- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, April 20, 20227:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 4:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amAdvisory Council Roundtable Breakfast [VIP / Invite Only]Topic: De-Risking IT/OT ConvergenceDirector, North America Systems Engineering, Skybox SecurityRegistration Level:- VIP / Exclusive
7:30 am - 8:20 amThe convergence of operational technology (OT) and IT systems creates complexity and places organizations at high risk of cyber-attacks. The proliferation of networked sensors (IoT) has increased the attack surface, taxing the responsiveness of network perimeter security and vulnerability management teams. Concepts like ZTA and SASE, while conceptually beneficial, can introduce even more uncertainty to the hybrid environment. These problems used to be confined within the data center walls but Digital Transformation projects have greatly increased the scope of challenges. It’s not just an IT problem anymore as industrial control systems and the like look to leverage the benefits of automation and centralized control via the network.
We will explore some of these challenges, approaches taken by your fellow leaders, and outcomes.
7:30 amCloud Security Alliance Chapter Meeting - Open to all attendeesDemystifying Zero TrustSr. Director, Security Solutions, East, Sirius, a CDW CompanyRegistration Level:- Open Sessions
7:30 am - 8:20 am7:30 -7:45: Introduction to Chapter and CSA Programs including the Zero Trust Advisory – Ali Alwan, Chapter Founder
7:45 – 8:20: Demystifying Zero Trust – Jose Ferreira, Solutions Architect Manager
Originally, Zero Trust Network (ZTN) concepts were developed by the US Department of Defense (DoD) in the early 2000s while defining Global Information Grid (GIG) Network Operations (NetOps) Black Core routing and addressing architecture, part of the DoD’s Netcentric Service Strategy. Over time, this concept evolved within the DoD intelligence and security communities into the current ZTN/SDP framework and test lab1 . Around the same time, Forrester, a market research company that provides advice on technology began promoting ZTN as a worthwhile consideration for enterprise security teams. Today, Zero Trust has grown widely in adoption, as well as scope. Zero trust is based upon the principle of “trust nothing, verify everything” and focusing on protecting resources regardless of where they are physically or digitally and to never trust anything by default.
In this session you will learn that ZeroTrust No one vendor, product, or technology will get you to zero trust. Rather it requires a cultural shift and a lot of different solutions to shift the paradigms by which we secure our resources. This article looks at the concept of zero trust, the benefits of implementing a zero trust model, and provides guidance on the steps that organizations need to take to transition towards it.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 3:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:30 am[Opening Keynote] How to Become a CISO: Cybersecurity Learning, Growth, and Career AdvancementPanel DiscussionBISO, Bank of AmericaSVP & BISO, Wells FargoVP, Cyber Operations and Analysis, Dell TechnologiesRegistration Level:- Open Sessions
8:30 am - 9:15 amKey Take-Away:
To achieve your goals, you need to take charge and plan for your future—nobody else is going to do it for you.What do you want to be doing in five, 10, and 20 years? Where should you place your focus now? What is most important: education, experience, certifications, or who you know?
9:15 amNetworking BreakRegistration Level:- Open Sessions
9:15 am - 9:45 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:45 amThe Intersection of Cyber Crime + Cyber Defense and What IT Practitioners Can DoBoard President/Strategic Development Committee Chair, Philadelphia InfraGardRegistration Level:- Conference Pass
9:45 am - 10:30 amIT practitioners and cybersecurity professionals contend with cyber incidents daily. On occasion, these incidents rise to the level where they become criminal acts that require intervention over and above standard defensive measures. As part of this session, Chris Quintanilla will explore four real-life examples of criminal acts, how cybersecurity intervention either foiled the crime or identified the perpetrators, lessons that were learned, and what issues still need to be addressed by service providers and lawmakers.
9:45 amDeveloping Cybersecurity Programs with Framework & Architecture ConsiderationsManaging Principal - Security Services, InsightRegistration Level:- Open Sessions
9:45 am - 10:30 amInsight’s Darren Carroll offers critical perspective on today’s most important cybersecurity concerns. He explains how organizations can begin to build a measurable, monitorable, repeatable approach to a preventive security posture with respect to both framework and architecture. Learn how an all-in approach to enterprise risk management can prevent your organization from being caught off guard—and mitigate the risks, costs, and chaos of pivoting cybersecurity on the fly.
9:45 amRansomware and the Future of CyberwarfareSecurity Strategist, CybereasonRegistration Level:- Open Sessions
9:45 am - 10:30 amThe use of ransomware as a class of malware has exploded in recent years, causing millions of dollars in damages to organizations across the world—and the damage isn’t slowing down. On the contrary, ransomware as a tool is being adopted by a wide array of perpetrators. This includes nation-states, for cash, and to use the demand for cash to obfuscate activities like espionage and sabotage. Ransomware has become a powerful tool of asset seizure and extortion, being used by criminals, activists, and even sanctioned governments for multiple purposes, including use as a weapon of war. The use of ransomware and its close cousin, wiperware, is only accelerating.
In this talk, we will examine how the proliferation of ransomware brought us to this point, what it means for current global conflicts, and the implications for the future of cyberwarfare.
10:40 amThe Inadvertent Remote Insider ThreatSr. Director, Cyber Security, Acumatica, Inc.Registration Level:- Conference Pass
10:40 am - 11:25 amThreat methods and controls utilized are very comprehensive and effective for those who are typically in the office, but what about the remote workforce of today? Their intent may not be malicious but rather inherent to poor practices.
This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and to help organizations identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology. Through live demonstrations, we will show simple techniques used to bypass various controls.
Objectives:
- Learn the methodologies utilized by individuals within the organization that would be defined as insider threat activity
- How to identify system based behavioral indicators
- Learn which existing or enhanced security layer can provide insider threat profile data
- Learn how areas of the organization, i.e. Legal, Procurement, and HR, are key stakeholders in assisting to identify insider threat activity
Key Takeaways:
- How to identify business processes which can contribute to remote work insider threats
- Enhance current security program on what controls are bypassed by utilizing routine IT procedures
- Enhance procedures required to identify insider threat exposures
- Enhance awareness training to include additional methods of insider threat
- Enhance existing physical and digital security layers to better identify specific insider threat activity
10:40 amApplying FTC Cyber Guidance for Small and Midsize BusinessesChapter Member, (ISC)2Registration Level:- Open Sessions
10:40 am - 11:25 amKey Take-Away:
Audience members will hear about the government’s cyber guidance for small and midsized businesses, learn how this can reduce the risk of the most common and harmful cyber threats, understand how to leverage this to protect their businesses, and leave with a completed worksheet that identifies gaps and opportunities for improvements in their company’s cyber protections.The Federal Trade Commission, partnering with Department of Homeland Security, has produced cyber guidance for small and midsize businesses. This practical and pragmatic guidance is designed with more than just technology in mind—it is a guide on how to protect your business. The broad range of protections and considerations range from risk management, cyber insurance, best practice technical controls, user education, and third-party risk.
10:40 amRemediating Critical Vulnerabilities in 12 Hours or Less: Lessons Learned from Log4jSecurity Solutions Architect, QualysRegistration Level:- Open Sessions
10:40 am - 11:25 am11:30 am[Lunch Fireside Chat] BEC Attacks and the Investigative Powers of the U.S. Secret ServiceSpecial Agent, Global Investigative Operations Center, United States Secret ServiceSenior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field OfficeSr. Director, Cyber Security, Acumatica, Inc.Registration Level:- Open Sessions
11:30 am - 12:30 pmLocation / Room: Keynote Theater11:30 amAdvisory Council Roundtable Lunch – (VIP / Invite only)Topic: Security Control Validation – How Do You Know if Your Security Investments Are Working?CISO, SafeBreach12:30 pmNetworking BreakRegistration Level:- Open Sessions
12:30 pm - 1:00 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmCIS v8.0—a Great Place to BeginLead Cybersecurity Consultant, vCISO, AccessIT GroupRegistration Level:- Open Sessions
1:00 pm - 1:50 pmReduce the stress of meeting compliance with regulatory standards by first taking advantage of a prescriptive and easy to follow Framework.
1:00 pm[Panel] The Current Threat LandscapeArea VP - Security Strategist, DeepwatchDirector of Threat Intelligence, Abnormal SecuritySr. Sales Engineer Manager, GigamonDirector of Product Management, DelineaHead of Legal & Compliance, Certes NetworksCIO / CISO, Cadrillion CapitalRegistration Level:- Open Sessions
1:00 pm - 1:50 pmIf we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
1:00 pm[Panel] Cloud: Doing More with LessSr. Sales Engineer, Orca SecuritySecurity Architect, US Public Sector, Office of the CTO, Check Point Software TechnologiesRegional Sales Manager, ThalesManager, Cloud Architect, Trend MicroGlobal Director, Sales Engineering, Digital ShadowsVP, CISO, EnproRegistration Level:- Open Sessions
1:00 pm - 1:50 pmThe cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.
2:00 pmHiring During Troubled TimesAgency CISO, North Carolina State Board of ElectionsRegistration Level:- Conference Pass
2:00 pm - 2:45 pm2:00 pm[Panel] Prioritizing the ThreatsIdentity and Security Architect, InsightSales Engineering Manager, CISSP, C|EH, ProofpointDirector of Governance & Compliance, Risk Advisory Services, AccessIT GroupDirector of Security Engineering, Salt SecurityDirector of Services, SemperisVP, Information Security, Essent Guaranty, Inc.Registration Level:- Open Sessions
2:00 pm - 2:45 pmRansomware, Business emails compromise, Cloud mis-configurations, Social Engineering, Insider Threats… the list goes on and on. The threats are everywhere. Some are new but the old ones work just as well. How do you decide which ones are of the most concern to your organization? Do you report all of these to the board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to prioritize the threats.
2:00 pmReducing Implicit Trust in Your Cloud Service ProviderPrincipal Solution Architect, Digital Identity and Security, Thales Cloud SecurityRegistration Level:- Open Sessions
2:00 pm - 2:45 pmAs organizations embark on a cloud-first strategy, they often find they’re placing excessive trust in their cloud service provider to protect the sensitivity of their organization’s assets, especially sensitive data. During this presentation, we provide an overview of how the cloud service provider requires you to participate in a shared security model and how your organization can retain control of your sensitive data encryption. In other words: your data, their cloud! We’ll discuss and show how using newer tools and techniques—that include split trust, ubiquitous data encryption, and contextual access—reduce and mitigate implicit trust in your cloud provider along with allowing you to manage your own encryption and manage access to your data in the cloud.
2:45 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
2:45 pm - 3:15 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:15 pmCybersecurity Leader's Guide to Talking to VendorsIt’s Like Dating, and Both Sides Can Better Communicate to Be More SuccessfulVP, Information Security, Centene CorporationRegistration Level:- Conference Pass
3:15 pm - 4:00 pmKey Take-Away: Tips for cybersecurity leaders and vendors to better be realistic, honest, and direct to benefit both sides.
In this presentation, Rick Doten will share from his unique experience on this topic and cover:
- Getting customers to swipe right
Vendor email, LinkedIn, and phone etiquette; don’t lead with an insult, or try to guilt them to connect. Examples of good and bad approaches. Customers shouldn’t be ghosting or rude. - The first date
Meeting tips for vendors, virtual and in-person; do your homework, get to the point quickly. Customers should be clear in their expectations, respectful, and not abusive; provide constructive feedback. - After the date: getting them to text you back
Vendors need to understand it’s not a simple decision for large companies. Customers should be clear in their aspirations, set expectations with vendors. Vendors controlling sales management to give customer space/time.
3:15 pmDriving Business Strategy and Growth Using CybersecuritySr. Demand and Delivery Director, Data ProtectionRegistration Level:- Open Sessions
3:15 pm - 4:00 pmTraditionally, cybersecurity is often viewed as a means to reducing risks to an organization, thwarting the attacks of threat actors and securing company assets and infrastructure. When we examine the strategic goals and objectives that organizations undertake to promote their growth and success, we can often identify the interlinkage between business objectives and the services cybersecurity provides. By shifting the focus on how cybersecurity could enable an organization to bring products to market faster, make it easier for customers to conduct business with the company, create an environment to attract and retain employees and become the vendor of choice to our customers, we can strengthen our relationship with executive leadership and board of directors, become a trusted partner to the business, serve as a trusted advisor to line of business owners and shift the paradigm of cybersecurity from risk reduction cost center to a business enablement service line.
- Abnormal SecurityBooth: 430
Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.
- AccessIT GroupBooth: 200
AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.
AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.
- AkeylessBooth: 215
Akeyless Security is the company behind Akeyless Platform, the leading Vaultless Secrets Management platform designed to protect credentials, certificates and keys across multi-cloud and DevOps Environments.
- BeyondTrustBooth: 310
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry’s most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. We are trusted by 20,000 customers, including 78 of the Fortune 100, and a global partner network.
- Certes NetworksBooth: 340
Headquartered in the U.S. with a global presence in Europe, Middle East and Asia Pac, Certes Networks has been delivering security technology solutions to enterprises and governments around the world for over 15 years. Our technology is deployed across 1000 customers in nearly 100 countries and is certified for FIPS 140-2 and Common Criteria EAL4+. Our global foot print of organizations using Certes technology has helped customers to meet national, international or industry-specific regulations.
- Check Point Software TechnologiesBooth: 200
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- Cloud Security Alliance CarolinasBooth: 140
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud—from providers and customers, to governments, entrepreneurs and the assurance industry—and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.
- Critical StartBooth: 110
Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.
- Cyber Breakfast ClubBooth: N/A
The Cyber Breakfast Club ™ is a private cybersecurity breakfast group connecting cybersecurity executives and leaders each month over virtual breakfast.
- Cybercrime Support NetworkBooth: N/A
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- CybereasonBooth: 450
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- deepwatchBooth: 320
deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry. Designed to be different, deepwatch provides customers with world-class managed security services and unrivaled value by extending their cybersecurity teams, curating leading technologies into deepwatch’s cloud SecOps platform, and proactively driving their SecOps maturity.
- DelineaBooth: 630
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
- DevoBooth: 100
Devo, formerly Logtrust, is a technology company that developed the first real-time big data-in-motion software, which collects and analyses big data in real-time.
- Digital ShadowsBooth: 225
Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation.
- ForeScout Technologies, Inc.Booth: 200
ForeScout Technologies, Inc. has pioneered an agentless approach to network security to address the explosive growth of the Internet of Things (IoT), cloud computing and operational technologies (OT). We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of today’s vast array of physical and virtual devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2018, more than 2,900 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions.
- GigamonBooth: 230
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- Institute of Internal Auditors (IIA)Booth: N/A
Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession’s global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.
- North Carolina InfraGardBooth: 240
North Carolina InfraGard membership is comprised of professionals from various size companies of all industries. We hold regular meetings to discuss issues, threats and other matters that impact their companies. Speakers from public and private agencies and the law enforcement communities are invited. It is our goal to improve and extend information sharing between private industry and the government. InfraGard members gain access to information that enables them to protect their assets and in turn give information to government that facilitates its responsibilities to prevent and address terrorism and other crimes. Attend a local chapter meeting, meet FBI officials from your area and help protect your nation’s infrastructure.
- InsightBooth: 410
Insight is a comprehensive solutions integrator that helps organizations transform technology, operations, and service delivery to meet challenges and future-proof the business. With a client-focused approach to delivery, we recommend the most appropriate solutions to drive digital transformation and modernization for innovation. As clients look for ways to optimize data for better business, empower speed and scale of service, and drive next-gen security, Insight delivers expertise that is grounded, unbiased, and refreshingly straightforward.
- ISACA CharlotteBooth: N/A
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
- ISC2 Piedmont Triad ChapterBooth: N/A
We are the local ISC2 chapter here in central North Carolina. Our chapter meets bi-monthly and rotates between Greensboro and Winston-Salem meeting sites. We usually meet on the second Thursday of the odd months from 6-9 p.m. If you are a local Information Security Professional looking to join, please contact the membership chair at membership@isc2chapter114.org
- Charlotte Metro ISSABooth: 130
The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.
- Lake Norman IT ProfessionalsBooth: 250
Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!
- NCTECH AssociationBooth: N/A
Founded in 1993, the North Carolina Technology Association (NCTA) is a 501 (c) (6) not-for-profit association focused on advancing the state’s tech industry. NCTA has 700+ member companies, organizations and institutions representing more than 200,000 North Carolina based employees.
- NetskopeBooth: 210
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- North Carolina Center For CybersecurityBooth: N/A
Headquartered in Winston-Salem, the North Carolina Center for Cybersecurity, a 501(c)3 organization, accelerate regional economic development through applied cybersecurity to foster economic development. It will also position North Carolina as a leader in cybersecurity workforce development at the community level to help existing businesses meet the global demand for a more secure supply chain. Regional hubs across the state, operating under the umbrella of the North Carolina Center for Cybersecurity (NCCC), will concentrate on: Workforce development aimed at training students and retraining the local workforce to solve practical cybersecurity problems and help companies seeking a consistent supply of cybersecurity talent across multiple disciplines. Public, private, and academic collaboration focused on developing practical solutions to commercial cybersecurity problems that match each region’s economic strengths.
- Orca SecurityBooth: 200
We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.
- ProofpointBooth: 600
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- Qualys, Inc.Booth: 650
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
- Recorded FutureBooth: 120
Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.
- Red CanaryBooth: 245
Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.
- SafeBreachBooth: 440
SafeBreach’s mission is to change the way the industry deals with security and risk, and enable companies to use the security technologies they have invested in to the fullest. By validating those technologies against attacks, from the known to the latest emerging threats, they will drive risk down — on a continuous basis. Companies will be able to invest smart and protect more. They will be able to quantify risks to the business and drive a security strategy aligned with the company’s business growth. Changing the mindset of defenders to offensive and proactive will help us build a safer world.
- Salt SecurityBooth: 620
Salt Security delivers an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that you develop and own and are at the core of connecting your applications and data.
Salt Security was founded in 2016 by alumni of the Israeli Defense Forces (IDF) to deliver the first, patented API Protection platform to secure APIs. Salt Security deploys in minutes, automatically learns your unique APIs, and requires no configuration or customization to help you protect and improve your API security.
- SemperisBooth: 420
Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.
- SentinelOneBooth: 610
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- SIM CharlotteBooth: N/A
The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:
- Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
- Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
- Challenging our comfort levels by exchanging ideas with peers and business counterparts.
- Being a resource for each other, and personal networking.
- Skybox SecurityBooth: 300
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
- TechTargetBooth: N/A
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThalesBooth: 330
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- Trend MicroBooth: 640
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- Women in CyberSecurity (WiCyS)Booth: N/A
Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.
- Terry Olaes, ModeratorDirector, North America Systems Engineering, Skybox Security
Terry Olaes is director of North America systems engineering at Skybox Security. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security teams have provided Terry with a unique perspective on fortifying IT/OT security posture. Terry specializes in helping organizations devise the right cybersecurity strategies to help manage vulnerabilities and mitigate risks across IT, OT, and hybrid cloud environments. Previously, he has served in security management roles at Neiman Marcus and IBM. Terry has a BA in Business Administration and Management from the University of Phoenix.
- Jose FerreiraSr. Director, Security Solutions, East, Sirius, a CDW Company
Ferreira helps enterprises develop and maintain proactive security programs. He has over two decades of IT security experience and works with organizations to understand their assets, identify security gaps, and define the people, processes and technology that can facilitate mitigation and support business goals. He focuses on the development of tactical and strategic data protection plans, and applies his knowledge of core infrastructure security, security program governance, threat and vulnerability management, identity and access management, and application security to enable the improvement of overall security posture.
- Rob DalzellBISO, Bank of America
Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awareness. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte, and enjoys connecting with others that work in Cybersecurity. Rob is an active supporter and advocate for those impacted by disabilities and is an advocate in the Women in Technology and Operations (WIT&O) organization. He is an ardent believer in life-long learning. In his spare time, he can be found playing or officiating soccer, generating sawdust or digging in the dirt around his house, and trying to keep a British sports car running.
- Margaret WhiteSVP & BISO, Wells Fargo
Margaret White is currently Senior Vice President, Business Information Security Officer (BISO) for Wells Fargo’s Enterprise Functions. In this role, Margaret leads execution of cybersecurity posture and strategy for enterprise-wide cybersecurity engagements and provides bi-directional transparency to Enterprise Functions CEOs and CIOs. Prior to joining Wells Fargo, Margaret served in multiple leadership roles at Bank of America including Cybersecurity Technology Strategy for Incident Management and Data Loss Prevention; Threat Prevention Operations Transformation; Corporate and Commercial Banking BISO; and Customer Notifications Engine, delivering six million alerts per day.
An award-winning technology leader in Financial Services, Margaret has spent nearly 20 years building, designing and protecting Critical Infrastructure financial systems. Passionate about people, Margaret advocates for colleagues, clients and the underserved through her work as a mentor and volunteer in employee networks and community organizations such as Women in Technology, Girls Who Code, Women in Cybersecurity (WiCyS) and BSides.
Margaret is a Certified Information Systems Security Professional and holds a BS in Computer Science from Florida State University where she co-founded the Women in Computer Science organization (now a chapter of ACM-W).
- Christopher ZellVP, Cyber Operations and Analysis, Dell Technologies
Chris is currently Vice President, Cyber Operations and Analysis, for Dell Technologies. In this role, Chris leads the strategy and optimization of Dell's Cyber Security Operations (CSIRT, eFI, Security Assurance and Vulnerability Management) globally. Prior to joining Dell, Chris served at the first CISO for the Wendy's company, where he spent five years growing and maturing the Information Security organization, with responsibility for the security of over 6,800 restaurants as well as a massive e-commerce platform. Before joining Wendy's, Chris was the first Director of Cyber Security Operations for Lowe's Home Improvement, building out their first Security Operations Center, and held various leadership roles during his tenure.
A decorated 22-year veteran of the US Air Force, Chris spent his military career building, protecting, and defending critical systems and networks from some of the most advanced threat actors in the world. Passionate about giving back to the community, Chris is known as a trusted mentor and champion of diversity and inclusion, and is a staunch supporter of our military veterans.
Chris is the Vice-Chair of the Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC), an Executive Committee member of the Cybersecurity Collaborative, and frequent advisor to cyber start-ups and VCs. He holds a bachelor’s degree in Information Technology from Western Governors University as well as multiple industry certifications.
- Chris A. Quintanilla, CISSPBoard President/Strategic Development Committee Chair, Philadelphia InfraGard
Chris has over 25 years’ experience in the IT field and is a Certified Information Systems Security Professional (CISSP). He has served as a senior project manager and engineer for several federal and municipal governments’ IT projects, as a network and systems engineer for IBM's Education and Training Division, and as an adjunct faculty member at the Pennsylvania Institute of Technology. Chris leverages his associations with federal law enforcement along with his IT background to advise clients on matters of information security, works with them to implement best practices to safeguard critical systems and sensitive information, and assists victims and law enforcement after malicious acts occur. Chris has been appointed by three different U.S. Presidents and two different Governors as a US Selective Service Board Member. He is also an information systems officer in the US Coast Guard Auxiliary.
- Darren CarrollManaging Principal - Security Services, Insight
Darren is a risk management and information security leader with diverse global experience in operational, technical, management, and presales roles. He has had the pleasure to build and lead multiple diverse, dynamic, high-performing teams. Throughout his career, he has provided consultative thought leadership, strategic direction, and tactical response to multiple federal, state, and local agencies, many of the Fortune 100, and hundreds of mid-sized enterprises.
- Maggie MacAlpineSecurity Strategist, Cybereason
Maggie MacAlpine is a security strategist at Cybereason and one of the co-founders of the DEF CON Voting Village. Over the course of 10 years spent in the field of cybersecurity, MacAlpine has been a contributing researcher on the "Security Analysis of the Estonian Internet Voting System" in partnership with the University of Michigan, co-author of the DEF CON Voting Village annual reports, and appeared in the HBO documentary "Kill Chain." She has been a speaker on cybersecurity threats at various conferences, including DEF CON, the Diana Initiative, ShmooCon Hacker Conference, PacSec Tokyo, and in presentations to Capitol Hill.
- Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Terry Ziemniak, CISSPChapter Member, (ISC)2
Terry has over 25 years' experience in the information security field with work ranging from hands on security penetration testing to the build out of complex, state of the art cyber protections. Additionally, he has spent over a decade in the role of Chief Information Security Officer for very large organizations (including Atrium Health here in Charlotte). Terry brings that technical experience and business acumen into the consulting space—helping business leaders navigate the risks and rewards of cybersecurity. Terry has achieved the CISSP (Certified Information System Security Practitioner) designation as well as having completed his Master's degree in Information Security from DePaul University. He has spoken on cybersecurity topics to groups all over the country and as far away as Germany.
- Christopher McMahonSpecial Agent, Global Investigative Operations Center, United States Secret Service
Chris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Service career out of the New York Field Office spending time between the Fraud Squad and Electronic Crimes Task Force where he earned the designation NITRO Agent for specialized training in network intrusions. While in the New York Field Office, Chris ran point on several large-scale multi-national criminal investigations targeting transnational organized crime groups. Chris is currently assigned to the U.S. Secret Service, Global Investigative Operations Center (GIOC) where he specializes in Business Email Compromise schemes and account takeovers focusing on the international nexus of cyber-enabled financial crime.
- McClellan 'Mac' PlihcikSenior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
- Mike Muscatell, ModeratorSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Brett Price, CISSP, CISMLead Cybersecurity Consultant, vCISO, AccessIT Group
Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. Brett’s skills range from analyzing network packet behavior to securing enterprise critical infrastructure with expertise in assessing and consulting on risk management frameworks and standards such as NIST 800-53, NIST CSF, CIS and ISO/IEC 2700X. Brett has experience working with enterprise and mid-market customers across various industry sectors such as healthcare, banking, industrial, retail, pharmaceutical and insurance.
- Neal HumphreyArea VP - Security Strategist, Deepwatch
Neal Humphrey has been active in the security industry for nearly 20 years. He has reviewed Security from the Application layer, to the Transport Layer, to Cyber Threat Intelligence, and finally to the Human. Over the last 20 years he has worked with customers from the Global 100 down to the SMB market to identify and solve Cyber Security Operation issues and to help to understand and mature Security Architectures and processes. Neal has always taken a human based approach to Security that allows for faster improvement and effective determination of tool use and capabilities.
- Crane HassoldDirector of Threat Intelligence, Abnormal Security
Crane Hassold is the Director of Threat Intelligence at Abnormal Security, where he leads a team responsible for researching enterprise-focused cyber threats. Prior to joining the private sector in 2015, Crane served as an Analyst at the Federal Bureau of Investigation for more than 11 years, providing strategic and tactical analytical support to cyber, financial crime, and violent crime cases. For most of his career with the FBI, Crane worked in the Behavioral Analysis Units in Quantico, Virginia, where he provided analytical and behavioral support (“profiling”) to intelligence community and law enforcement partners against national security adversaries and serial criminals. Crane has also been recognized as a subject matter expert in open source intelligence collection and has presented at numerous conferences about using successful analytical techniques.
- Peter SteyaertSr. Sales Engineer Manager, Gigamon
- Justin HarrisDirector of Product Management, Delinea
Justin Harris is a 20+ year technology veteran with a wide range of vertical industry exposure that has a knack for understanding how market trends introduce market needs. In his role as Director of Product at Delinea he leads the Vault portfolio of products such as Secret Server and DevOps Secure Vault. Justin’s area of expertise includes bringing secure SaaS platforms to market, cloud-native design, product evangelism, and unified communication.
- Simon HillHead of Legal & Compliance, Certes Networks
As VP of Legal and Compliance for Certes Networks, Simon assists with Regulatory and Compliance matters, Intellectual Property and interpretation of Security and Compliance Framework requirements. Simon has extensive international experience as a technology lawyer, working in multiple jurisdictions including the European Union, Japan, India and the United States for clients in both government and private sector.
Simon is a regular speaker on data protecting regulations and cybersecurity standards including GDPR, PCI DSS, NIST publications, NERC CIP standards and Executive Order 142028 (Improving the Nations’s Cybersecurity). Simon resides in Pittsburgh, Pennsylvania.
- Moderator: Mike HillhouseCIO / CISO, Cadrillion Capital
- Stephen FitzgeraldSr. Sales Engineer, Orca Security
From writing detection rules and automations for SOC teams to assisting with compliance initiatives, cloud security has always been the focus of Stephen's career. Currently Stephen serves as a Senior Solutions Engineer at Orca helping customers architect and operationalize the Orca platform, as well as providing risk assessment reviews and guidance on security operations overall. Outside of his professional pursuits, he enjoys cars, computer hardware, and anything where he get's to play defense.
- Aaron RoseSecurity Architect, US Public Sector, Office of the CTO, Check Point Software Technologies
Aaron Rose is a Cyber Security Evangelist, Security Architect & Member of the Office of the CTO at Check Point Software Technologies. A subject matter expert in Cloud, Internet of Things, and Application security; Aaron has focused his career on securing organizations & their resources beyond the perimeter of the traditional network firewall.
An avid international traveler, Aaron welcomed the opportunity to spend three months in Tel Aviv’, Israel training with Check Point’s research & development teams at the company’s global headquarters.
- Rob VanderberryRegional Sales Manager, Thales
Rob Vanderberry is celebrating his 26th year of technology sales and consultation, experienced in selling solutions to businesses and public sector organizations as manufacturer rep, distributor and reseller. Rob has a passion for helping organizations achieve successful business outcomes through optimized blends of technology, knowledge and people. Evolving a focus on cyber security since 2017, today he is a regional sales manager for the southeast U.S., providing data encryption and key management solutions to Fortune 1000, Enterprise and Commercial companies in the Carolinas and Tennessee.
- Vitaliy ShtymManager, Cloud Architect, Trend Micro
Vitaliy Shtym is a Cybersecurity Practitioner with over 10 years of experience, 5 of which have been at Trend Micro. Vitaliy has been in multiple customer facing roles to address cybersecurity challenges in organization of all sizes. He focuses on architecting optimal security solutions for customers leveraging Public and Hybrid Cloud. With primary focus on customers that are migrating their infrastructure from traditional, monolithic, applications to modern technologies like Docker/Kubernetes and Serverless.
- Moderator: Frank DePaolaVP, CISO, Enpro
Frank is the CISO at EnPro Industries (NPO). He is passionate about striking balance between the responsible use of technology and effective risk management. In his role, Frank is responsible for defining, championing, and executing the cybersecurity and regulatory compliance strategies, programs, and initiatives globally, in deep collaboration with IT and business stakeholders. Frank is an advocate for education and constant personal and professional growth, as well as mentoring others. He is a proud US Army veteran and former U.S. Army AIT Instructor.
- Torry CrassAgency CISO, North Carolina State Board of Elections
Torry Crass currently serves as the Agency CISO at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.
Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry was a CISO at LEO Cyber Security based in Fort Worth, TX, assisting a variety of clients with all aspects of planning, implementing, and improving cybersecurity programs in manufacturing, industrial, utility, and financial sectors. Prior to LEO Cyber Security, he spent 14 years with SPX Corporation and finished his time there as the Manager of Information Security.
Torry also serves as the chair of the InfraGard National Cyber Camp Program, an advisory board member for the Cyber Crime Technology Program at SPCC, a co-chair of BSides Charlotte security conference, and a member of the South Carolina State Guard cyber unit regularly participating in cybersecurity related activities and exercises with the National Guard and other organizations. In addition to his organizational involvement, he regularly presents at industry conferences and contributes to industry publications such as InfoSec Magazine and PenTest Magazine.
- Chad BarrDirector of Governance & Compliance, Risk Advisory Services, AccessIT Group
Chad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.
As a visionary leader in the realm of cybersecurity, Chad has honed his skills across multiple disciplines, including security engineering, project management, risk management, and compliance. His extensive background underscores his ability to guide organizations toward robust and resilient security postures.
- Ran BarthDirector of Security Engineering, Salt Security
Ran is an Enterprise Security Expert with many years of experience helping Fortune 500 companies secure their data and applications. Ran has detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets with focus on web applications.
- David OrtegaPrincipal Solution Architect, Digital Identity and Security, Thales Cloud Security
David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expertise is in security advisory services, architecture and solutions engineering, and digital transformation data-centric solutions that drives business value and manages risks.
- Rick DotenVP, Information Security, Centene Corporation
Rick is CISO of Carolina Complete Health, a state healthcare plan, for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industries and companies around the world. Other notable roles over last 20 years have been as a Risk Management consultant at Gartner, Chief Scientist for Lockheed Martin’s Center for Cyber Security Innovation, and Managing Principal in the Professional Security Services practice at Verizon.
- Toby ZimmererSr. Demand and Delivery Director, Data Protection
Toby Zimmerer is a Senior Demand and Delivery Director in Optiv’s Data Governance, Privacy, and Protection practice, where he assists organizations with building programs and implementing solutions focused on protecting high value information and assets. He has more than 24 years of professional experience developing information security strategies, designing information security programs, developing information security solutions and leading teams with deploying and operating information security programs. Toby has an MBA, a BS in electrical engineering, a CISSP certification, a CCSK from the Cloud Security Alliance, and is a US Navy veteran.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes