- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, June 15, 20227:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 4:00 pmLocation / Room: Registration LobbyCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:- VIP / Exclusive
7:30 am - 8:20 amLocation / Room: Room 30Moderated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:30 am[Opening Fireside Chat] The Investigative Powers of the U.S. Secret ServiceAssistant Special Agent in Charge, Chicago Field Office, U.S. Secret ServiceSpecial Agent, Chicago Field Office, U.S. Secret ServiceRegistration Level:- Open Sessions
8:30 am - 9:15 amLocation / Room: Keynote Theater9:15 amNetworking BreakRegistration Level:- Open Sessions
9:15 am - 9:45 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:45 amI See What You Say! Effectively Communicating with Non-Technical StaffCybersecurity Director, Gannett FlemingRegistration Level:- Conference Pass
9:45 am - 10:30 amLocation / Room: Room 29Do you feel the gap between communicating with IT and your fellow colleagues keeps growing? How do you explain in digestible language the technical problems and solutions you and your InfoSec team are facing? Communicating is a highly effective tool that at times can get lost in literal tech translation, come join my session to learn how to connect with your non-technical peers in a way that doesn’t leave both parties more confused. We will discuss in a group setting tactics that have worked and I’ll share with you tips I’ve learned along the way!
9:45 amDéjà Vu All Over Again: The Student Body Left ProblemSr. Product Manager, CheckmarxRegistration Level:- Open Sessions
9:45 am - 10:30 amLocation / Room: Room 27Recent Common Vulnerabilities and Exposures (CVE) announcements like Apache Log4j have upended software teams all over the world. Scheduled work comes to a grinding halt, and triage and emergency surgery must be performed on applications. If not prepared, this unplanned work can derail productivity for weeks or even months. The longer it takes, the more pressure is applied by management. You can reduce the impact.
Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps.
A potential scenario: the security team has called an emergency meeting. A new vulnerability has been publicly disclosed that impacts not only your software, but your company and your customers. Will the required remediation take hours or even weeks to complete? It depends on your preparedness.
To improve your readiness and reduce impact, we will look at tips and actions you can take now.
- Learn more about the scope of the mess that was created by the Log4j CVE.
- Why most companies struggled to address it quickly.
- What steps you can take now to be ready for the next one.
10:40 amHave Your Cake and Eat It Too: Making WFH Work for Your Team and YouVP, Information Security, Guaranteed RateRegistration Level:- Conference Pass
10:40 am - 11:25 amLocation / Room: Room 2610:40 amSeize the Breach: Why Breaches Still Occur and How to Mitigate ThemSales CTO & Principal Systems Engineer, ExabeamRegistration Level:- Open Sessions
10:40 am - 11:25 amLocation / Room: Room 27Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion on:
- Why SOC and security teams are way too limited by legacy SIEM
- How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.
- A simple maturity model based on outcomes and use cases that can vastly improved Security Operations
10:40 amDatabase Security: Protecting the Core of Your Digital TransformationCTO & Co-Founder, CyralRegistration Level:- Open Sessions
10:40 am - 11:25 amLocation / Room: Room 29Key Takeaways:
- Strategies your teams can use to reduce risk to your organization’s most sensitive data
- How to gain consistent security across all data repositories, including on-prem and in the cloud
Data is the most critical asset of every business and securing data is the primary objective of cloud and application security initiatives. However, the production database security controls are ineffective or non-existent, which means any gap in an enterprise’s security posture or a compromised device, user, network, API, or application results in unfettered access to sensitive data.
As enterprises embark on their digital transformation and cloud migration initiatives, data security risks are growing exponentially due to the rapid increase of:
- The amount of sensitive data collected
- The number of databases, data lakes, and repositories that house sensitive data
- The amount of people and machines that access this sensitive data
In this session, we’ll address how organizations can prevent data breaches and safely democratize data access as they expand their data footprint in the cloud—including how to apply database security best practices at scale, like single sign-on (SSO), multi-factor authentication (MFA), ephemeral access, and privilege access.
11:30 am[Lunch Keynote] Zero Trust for ApplicationsCyber Hero, ThreatLockerRegistration Level:- Open Sessions
11:30 am - 12:30 pmLocation / Room: Keynote TheaterThe Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.
12:30 pmNetworking BreakRegistration Level:- Open Sessions
12:30 pm - 1:00 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmInformation Security Program and Team CreationCyber Security Engineer, Feeding AmericaRegistration Level:- Conference Pass
1:00 pm - 1:50 pmLocation / Room: Room 291:00 pm[Panel] The Current Threat LandscapeSolutions Architect, Digital ShadowsSolutions Director, DeepwatchSecurity Principal, InsightPrincipal Security Engineer, Salt SecurityChief Security Officer & Technology Lead, Trexin GroupRegistration Level:- Open Sessions
1:00 pm - 1:50 pmLocation / Room: Room 25If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
1:00 pm[Panel] Incident Response!Information Security Manager, CobaltSr. Director, Product Marketing, Open SystemsVP, Business Development, MSSP & GSI, ArmisPrincipal Sales Engineer, ImpervaCo-Founder & Managing Partner, XPAN Law PartnersRegistration Level:- Open Sessions
1:00 pm - 1:50 pmLocation / Room: Keynote TheaterSecurity teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.
2:00 pmUnderstand, Manage, and Measure Cyber RiskCybersecurity AuthorRegistration Level:- Conference Pass
2:00 pm - 2:45 pmLocation / Room: Room 29Key take-away: A practical method to connect businesses priorities with cybersecurity priorities.
Are you able to articulate your actual cybersecurity risk in one or two sentences? Is each executive or manager in your organization able provide a sufficient answer when asked this same question? Does each person in your organization have a sense of what cybersecurity means and what their role is? If not, you’re not alone.
This discussion helps address these common problems and focuses on a clear easy-to-understand and easy-to-deploy foundational approach applicable to the whole organization. We will discuss typically overlooked tools and methods in a straight-forward practical manner to guide your cybersecurity program. This discussion is aimed at practitioners to help pull cyber from a “technical” problem to a “business risk management” problem, equipping you with simple approach to understand, manage, and measure cyber risk for your enterprise.
2:00 pmDeveloping Cybersecurity Programs with Framework & Architecture ConsiderationsManaging Principal - Security Services, InsightRegistration Level:- Open Sessions
2:00 pm - 2:45 pmLocation / Room: Room 27Insight’s Darren Carroll offers critical perspective on today’s most important cybersecurity concerns. He explains how organizations can begin to build a measurable, monitorable, repeatable approach to a preventive security posture with respect to both framework and architecture. Learn how an all-in approach to enterprise risk management can prevent your organization from being caught off guard—and mitigate the risks, costs, and chaos of pivoting cybersecurity on the fly.
2:00 pmAgent vs. Agentless Security: Which Is the Better Choice in 2022?(ISC)2 Chicago Chapter Meeting — Open to all attendeesExecutive Board Member, Chicago Chapter, (ISC)2Global Practice Leader, Prisma Cloud, Palo Alto NetworksRegistration Level:- Open Sessions
2:00 pm - 2:45 pmLocation / Room: Room 26As the diversity of platforms for storing, accessing, and processing data continues to increase, agentless strategies for securing data are in vogue. But does this mean you’ll be hitting the “uninstall” button any time soon? Join Dr. Nate Brady from the (ISC)2 Chapter Board and Ben Nicholson of Palo Alto Networks for an Agent vs. Agentless shootout followed by what is sure to be a lively group discussion.
Following the presentation, we’ll discuss the current state of the chapter, open leadership positions, and collecting feedback and ideas on how best to meet our members’ needs in post-pandemic Chicagoland.
2:45 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
2:45 pm - 3:15 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:15 pm[Closing Keynote] Suing the CISO and BeyondWhat's Next? And How Worried Should C-Suite Executives Be?Co-Founder & Managing Partner, XPAN Law PartnersChief Security Officer & Technology Lead, Trexin GroupRegistration Level:- Open Sessions
3:15 pm - 4:00 pmLocation / Room: Keynote TheaterStarting at the end of 2020, the information security sector saw what could fairly be characterized as a seismic shift in the world of data privacy and cybersecurity as a result of the SolarWinds hacking incident. While cybersecurity and data privacy professionals hoped this would signal a change in the way organizations view that part of their business operations, it appears something different happened instead. A lawsuit arguably had been brewing for years in the industry, waiting for the right circumstances, and was finally filed against the C-Suite of SolarWinds, notably the Chief Information Security Officer (CISO). The complaint specifically, and maybe predictably, alleged in very direct language that the C-Suite intended to deceive investors into believing that SolarWinds was impenetrable against cyberattacks. The reality, we now know, is somewhat different but could nonetheless dramatically alter the way companies, and their appointed officers, view and react to assigned liability. So, there are several immediate and overarching questions currently idling, perhaps loudly, at the starting gate. Is it fair? Is this the future of cybersecurity litigation? How unpredictable will this terrain now be for information security leaders? Or better yet, for how long?
This keynote will unpack the ramifications the SolarWinds lawsuit—along with other litigation involving the C-Suite—will have on the entire information security community, who will see long-reaching consequences to already-established practices and possibly unsettling legal fallout. We will discuss the diverse internal CISO versus outside attorney perspectives, contrasting what is fact versus fiction and hype. Lastly, we will also discuss how both organizations and industry leaders can prepare themselves to mitigate risks not related to a cyberattack while being diligent in addressing potential new liabilities wrapped with increased litigation worries in the legal sphere.
- Abnormal SecurityBooth: 420
Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.
- Armis, IncBooth: 520
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
- CentripetalBooth: 130
Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.
- Checkmarx Inc.Booth: 330
Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.
- CobaltBooth: 430
Cobalt’s Pentest as a Service (PtaaS) platform is modernizing traditional pentesting. By combining a SaaS platform with an exclusive community of testers, we deliver the real-time insights you need to remediate risk quickly and innovate securely.
- Cybercrime Support NetworkBooth: N/A
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- CybereasonBooth: 360
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- CyberhavenBooth: 240
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- CynetBooth: 110
Cynet 360 is the world’s first autonomous breach protection platform. Cynet eliminates the need of complex multi-product stacks, making robust breach protection within reach for any organization.
- CyralBooth: 410
Cyral delivers enterprise data security and governance across all data services such as S3, Snowflake, Kafka, MongoDB, Oracle and more.
The cloud-native service is built on a stateless interception technology that monitors all data endpoint activity in real-time and enables unified visibility, identity federation and granular access controls.
Cyral automates workflows and enables collaboration between DevOps and Security teams to operationalize assurance and prevent data leakage.
- deepwatchBooth: 470
deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry. Designed to be different, deepwatch provides customers with world-class managed security services and unrivaled value by extending their cybersecurity teams, curating leading technologies into deepwatch’s cloud SecOps platform, and proactively driving their SecOps maturity.
- Digital ShadowsBooth: 270
Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation.
- ExabeamBooth: 260
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- ImpervaBooth: 250
Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.
- InfraGard ChicagoBooth: 230
All InfraGard participants are committed to the proposition that a robust exchange of information about threats to and actual attacks on these critical infrastructures is an important element for successful infrastructure protection efforts. This chapter is governed by our local bylaws.
The goal of InfraGard is to enable the flow of information so that the owners and operators of infrastructure assets can better protect themselves and so that the United States government can better discharge its law enforcement and national security responsibilities.
- InsightBooth: 440
Insight is a comprehensive solutions integrator that helps organizations transform technology, operations, and service delivery to meet challenges and future-proof the business. With a client-focused approach to delivery, we recommend the most appropriate solutions to drive digital transformation and modernization for innovation. As clients look for ways to optimize data for better business, empower speed and scale of service, and drive next-gen security, Insight delivers expertise that is grounded, unbiased, and refreshingly straightforward.
- ISACA Chicago ChapterBooth: 100
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.
Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)
Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.
- ISC2 Chicago ChapterBooth: 540
The mission of the Chicago Chapter is to advance the local Chicagoland information security community by providing its members with opportunities to increase knowledge, grow professional networks, share information and advance the profession as a whole by promoting certification, ethical behavior, and social responsibility.
Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification. Our chapter program is focused on sharing knowledge and exchanging ideas among security professionals in the local area. Ultimately, we want to advance the field of information security by educating practitioners and the public at large on how to protect and defend against security threats.
- OktaBooth: 310
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- Open SystemsBooth: 200
The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. We are deeply passionate about protecting organizations from that storm.
We provide a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection. And Mission Control, our integrated NOC and SOC, is staffed by experts, not only in threat hunting and cyber hygiene, but also in the proper configuration and maintenance of the Microsoft security stack. So we can leverage what you already own.
The combination is changing the lives of our customers, giving them security traditionally reserved for only the largest organizations. We give them “shelter from the storm”. That is our passion.
- Recorded FutureBooth: 220
Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.
- Red CanaryBooth: 530
Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.
- RiskReconBooth: 210
RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
enabling organizations to efficiently operate scalable, third-party risk management programs for
dramatically better risk outcomes. Request a demo to learn more about our solution. - Salt SecurityBooth: 350
Salt Security delivers an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that you develop and own and are at the core of connecting your applications and data.
Salt Security was founded in 2016 by alumni of the Israeli Defense Forces (IDF) to deliver the first, patented API Protection platform to secure APIs. Salt Security deploys in minutes, automatically learns your unique APIs, and requires no configuration or customization to help you protect and improve your API security.
- Cyber Fraud Task Force – U.S. Secret ServiceBooth: 140
Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- SynopsysBooth: 460
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
- TechTargetBooth: N/A
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- TessianBooth: 450
Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like March Capital, Sequoia, Accel, and Balderton and has offices in San Francisco, Boston and London.
- ThreatLockerBooth: 380
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WizBooth: 300
We’re on a mission to help organizations effectively reduce risks in their Cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights that don’t waste time.
Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.
- Women in CyberSecurity (WiCyS)Booth: 500
Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.
- Derek J. MayerAssistant Special Agent in Charge, Chicago Field Office, U.S. Secret Service
Assistant Special Agent in Charge
- Chad RienerthSpecial Agent, Chicago Field Office, U.S. Secret Service
SA Rienerth serves on the Cyber Fraud Task Force (CFTF).
- Tamika BassCybersecurity Director, Gannett Fleming
Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.
- Bryant SchuckSr. Product Manager, Checkmarx
Bryant Schuck is a Senior Product Manager for Checkmarx, where he is responsible for both the API Security and IAST products. Bryant has several years of experience in product management, software engineering, and agile ranging from being a co-founder of a startup to running teams for Fortune 500 companies. In his free time, Bryant enjoys tinkering with hardware and new technologies by building prototypes, with a special interest in Voice User Interfaces. He also enjoys home remodeling and woodworking. Bryant graduated from The Ohio State University with a BS in Computer Science and Engineering, specializing in security.
- Katherine Mowen-MatzVP, Information Security, Guaranteed Rate
- Bob RenySales CTO & Principal Systems Engineer, Exabeam
Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network access control and end point security architecture. Large program security include zero trust, Operational Architecture safety/security. His expertise has supported customer organizations public and private. This covers scaling for many large federal agencies, global 1000 companies in many business verticals across finance, utilities, service, and technology. Bob has been a CISSP for the past almost 22 years and continues to help organizations evaluate the broad security policy to streamline Security Operations Center activities. This includes improving cross-functional processes for change management, incident response, event escalation, and response.
- Dr. Srini VadlamaniCTO & Co-Founder, Cyral
Dr. Srinivas Vadlamani is a hands-on expert in designing databases, big data management systems, and security solutions. He is the cofounder and CTO of Cyral, a venture-backed data security startup. He was most recently the founder and chief architect at Imanis Data, a big data protection pioneer that was acquired by Cohesity. He was previously the architect at Couchbase, where he worked on their NoSQL query engine, and before that was the database architect at Aster Data, a Sequoia backed big data startup that was acquired by Teradata. His research spanning database, infrastructure, and security has been published in several peer reviewed conferences and spawned multiple patents.
- Chad MaskillCyber Hero, ThreatLocker
Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infinity Ward, as well as numerous municipalities throughout the U.S. and countless SMBs. Previously, he worked with local government in designing and sourcing emergency apparatus and can still parallel park a Ladder Truck.
- Nathan ZimmermanCyber Security Engineer, Feeding America
- Matthew Alec AlvaradoSolutions Architect, Digital Shadows
Alec Alvarado has a unique blend of both private and public sector cyber threat intelligence (CTI) experience with 10 years serving in multiple all-source intelligence positions with the United States Army Reserve and 5 years in varying CTI positions with Digital Shadows. A career sparked by a discovered passion for intelligence analysis and understanding complex problems, Alec has been tracking critical aspects of the cyber threat landscape and has helped in the development of threat intelligence capabilities with growing CTI teams across all sectors.
- Dan JaniczekSolutions Director, Deepwatch
Dan Janiczek is a seasoned Solutions Architect who takes a unique approach to engaging with customers on complex security problems. Coming from a background in Psychology he brings a fresh perspective to the unique challenges faced by organizations today, understanding the people and technology components of a successful security program. As a Solutions Director for Central Region at Deepwatch, Dan focuses on understanding organizational risk and aligning security operations to understand and reduce risk to provide secure business enablement practices.
- Bob SkinnerSecurity Principal, Insight
Bob Skinner has worked for over 30 years in Information Technology and Security in highly complex and regulated industries such Financial Services & Banking, Defense, Telecommunications, and Airline Transportation. His technical experience includes Systems Administration, Database Design, Application Development, and IT Auditing. As a consultant, Mr. Skinner has assisted clients in retail with obtaining compliance with the Payment Card Industry Data Security Standard (PCI); these clients include device retailers, airline transportation, grocers, e-commerce, and business process outsourcers. Mr. Skinner has managed numerous projects, as well as other consultants.
Bob Skinner has a Bachelor of Science in Business Administration, with a concentration in Finance, from the University of Florida, and a Master of Science in Computer Information Systems from Georgia State University. He has held board positions with the Information Services Security Administration (ISSA), in both Atlanta and Dallas. - Sean BoulterPrincipal Security Engineer, Salt Security
Sean Boulter is a technical leader with Salt Security where he helps his customers protect their APIs from abuse and keep their customers’ data secure. His career in IT and consulting spans three decades and covers a wide variety of infrastructure platforms and several industries including fintech, finserv, insurance, healthcare, medtech, and retail. He lives in the Minneapolis area with his wife, and shares a passion for bicycling and wilderness expeditions with his two grown children.
- Glenn Kapetansky, ModeratorChief Security Officer & Technology Lead, Trexin Group
Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Glenn's current focus areas—as Senior Principal and Chief Security Officer at Trexin Group—are agile management, data protection, and audit/regulatory compliance.
Glenn speaks and publishes on occasion. He has been named numerous times in various Who's Who, and is a repeat recipient of Bell Labs' Arno Penzias Award for Innovation in the Marketplace. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Glenn's certifications and memberships include IEEE, ISC2 (CISSP), ISACA (CISA), and ITIL (SM).
- Mark ScranoInformation Security Manager, Cobalt
Mark Scrano is an information security manager at Cobalt, the leading pentest as a service company, where he focuses on maintaining network security, threat management and mitigation, vulnerability assessments, amongst other responsibilities. With over 15 years of experience he’s worked at notable companies including Vimeo, Paxos, and General Assembly. Previous to joining the world of infosec, Mark was a computer networking engineer.
- Alex BergerSr. Director, Product Marketing, Open Systems
With nearly a decade of experience in the cybersecurity industry, Alex Berger joined Open Systems to lead Product Marketing in 2021. Throughout his career, he has worked on a wide range of solutions spanning identity and access management, network security, cloud workload protection, data access governance and more. In his spare time, he enjoys spending time with his wife and dog, running and hiking in the hills of California, and supporting his favorite sports teams.
- Paul HammonsPrincipal Sales Engineer, Imperva
Paul has been working at Imperva for 10 years and he has seen it all. He started in IT Security roles in the mid-90s helping customers visualize, protect, and secure their environments. Having previously worked at companies like e-Security, Novell, Varonis, and various other startups, Paul has personally implemented security solutions on five continents, in corporate environments, in secret government environments, and secure military installations. This has given Paul a deep insight into practical security practices and how they are implemented.
- Rebecca Rakoski, ModeratorCo-Founder & Managing Partner, XPAN Law Partners
Rebecca L. Rakoski, Esq., is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to aggressively mitigate her client's litigation risks. As an experienced litigator, she has handled hundreds of matters in state and federal courts. Rebecca advises her clients on a proactive, multi-jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She works with clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.
As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section, and also served on the Complex Business Litigation Committee that drafted and revised the Court Rules involving electronic discovery in complex litigation matters. She has been appointed in several litigation matters by the New Jersey Superior Court as a Discovery Special Master.
Rebecca is on the Board of Governors for Temple University Health Systems, and is an adjunct professor at Drexel University’s Thomas R. Kline School of Law and Rowan University.
- Ryan LeirvikCybersecurity Author
CEO of Neuvik and author of the book “Understand, Manage, and Measure Cyber Risk”. Past adventures include growing a cyber research and development company, serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, and sparking a fondness for technology problem-solving at IBM.
- Darren CarrollManaging Principal - Security Services, Insight
Darren is a risk management and information security leader with diverse global experience in operational, technical, management, and presales roles. He has had the pleasure to build and lead multiple diverse, dynamic, high-performing teams. Throughout his career, he has provided consultative thought leadership, strategic direction, and tactical response to multiple federal, state, and local agencies, many of the Fortune 100, and hundreds of mid-sized enterprises.
- Dr. Nate BradyExecutive Board Member, Chicago Chapter, (ISC)2
- Ben NicholsonGlobal Practice Leader, Prisma Cloud, Palo Alto Networks
- Rebecca RakoskiCo-Founder & Managing Partner, XPAN Law Partners
Rebecca L. Rakoski is the managing partner at XPAN Law Partners, LLC. Rebecca advises her clients on a proactive, multi jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She uses her extensive experience to work with her clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.
Rebecca counsels and aggressively defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. As an experienced litigator, Rebecca has handled hundreds of matters in state and federal courts. Rebecca skillfully manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to minimize her client's litigation risks.
Rebecca regularly negotiates complex contractual provisions that are impacted by domestic and international data privacy regulations including the California Consumer Privacy Act of 2018, and the European Union's General Data Protection Regulation. She understands how the nature of the data can affect the role her client plays in the data transaction and uses that knowledge to mitigate corporate liability.
As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section.Rebecca has been appointed and served in multiple highly complex litigation matters by the New Jersey Superior Court as a Special Master in the areas of technology and eDiscovery. She also served on the Complex Business Litigation Committee that drafted and revised the New Jersey Court Rules involving electronic discovery. Rebecca was on the eDiscovery committee of her prior law firm and created its eDiscovery subgroup.
Rebecca is on the Board of Governors for Temple University Health Systems and is also the Acting Dean of Online Learning and an adjunct professor at Drexel University’s Thomas R. Kline School of Law.
- Glenn KapetanskyChief Security Officer & Technology Lead, Trexin Group
Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Glenn's current focus areas—as Senior Principal and Chief Security Officer at Trexin Group—are agile management, data protection, and audit/regulatory compliance.
Glenn speaks and publishes on occasion. He has been named numerous times in various Who's Who, and is a repeat recipient of Bell Labs' Arno Penzias Award for Innovation in the Marketplace. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Glenn's certifications and memberships include IEEE, ISC2 (CISSP), ISACA (CISA), and ITIL (SM).
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes