:3:00 pm - 3:45 pm3:00 pmTavve: Prepping for the OSCP- Kali/ARM/NIST/FIPS/AES/PythonRegistration Level:Open Sessions
3:00 pm - 3:45 pm3:00 pmFBI Presentation- Current Cyber Threat Trends and ImpactRegistration Level:Conference Pass
3:00 pm - 3:45 pm
- <Charlotte, NC 2016Booth: 200
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Ben DesjardinsDirector of Security, Radware
Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.
Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.
- David BartonCISO, Forcepoint
David Barton is the Chief Information Security Officer for Forcepoint, responsible for securing the company and sharing key learnings with customers. Barton brings to his role more than 20 years of experience in security leadership across a variety of sectors, including telecommunications, healthcare, software development, finance and government. Prior to joining the company in 2015, he spent three years as the Head of Information Security at Hireright, where he was responsible for securing the company’s information and physical assets on a global scale. Barton holds an MBA from the University of Missouri – Kansas City and a bachelor’s degree in Management Information Systems from Simpson College. He is also a Certified Information Systems Security Professional (CISSP).

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes