googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, April 9, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Wednesday, April 10, 2024
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Building Your Cybersecurity Community: Connections and Career Growth
    speaker photo
    BISO, Bank of America
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Developing meaningful professional relationships and strategically managing your career are vital for success and advancement in the fast-moving cybersecurity ecosystem. Connections are critical in our lives – we cannot do it alone. This closed-door, interactive session provides perspectives and frameworks for expanding your network both internally and across the industry. Come ready to share and hear proven approaches for becoming a trusted advisor to business leaders while raising the profile of your security team. We’ll discuss techniques to foster connections through conferences, media, and writing while aligning activities to your long-term career roadmap. Participants will leave ready to proactively network with purpose, find and become mentors and sponsors, and chart a fulfilling career trajectory in cybersecurity.

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Lake Norman & Charlotte IT Professionals Joint Meeting [Open to all attendees]
    • session level icon
    Behind the Security Leader: Hidden Figures of Influence
    speaker photo
    Sr. Cybersecurity Manager, Krispy Kreme
    speaker photo
    Deputy CISO, Ingersoll Rand
    speaker photo
    CISO, Belk
    speaker photo
    SVP & CSO / CISO, American Tire Distributors
    speaker photo
    Sr. Director, Information Security Architecture, CISSP, C|CISO, Lowe's
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    We frequently spotlight the individual brilliance of high-profile security executives like the CISO when discussing cyber program successes. But rarely do we hear about the mentors, role models, advisors, and champions that propelled leaders to those spotlighted positions. In this revealing panel, influential cybersecurity leaders peel back the curtain to discuss the hidden figures who helped shape their journey, style, and accomplishments as security leaders. Which quiet influencer gave a nudge at a critical career junction or provided wise counsel to avoid pitfalls? What inspiring figure led by example and modeled courageous leadership in turbulent times? Attendees will enjoy hearing personal stories of those who left an indelible, if unseen, mark in empowering leaders.

    8:00 am
    Charlotte Metro ISSA Chapter and Phish Club Meet-and-Greet
    • session level icon
    Open to all attendees
    speaker photo
    President, Charlotte Metro ISSA Chapter
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Come join the local ISSA chapter and Phish Club members to network, learn about both organizations, and meet your local leadership for the groups.
    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote Panel] Defending Democracy: Safeguarding Election Security in 2024
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    As the United States gears up for the 2024 elections, the critical importance of securing the electoral process is paramount. This keynote panel assembles representatives from North Carolina’s Board of Elections to dissect the evolving landscape of election security – 5 weeks after the state’s primary elections and eight months before the general election, including the Presidential election. From safeguarding voter data to countering cyber threats, the discussion will delve into the multifaceted challenges and innovative solutions that shape the defense of democracy.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] From Frustration to Funding: Securing the Buy-In You Need for Robust Cybersecurity
    • session level icon
    speaker photo
    CISO, Novolex
    speaker photo
    VP & Global CISO, Hanesbrands Inc.
    speaker photo
    Director, Infrastructure & Security, National Gypsum
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Do you struggle to convey the criticality of cybersecurity investments to leadership? This session equips you with the tools to move beyond frustration and secure the funding your cybersecurity program needs. Our panelists cover how to:

    • Craft a compelling narrative: Learn how to translate technical jargon into business-relevant risks and ROI-driven justifications.
    • Quantify the cost of inaction: Highlight the potential financial and reputational damage cyberattacks can inflict.
    • Align with business goals: Demonstrate how strong cybersecurity supports key business objectives and initiatives.
    • Use data to your advantage: Leverage industry statistics and relevant case studies to build a data-driven case.
    • Master the art of presentation: Develop presentation skills and communication strategies to resonate with non-technical stakeholders.
    10:15 am
    Fighting the Cyber War with Denial and Deception: Lessons from the Ghost Army
    • session level icon
    speaker photo
    Deputy CISO & Staff VP, Cyber Defense Operations, Centene Corporation
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Denial and Deception is often misunderstood as a problem that needs a purely technical solution. In contrast, World War II highlighted the U.S. Army’s 23rd Headquarters Special Troop (Unit), known as the Ghost Army, which was stood up with the sole purpose of tricking the German Army into attacking a site 10 miles away from the actual location that allied forces would engage. This was accomplished through creating false infrastructure and operations. The basic concept of counterintelligence is to decrease or eliminate an adversary’s ability to collect or operate effectively against you.
    10:15 am
    Global Threat Report: Breaking Down the Tradecraft of Adversaries
    • session level icon
    speaker photo
    Regional Sales Engineer, CrowdStrike
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Join this session that explores CrowdStrike’s seminal report on the world’s most prolific eCrime, nation-state and hacktivist adversaries, their rapidly evolving tradecraft, and the novel cyber threats facing organizations and society at large. Explore the surge in adversaries leveraging stolen identity credentials, exploiting gaps in cloud environments and using interactive intrusion (hands-on-keyboard) tactics to stay under the radar, evade legacy defenses and dramatically accelerate the speed of attacks. This session also uncovers early evidence of adversaries experimenting with – and abusing – generative AI to democratize attacks and lower the barrier of entry for more sophisticated operations. Add in the pending threats to free elections in the U.S. and across the globe, and this year’s session is a must for all!

    10:15 am
    Sysmon 101: Leveling Up Windows Security
    • session level icon
    speaker photo
    Lead Incident Detection Engineer, Blumira
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Sysmon, a component of Microsoft’s Sysinternals software package, provides a treasure trove of information for Windows logs – but first, you need to know how to tap into it. Sysmon enriches Windows logs beyond what Windows Event Viewer can provide, bringing a higher level of monitoring into certain events like process creation, network connections, file system changes, and more to detect malicious activity. Learn how to use this free resource to its full potential and get better security coverage across your Windows environment.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    [Panel] Working with Law Enforcement Before and After (Inevitable) Cyber Incidents
    • session level icon
    speaker photo
    Assistant U.S. Attorney, U.S. Attorney's Office, Western District of North Carolina
    speaker photo
    Senior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
    speaker photo
    Supervisory Special Agent for the Intrusion Squad, Charlotte Division, FBI
    speaker photo
    Advisor to The Identity Theft Resource Center; Founder, Frozen Pii LLC
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    The adage that “there are only two types of companies: those that have been hacked and those that will be” is just as true today as it was in 2012. Technological advances in wireless technologies and the internet, along with the growth of global criminal organizations, nation-state hackers, and Cybercrime-as-a-Service, have given criminals a potential leg up. It’s more likely than not that your enterprise or SMB business inevitably will fall victim to a “cyber incident.” Cyber-incident preparedness includes knowing when and who to call in the FBI or Secret Service. Our panel of experts offer real-world case studies and tips for partnering with law enforcement.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Solutions Architect, Syxsense
    speaker photo
    CEO, Envision Technology Advisors
    speaker photo
    VP, Information Security, Essent Guaranty, Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    11:10 am
    PCI DSS v4.0 Is Here… Now What? – Ask the Expert
    • session level icon
    speaker photo
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    The PCI DSS 4.0 compliance deadline has come and gone. The previous PCI Data Security Standard (version 3.2.1) is officially retired, and a multitude of new requirements of PCI DSS 4.0 need to be implemented. Do you have questions regarding the transition to PCI DSS v4.0? Get all your PCI compliance questions answered in this open forum discussion and stay ahead of the curve. Come armed with your PCI questions and learn about the new requirements and what specific steps to take to be compliant.
    12:00 pm
    [Lunch Keynote Panel] New Risks for CISOs: The Downstream Effects of New SEC Regulations
    • session level icon
    speaker photo
    Former CISO, The Clorox Company
    speaker photo
    CISO, Premiere, Inc.
    speaker photo
    National Director – Cyber Risk Center of Expertise, Jefferson Wells
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    As cybersecurity professionals grapple with an ever-evolving threat landscape, the introduction of new SEC regulations adds a layer of complexity to their strategic considerations. This session dives deep into the downstream effects of recent SEC regulations. Explore the nuanced risks these regulations pose, dissect the potential impact on cybersecurity protocols, and strategize ways to fortify your organization’s defenses against emerging challenges. Led by seasoned experts, this session aims to equip CISOs with the knowledge and insights needed to proactively navigate the uncharted waters of new SEC regulations.
    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Cybersecurity Maturity Model Certification (CMMC) 2.0: Raising the Bar
    • session level icon
    speaker photo
    National Director – Cyber Risk Center of Expertise, Jefferson Wells
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    In today’s ever changing digital landscape, organizations must be prepared to deal with the increasing threat landscape and associated cyber risks. In response to this, the federal government has introduced the Cybersecurity Maturity Model Certification (CMMC). This standard incorporates a number of best practices and security standards into a grading scale of maturity against which an assessed organization can be compared. It is designed to enforce protection of sensitive unclassified information that is shared by the Department of Defense with their suppliers, contractors, and subcontractors. As the proposed final rule was published on December 26, 2023, it is only a matter of time before companies doing business either directly or indirectly with the DoD will be required to obtain a CMMC certification prior to contract award. It has been estimated that over 220,000 companies with be impacted by this requirement, so in a multi-tier supply chain you may be subject to this cybersecurity standard and not even know it. In this informative session, you will learn how CMMC 2.0 may impact your organization, the differences between Level 1, Level 2, and Level 3 attestation, the steps you should be taking now to prepare, and the pitfalls to avoid.

    1:15 pm
    [Panel] The Secret Potential of AI and ML: Empowering Cyber Superheroes with Artificial Intelligence
    • session level icon
    speaker photo
    Head of Security Research, Normalyze
    speaker photo
    Director, U.S., LightBeam.ai
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Artificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.

    Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.

    Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.

    1:15 pm
    The Path to Strategic Application Security
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Application Security is a critical function of any business that develops any of their own software. As we’ve seen in recent reports and studies, attacks against applications are a significant risk and are on the rise. Having a Strategic Application Security program as part of any business’s overall security program is becoming more and more important. We will discuss, how organizations are similar but have different Application Security needs, Application Security trends, Strategic Application Security and what it entails, and Application Security challenges we face. Attendees will leave with an understanding of Strategic Application Security and the steps an organization can take to begin to strategize and implement an Application Security program of their own.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Insider Threat Actors & Artificial Intelligence
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Threat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.

    This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and how to identify behavioral elements utilizing a number of security solutions. Through live demonstrations, we will show how “everyday activities” can result in higher risk to the company.

    Objectives:

    • Learn the methodologies utilized by individuals within the organization that would be considered insider threat activity.
    • Learn how to identify system and user-based behavioral indicators.
    • Learn which existing or enhanced security layer can provide insider threat profile data.

    Take-Aways:

    • How to identify business processes which can contribute to intentional or unintentional insider threats.
    • Enhance procedures required to identify insider threat exposures.
    • Enhance awareness training to include additional methods of insider threat.
    • Enhance existing physical and digital security layers to better identify specific insider threat activity.
    2:10 pm
    Security as a Team Sport
    • session level icon
    speaker photo
    CISO, MercuryGate International
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Today’s sophisticated cyber threats demand a united front: your organization as a team. This session empowers you to build a winning team, where every player contributes and collaboration reigns supreme. This session breaks down how to:

    • Identify the key players: From boardroom to frontline, understand the roles individuals must play in your security strategy.
    • Break down silos: Bridge the gap between IT, business units, and employees to foster proactive communication and information sharing.
    • Build a culture of security: Implement strategies that encourage awareness, training, and responsible behavior across the organization.
    • Embrace technology: Explore tools and platforms that facilitate collaboration, incident response, and team-based decision-making.
    • Learn from the pros: Discover real-world success stories and gain actionable insights for building your own winning security team.
    2:10 pm
    [Panel] Elevating Security Through Threat Intelligence, Cloud Resilience, and AI Innovations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Unlock the secrets to fortified digital defenses and proactive cybersecurity leadership in our compelling panel session. Join us for a deep dive into the strategic integration of threat intelligence, cloud resilience, and cutting-edge AI innovations, unraveling their pivotal roles in the contemporary threat landscape. This isn’t just a discussion; it’s your gateway to actionable insights that will empower you to not only stay abreast of the cybersecurity curve but surge ahead as a strategic leader in the realm of digital security.
     
    Key session highlights:
    • Strategic Threat Intelligence Deployment: Learn how to strategically harness threat intelligence to decipher, anticipate, and proactively respond to the ever-evolving cyber threat landscape.
    • Cloud Resilience Strategies: Explore innovative approaches to fortifying your cloud infrastructure, ensuring resilience in the face of emerging threats and disruptions.
    • AI-Powered Security Innovations: Dive into the realm of AI-driven cybersecurity innovations and discover how artificial intelligence is transforming threat detection, response, and overall security posture.
    • Real-world Case Studies: Gain insights from real-world case studies showcasing successful integrations of threat intelligence, cloud resilience, and AI innovations, providing tangible examples for implementation.
    • Optimizing Security Leadership: Elevate your role as a security leader by understanding how to navigate the complexities of contemporary cybersecurity challenges, fostering a proactive and resilient security posture.
    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:30 pm
    [Closing Keynote] Understanding How Principles of Threat Intelligence Can Improve Use of AI
    • session level icon
    speaker photo
    VP, Information Security, Centene Corporation
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    As organizations find new ways to leverage AI to analyze or generate information, there arise risks of inaccuracies, bias, or AI hallucinations to the output that could impact business decisions. 

    There are decades-old practices (if not longer) by intelligence communities on how to collect, process, and synthesize data to make informed decisions based on accurate and relevant data.  These can apply to use with GenAI.

    This discussion will talk about how to leverage these techniques and account for characteristics of data such as its completeness and timeliness; as well as attributes like volume and variety when analyzing output from GenAI prompts.  The goal is to reduce risk of making decisions based on inaccurate or incomplete data.

Exhibitors
  • AccessIT Group
    Booth: TBD

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • AppOmni
    Booth: TBD

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user

  • Axonius
    Booth: TBD

    Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.

  • Blumira
    Booth: TBD

    Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility.

    Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

  • Charlotte IT Professionals
    Booth: TBD

    We are a growing organization, with a goal to help shape the Charlotte area’s IT groups to better deliver value to our respective companies. As our profession in technology becomes more immersive and the speed of change increases, our lives both personally and professionally require a commitment to lifelong education and networking. We offer numerous ways to connect, from our peer leadership breakfast meetings, to yearly outings, and other evening networking and educational events. Our Purpose is to facilitate various opportunities to Meet Learn and Share.

  • Charlotte Metro ISSA
    Booth: TBD

    The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits.

  • Cloud Security Alliance Carolinas
    Booth: TBD

    The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud—from providers and customers, to governments, entrepreneurs and the assurance industry—and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.

  • Cofense
    Booth: TBD

    With more than 90% of breaches attributed to successful phishing campaigns, it’s easy for organizations to point to the everyday employee as the root cause – as the problem to be solved. We disagree. CofenseTM believes employees –  humans – should be empowered as part of the solution to help strengthen defenses and gather real-time attack intelligence to stop attacks in progress.

  • CrowdStrike
    Booth: TBD

    CrowdStrike sets the standard for cybersecurity in the cloud era. The CrowdStrike Falcon® platform protects and enables the people, processes, and technologies that drive modern enterprise, delivering superior protection, better performance, reduced complexity, and immediate time-to-value. CrowdStrike secures the most critical areas of enterprise risk—endpoints and cloud workloads, identity, and data—to keep organizations ahead of today’s adversaries and stop breaches.

  • CyberArk Software
    Booth: TBD

    CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

  • Envision Technology Advisors
    Booth: TBD

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • Forcepoint
    Booth: TBD

    Forcepoint is transforming cybersecurity by focusing on what matters most: people’s behavior as they interact with critical data and systems. Forcepoint behavior-based solutions adapt to risk in real time and are delivered via a converged security platform, protecting the human point for thousands of enterprise and government customers. Our solutions include Cloud Security, Network Security, Data & Insider Threat Security.

  • GuidePoint Security LLC
    Booth: TBD

    GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com

  • Lake Norman IT Professionals
    Booth: TBD

    Our vision is to meet IT professionals within our Local IT community for learning, sharing, community outreach, leadership and professional growth. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to the E2D organization, who is helping to eliminating the digital divide!

  • National Cybersecurity Alliance
    Booth: TBD

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Okta
    Booth: TBD

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Optiv
    Booth: TBD

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • Ordr
    Booth: TBD

    In the hyper-connected enterprise, in which everything from simple IoT devices to complex multi-million-dollar systems are connected, traditional agent-based and human-generated security models simply cannot scale. Ordr solves this problem, providing enterprises with complete visibility and exhaustive control over every class of network-connected device and system. The Ordr Systems Control Engine is the only purpose-built solution to fully map the device flow genome at massive scale, using machine learning to completely and continuously inspect, classify and baseline the behavior of every device. Ordr’s software architecture is unique in its ability to process enormous quantities of data in real-time, using sophisticated AI to deliver closed loop security, automatically generating policies for each class of device and implementing those policies directly through the organization’s existing multi-vendor network and security infrastructure.

  • Palo Alto Networks
    Booth: TBD

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Phish Club
    Booth: TBD

    Phish Club is a dynamic and inclusive community dedicated to ‘phishing’ cybersecurity professionals into a world of networking and learning. We provide a platform for engaging discussions, knowledge sharing, and valuable networking opportunities in the ever-evolving realm of cybersecurity. Our goal is to foster connections, offer insights, and promote learning in a supportive environment.

    Let’s navigate the cyber seas together, ‘phishing’ for valuable connections and knowledge. Join Phish Club and embark on an exciting journey in the world of cybersecurity!

  • Rapid7
    Booth: TBD

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • SIM Charlotte
    Booth: TBD

    The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:

    • Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
    • Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
    • Challenging our comfort levels by exchanging ideas with peers and business counterparts.
    • Being a resource for each other, and personal networking.
  • Snyk
    Booth: TBD

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • Synopsys
    Booth: TBD

    Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.

  • Syxsense
    Booth: TBD

    Syxsense is the world’s first software vendor providing cloud-based, automated endpoint and vulnerability management solutions that streamline IT and security operations. With our advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT risks and optimizing operational efficiency. Our real-time alerts, risk-based vulnerability prioritization, pre-built remediations, and intuitive automation and orchestration engine enable organizations to focus on their core business goals—confident in the knowledge that their enterprise is secure, compliant, and running smoothly. Rely on Syxsense to safeguard your IT infrastructure, so you can concentrate on what you do best—driving your business forward.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • WiCyS North Carolina Affiliate
    Booth: TBD
  • Zscaler
    Booth: TBD

    Zscaler’s Cloud-delivered security solution provides policy-based secure internet access for any employee, on any device, anywhere. Our proxy and scanning scalability ensures ultra-low latency in a 100% SaaS security solution requiring no hardware, software or desktop all while providing complete control over security, policy and DLP.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Rob Dalzell, Moderator
    BISO, Bank of America

    Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access management, Responsible Vulnerability Disclosure, email encryption and general security awareness. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte and is in the final stages of completing a Master’s degree in Cybersecurity. Rob is an active supporter and advocate for those impacted by disabilities and is an advocate in the Women in Technology and Operations (WIT&O) organization. He is an ardent believer in life-long learning. In his spare time, he can be found playing or officiating soccer, generating sawdust or digging in the dirt around his house and trying to keep a British sports car running.

  • speaker photo
    Misty Haynes
    Sr. Cybersecurity Manager, Krispy Kreme
  • speaker photo
    Sherri Leach
    Deputy CISO, Ingersoll Rand

    Sherri Leach is a proven tactical and strategic innovator, harnessing over 27 years of technical leadership experience across multiple fields within cybersecurity. She is currently the Deputy CISO at Ingersoll Rand, and has previously served in operations and engineering roles at Trane Technologies, MITRE, and ManTech.

    Her skills have been applied across both public and private industry, including Fortune 500 companies, the US Intelligence Community, and the United States Federal Government. Sherri holds an MS in Information Systems and certifications from SANS Technology Institute.

  • speaker photo
    Neda Pitt
    CISO, Belk
  • speaker photo
    Kimberly Trapani
    SVP & CSO / CISO, American Tire Distributors
  • speaker photo
    James Kimble, Moderator
    Sr. Director, Information Security Architecture, CISSP, C|CISO, Lowe's
  • speaker photo
    Brent Bigelow, Host
    President, Charlotte Metro ISSA Chapter

    Brent is a seasoned Cybersecurity Leader with 36+ years of IT and Information Security experience and a passion for enhancing Cybersecurity through awareness training, architecture design, thought leadership, policy, people, process, and technology. He has worked in many industries including healthcare, aviation, financial, government, automotive, startups, insurance, and manufacturing. Having performed the roles of Chief Information Security Officer, Director of IT, Security Architect, individual contributor, consultant, hands on management positions and he understands the importance of providing secure solutions while enabling the business function. In his spare time, he is an avid Jeep enthusiast and participates in Jeep Offroad events around the country!

  • speaker photo
    Representatives from North Carolina State Board of Elections; State of North Carolina; and Mecklenburg County Elections
  • speaker photo
    Matthew Burroughs
    CISO, Novolex
  • speaker photo
    John Opala, PhD
    VP & Global CISO, Hanesbrands Inc.

    Cybersecurity thought leader with over 19 years of technical and leadership experience in multiple disciplines.

  • speaker photo
    Thomas Watson, CISM, CISSP
    CISO, isolved HCM

    Tom Watson has more than 25 years of experience in Information Risk Management and Security. His focus is on enabling businesses to be more productive while not losing focus on security and integrity of key corporate data. He has knowledge and experience working for multinational organizations as well as having fulfilled international assignments.

    Tom is currently the CISO for isolved HCM, which is a private equity owned software company with approximately 2,500 employees headquartered in Charlotte, NC. Prior to isolved, he was CISO for Sealed Air Corporation. Previous employers include Thermo Fisher Scientific, Bayer, Kuhn & Nagle, Disney/ESPN, Oxford Health Plans, and the NASDAQ Stock Market. His education includes a BS in Management and AS in both Business Administration and Aviation Technology obtained from Embry Riddle Aeronautical University.

    Tom was an adjunct professor at Southern Connecticut State University in the School of Business teaching students focusing on degrees in Management and Management Information Systems. He has maintained his CISM (Certified Information Security Manager from ISACA) and CISSP (Certified Information Systems Security Professional from ISC2) professional security certifications since 2003. He is a veteran of the Army National Guard and is also a certified volunteer firefighter with 10 years of active service.

  • speaker photo
    Mike Brannon, Moderator
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Charles Garzoni
    Deputy CISO & Staff VP, Cyber Defense Operations, Centene Corporation
  • speaker photo
    Justin Jordan
    Regional Sales Engineer, CrowdStrike

    As a skilled cybersecurity specialist with over 15 years of experience, Justin has honed his expertise in privileged access, identity security, and Endpoint Security Solutions. His background spans various industry-leading companies, including BeyondTrust, FireEye, and CrowdStrike. As a subject matter expert and advisor, he has contributed to the development of security solutions and offered best practices guidance for prominent global clients. His diverse experience encompasses network engineering, vulnerability assessments, and working as a Senior Engineer with an MSSP, equipping him with a comprehensive understanding of the cyber threat landscape.

  • speaker photo
    Amanda Berlin
    Lead Incident Detection Engineer, Blumira

    Amanda Berlin is Lead Incident Detection Engineer at Blumira, bringing nearly two decades of experience to her position. At Blumira, she leads a team of incident detection engineers who are responsible for creating new detections based on threat intelligence and research for the Blumira platform.

    An accomplished author, speaker, and podcaster, Amanda is known for her ability to communicate complex technical concepts in a way that is accessible and engaging for audiences of all backgrounds. She co-authored an O’Reilly Media book Defensive Security Handbook: Best Practices for Securing Infrastructure, a comprehensive guide for starting an infosec program from the ground up. She has presented at various industry events, including Blueteam Con, RSA Conference, and DEFCON. She is also co-host of Brakeing Down Security, a podcast about the world of cybersecurity, privacy, compliance, and regulatory issues that arise in today’s workplace.

    Amanda is the CEO and co-founder of Mental Health Hackers, a non-profit organization that aims to raise awareness about mental health issues in the cybersecurity community. Through Mental Health Hackers, Amanda is working to break down the stigma surrounding mental health and create a supportive community for cybersecurity professionals. Passionate about educating others, Amanda frequently develops courses and leads tabletop sessions through organizations such as Antisyphon Training and Wild West Hackin' Fest.

    Amanda is on multiple social media platforms as @InfoSystir, where she can be found sharing information security news, cracking jokes, and expressing her love for hedgehogs.

  • speaker photo
    Matt Warren
    Assistant U.S. Attorney, U.S. Attorney's Office, Western District of North Carolina
  • speaker photo
    McClellan 'Mac' Plihcik
    Senior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
  • speaker photo
    Jacob R. Guffey
    Supervisory Special Agent for the Intrusion Squad, Charlotte Division, FBI
  • speaker photo
    Tom O'Malley, Moderator
    Advisor to The Identity Theft Resource Center; Founder, Frozen Pii LLC

    Tom O’Malley is the founder of FrozenPii.com, a public service website promoting free security credit freezes and help for identity theft victims. He also serves as a consultant to the non-profit Identity Theft Resource Center. Previously, Tom was a career state (5 years) and federal prosecutor (32 years) in South Florida and Western North Carolina. His specialized legal experience included working as an Organized Crime Drug Enforcement Task Force Coordinator, Computer Hacking and Intellectual Property (CHIP) Coordinator and Identity Theft Coordinator. Tom also pioneered the use of historical cell site analysis in criminal trials beginning in 2010, and served as an instructor at the U.S. Department of Justice’s National Advocacy Center on the subjects of trial advocacy, searches of electronic devices, electronic evidence and cybercrime training, intellectual property litigation and cell site location analysis. Tom worked with hundreds of criminals as cooperators and government witnesses, and conducted over 200 jury trials during his prosecutorial career.

  • speaker photo
    Rocco Fiore
    Solutions Architect, Syxsense

    Rocco Fiore is a Solutions Engineer at Syxsense. Rocco has an eclectic experience profile within IT and Security, helping customers over the past seven years successfully implement transformational technologies in the areas of network security, wireless communications, and endpoint security. Experienced as a customer advocate and technical expert, he currently holds the Security+, CySA+, CCNA, and Microsoft Azure Administrator certifications.

  • speaker photo
    Todd Knapp
    CEO, Envision Technology Advisors

    Todd has been providing IT services nationally for over 25 years and draws inspiration and insight from participation in a wide range of executive boards and industry associations. He has an extensive background in strategic planning and implementation of business technology solutions, and founded his firm Envision Technology Advisors. As a presenter, Todd speaks throughout the country on a variety of technology and business topics including: Modern Workplace, Digital Transformation, Cybersecurity, and Evolving Digital Culture to fit the Modern Workforce.

    In his free time, Todd works with several non-profits and is also an avid sailor, wood worker, and scuba diver.

  • speaker photo
    Rapid7 Representative
  • speaker photo
    Snyk Representative
  • speaker photo
    Okta Representative
  • speaker photo
    James Keegan, Moderator
    VP, Information Security, Essent Guaranty, Inc.
  • speaker photo
    Chad Barr
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group

    Chad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.

    As a visionary leader in the realm of cybersecurity, Chad has honed his skills across multiple disciplines, including security engineering, project management, risk management, and compliance. His extensive background underscores his ability to guide organizations toward robust and resilient security postures.

  • speaker photo
    Amy Bogac
    Former CISO, The Clorox Company

    Amy Bogac was most recently the CISO and Vice President of Enterprise Security and Infrastructure at The Clorox Company. With a passion for securing great brands, Amy previously led the Global Information Security and Infrastructure department for CF Industries, was the Director of IT Security Operations for the Walgreen Company, a member of Walgreens Boots Alliance, and was also a founding member of the IT Security Department at the Kellogg Company. Amy holds an MBA from Lake Forest Graduate School of Management, a BA from St. Xavier University, and achieved her CISSP from ISC2 more than 10 years ago.

  • speaker photo
    Ben Schwering
    CISO, Premiere, Inc.
  • speaker photo
    Stephen Head, Moderator
    National Director – Cyber Risk Center of Expertise, Jefferson Wells

    As the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both published by Thomson Reuters. He served as International Chair of the ISACA Standards Board and as a Director on the ISACA international Board, was a Commissioner on the AICPA National Accreditation Commission, and served on the AICPA Information Technology Executive Committee at the National level. Stephen has spoken at numerous national and international events, including the IIA International Conference and the Association of Certified Fraud Examiners (ACFE) Annual Global Conference. He is a CPA, CISSP, CISM, CDPSE, QSA, PCIP, CMA, CFE, CISA, CGEIT, CRISC, CBCP, MCSE, CHP, CHSS, CITP, CGMA, CPCU, and holds an MBA from Wake Forest University.

  • speaker photo
    Zscaler Representative
  • speaker photo
    Stephen Head
    National Director – Cyber Risk Center of Expertise, Jefferson Wells

    As the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both published by Thomson Reuters. He served as International Chair of the ISACA Standards Board and as a Director on the ISACA international Board, was a Commissioner on the AICPA National Accreditation Commission, and served on the AICPA Information Technology Executive Committee at the National level. Stephen has spoken at numerous national and international events, including the IIA International Conference and the Association of Certified Fraud Examiners (ACFE) Annual Global Conference. He is a CPA, CISSP, CISM, CDPSE, QSA, PCIP, CMA, CFE, CISA, CGEIT, CRISC, CBCP, MCSE, CHP, CHSS, CITP, CGMA, CPCU, and holds an MBA from Wake Forest University.

  • speaker photo
    Abhinav Singh
    Head of Security Research, Normalyze

    Abhinav leads security research at Normalyze. He has previously worked for companies like AWS, Netskope, and JPMorgan. His contributions to the security community include international books, academic papers, patents, and blogs. He is an active speaker and trainer at conferences like Black Hat, DEF CON, and RSA.

  • speaker photo
    Jimmy Phipps
    Director, U.S., LightBeam.ai

    Data Security, Privacy, and Governance Evangelist at LightBeam.ai With more than 11 years of experience in selling cloud-based and enterprise-focused technology solutions, Jimmy has developed strong skills in new business development, customer relationship management, and strategic partnerships. He has also gained domain expertise in DPA, cloud security, and privacy automation, which are essential for addressing the growing challenges and opportunities in the data-driven economy. At LightBeam, he leads a team of high-performing sales professionals who are dedicated to delivering value and satisfaction to customers across various industries.

  • speaker photo
    Panel Discussion
  • speaker photo
    GuidePoint Security Representative
  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Chad Hicks
    CISO, MercuryGate International
  • speaker photo
    Mark Hurter
    Solutions Architect, CyberArk
  • speaker photo
    AccessIT Representative
  • speaker photo
    Panel Discussion
  • speaker photo
    Happy Hour
  • speaker photo
    Rick Doten
    VP, Information Security, Centene Corporation

    Rick is CISO of Carolina Complete Health, a state healthcare plan, for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industries and companies around the world. Other notable roles over last 20 years have been as a Risk Management consultant at Gartner, Chief Scientist for Lockheed Martin’s Center for Cyber Security Innovation, and Managing Principal in the Professional Security Services practice at Verizon.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Best practices & solutions, straight from the source

Join your local cybersecurity community for learning and professional growth!