googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, June 15, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:00 pm
    Location / Room: Registration Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:20 am
    Location / Room: Room 30

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:00 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:30 am
    [Opening Fireside Chat] The Investigative Powers of the U.S. Secret Service
    • session level icon
    speaker photo
    Assistant Special Agent in Charge, Chicago Field Office, U.S. Secret Service
    speaker photo
    Special Agent, Chicago Field Office, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Keynote Theater
    9:15 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:15 am - 9:45 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:45 am
    I See What You Say! Effectively Communicating with Non-Technical Staff
    • session level icon
    speaker photo
    Cybersecurity Director, Gannett Fleming
    Registration Level:
    • session level iconConference Pass
    9:45 am - 10:30 am
    Location / Room: Room 29

    Do you feel the gap between communicating with IT and your fellow colleagues keeps growing? How do you explain in digestible language the technical problems and solutions you and your InfoSec team are facing? Communicating is a highly effective tool that at times can get lost in literal tech translation, come join my session to learn how to connect with your non-technical peers in a way that doesn’t leave both parties more confused. We will discuss in a group setting tactics that have worked and I’ll share with you tips I’ve learned along the way!

    9:45 am
    Déjà Vu All Over Again: The Student Body Left Problem
    • session level icon
    speaker photo
    Sr. Product Manager, Checkmarx
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:30 am
    Location / Room: Room 27

    Recent Common Vulnerabilities and Exposures (CVE) announcements like Apache Log4j have upended software teams all over the world. Scheduled work comes to a grinding halt, and triage and emergency surgery must be performed on applications. If not prepared, this unplanned work can derail productivity for weeks or even months. The longer it takes, the more pressure is applied by management. You can reduce the impact.

    Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps.

    A potential scenario: the security team has called an emergency meeting. A new vulnerability has been publicly disclosed that impacts not only your software, but your company and your customers. Will the required remediation take hours or even weeks to complete? It depends on your preparedness.

    To improve your readiness and reduce impact, we will look at tips and actions you can take now.

    1. Learn more about the scope of the mess that was created by the Log4j CVE.
    2. Why most companies struggled to address it quickly.
    3. What steps you can take now to be ready for the next one.
    10:40 am
    Have Your Cake and Eat It Too: Making WFH Work for Your Team and You
    • session level icon
    speaker photo
    VP, Information Security, Guaranteed Rate
    Registration Level:
    • session level iconConference Pass
    10:40 am - 11:25 am
    Location / Room: Room 26
    10:40 am
    Seize the Breach: Why Breaches Still Occur and How to Mitigate Them
    • session level icon
    speaker photo
    Sales CTO & Principal Systems Engineer, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    10:40 am - 11:25 am
    Location / Room: Room 27

    Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion on:

    • Why SOC and security teams are way too limited by legacy SIEM
    • How machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response (TDIR) capabilities so security teams can respond more quickly and accurately to seize the breach and mitigate damage.
    • A simple maturity model based on outcomes and use cases that can vastly improved Security Operations
    10:40 am
    Database Security: Protecting the Core of Your Digital Transformation
    • session level icon
    speaker photo
    CTO & Co-Founder, Cyral
    Registration Level:
    • session level iconOpen Sessions
    10:40 am - 11:25 am
    Location / Room: Room 29

    Key Takeaways:

    • Strategies your teams can use to reduce risk to your organization’s most sensitive data
    • How to gain consistent security across all data repositories, including on-prem and in the cloud

    Data is the most critical asset of every business and securing data is the primary objective of cloud and application security initiatives. However, the production database security controls are ineffective or non-existent, which means any gap in an enterprise’s security posture or a compromised device, user, network, API, or application results in unfettered access to sensitive data.

    As enterprises embark on their digital transformation and cloud migration initiatives, data security risks are growing exponentially due to the rapid increase of:

    • The amount of sensitive data collected
    • The number of databases, data lakes, and repositories that house sensitive data
    • The amount of people and machines that access this sensitive data

    In this session, we’ll address how organizations can prevent data breaches and safely democratize data access as they expand their data footprint in the cloud—including how to apply database security best practices at scale, like single sign-on (SSO), multi-factor authentication (MFA), ephemeral access, and privilege access.

    11:30 am
    [Lunch Keynote] Zero Trust for Applications
    • session level icon
    speaker photo
    Cyber Hero, ThreatLocker
    Registration Level:
    • session level iconOpen Sessions
    11:30 am - 12:30 pm
    Location / Room: Keynote Theater

    The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.

    12:30 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:30 pm - 1:00 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Information Security Program and Team Creation
    • session level icon
    speaker photo
    Cyber Security Engineer, Feeding America
    Registration Level:
    • session level iconConference Pass
    1:00 pm - 1:50 pm
    Location / Room: Room 29
    1:00 pm
    [Panel] The Current Threat Landscape
    • session level icon
    speaker photo
    Solutions Architect, Digital Shadows
    speaker photo
    Solutions Director, Deepwatch
    speaker photo
    Security Principal, Insight
    speaker photo
    Principal Security Engineer, Salt Security
    speaker photo
    Chief Security Officer & Technology Lead, Trexin Group
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:50 pm
    Location / Room: Room 25

    If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?

    It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.

    1:00 pm
    [Panel] Incident Response!
    • session level icon
    speaker photo
    Information Security Manager, Cobalt
    speaker photo
    Sr. Director, Product Marketing, Open Systems
    speaker photo
    VP, Business Development, MSSP & GSI, Armis
    speaker photo
    Principal Sales Engineer, Imperva
    speaker photo
    Co-Founder & Managing Partner, XPAN Law Partners
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:50 pm
    Location / Room: Keynote Theater

    Security teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.

    2:00 pm
    Understand, Manage, and Measure Cyber Risk
    • session level icon
    speaker photo
    Cybersecurity Author
    Registration Level:
    • session level iconConference Pass
    2:00 pm - 2:45 pm
    Location / Room: Room 29

    Key take-away: A practical method to connect businesses priorities with cybersecurity priorities.

    Are you able to articulate your actual cybersecurity risk in one or two sentences? Is each executive or manager in your organization able provide a sufficient answer when asked this same question? Does each person in your organization have a sense of what cybersecurity means and what their role is? If not, you’re not alone.

    This discussion helps address these common problems and focuses on a clear easy-to-understand and easy-to-deploy foundational approach applicable to the whole organization. We will discuss typically overlooked tools and methods in a straight-forward practical manner to guide your cybersecurity program. This discussion is aimed at practitioners to help pull cyber from a “technical” problem to a “business risk management” problem, equipping you with simple approach to understand, manage, and measure cyber risk for your enterprise.

    2:00 pm
    Developing Cybersecurity Programs with Framework & Architecture Considerations
    • session level icon
    speaker photo
    Managing Principal - Security Services, Insight
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Location / Room: Room 27

    Insight’s Darren Carroll offers critical perspective on today’s most important cybersecurity concerns. He explains how organizations can begin to build a measurable, monitorable, repeatable approach to a preventive security posture with respect to both framework and architecture. Learn how an all-in approach to enterprise risk management can prevent your organization from being caught off guard—and mitigate the risks, costs, and chaos of pivoting cybersecurity on the fly.

    2:00 pm
    Agent vs. Agentless Security: Which Is the Better Choice in 2022?
    • session level icon
    (ISC)2 Chicago Chapter Meeting — Open to all attendees
    speaker photo
    Executive Board Member, Chicago Chapter, (ISC)2
    speaker photo
    Global Practice Leader, Prisma Cloud, Palo Alto Networks
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Location / Room: Room 26

    As the diversity of platforms for storing, accessing, and processing data continues to increase, agentless strategies for securing data are in vogue.  But does this mean you’ll be hitting the “uninstall” button any time soon?  Join Dr. Nate Brady from the (ISC)2 Chapter Board and Ben Nicholson of Palo Alto Networks for an Agent vs. Agentless shootout followed by what is sure to be a lively group discussion.

    Following the presentation, we’ll discuss the current state of the chapter, open leadership positions, and collecting feedback and ideas on how best to meet our members’ needs in post-pandemic Chicagoland.

    2:45 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    [Closing Keynote] Suing the CISO and Beyond
    • session level icon
    What's Next? And How Worried Should C-Suite Executives Be?
    speaker photo
    Co-Founder & Managing Partner, XPAN Law Partners
    speaker photo
    Chief Security Officer & Technology Lead, Trexin Group
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    Starting at the end of 2020, the information security sector saw what could fairly be characterized as a seismic shift in the world of data privacy and cybersecurity as a result of the SolarWinds hacking incident. While cybersecurity and data privacy professionals hoped this would signal a change in the way organizations view that part of their business operations, it appears something different happened instead. A lawsuit arguably had been brewing for years in the industry, waiting for the right circumstances, and was finally filed against the C-Suite of SolarWinds, notably the Chief Information Security Officer (CISO). The complaint specifically, and maybe predictably, alleged in very direct language that the C-Suite intended to deceive investors into believing that SolarWinds was impenetrable against cyberattacks. The reality, we now know, is somewhat different but could nonetheless dramatically alter the way companies, and their appointed officers, view and react to assigned liability. So, there are several immediate and overarching questions currently idling, perhaps loudly, at the starting gate. Is it fair? Is this the future of cybersecurity litigation? How unpredictable will this terrain now be for information security leaders? Or better yet, for how long?

    This keynote will unpack the ramifications the SolarWinds lawsuit—along with other litigation involving the C-Suite—will have on the entire information security community, who will see long-reaching consequences to already-established practices and possibly unsettling legal fallout. We will discuss the diverse internal CISO versus outside attorney perspectives, contrasting what is fact versus fiction and hype. Lastly, we will also discuss how both organizations and industry leaders can prepare themselves to mitigate risks not related to a cyberattack while being diligent in addressing potential new liabilities wrapped with increased litigation worries in the legal sphere.

Exhibitors
  • Abnormal Security
    Booth: 420

    Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
    Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.

    Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.

  • Armis, Inc
    Booth: 520

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Centripetal
    Booth: 130

    Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.

  • Checkmarx Inc.
    Booth: 330

    Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.

  • Cobalt
    Booth: 430

    Cobalt’s Pentest as a Service (PtaaS) platform is modernizing traditional pentesting. By combining a SaaS platform with an exclusive community of testers, we deliver the real-time insights you need to remediate risk quickly and innovate securely.

  • Cybercrime Support Network
    Booth: N/A

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • Cybereason
    Booth: 360

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • Cyberhaven
    Booth: 240

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Cynet
    Booth: 110

    Cynet 360 is the world’s first autonomous breach protection platform. Cynet eliminates the need of complex multi-product stacks, making robust breach protection within reach for any organization.

  • Cyral
    Booth: 410

    Cyral delivers enterprise data security and governance across all data services such as S3, Snowflake, Kafka, MongoDB, Oracle and more.

    The cloud-native service is built on a stateless interception technology that monitors all data endpoint activity in real-time and enables unified visibility, identity federation and granular access controls.

    Cyral automates workflows and enables collaboration between DevOps and Security teams to operationalize assurance and prevent data leakage.

  • deepwatch
    Booth: 470

    deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry. Designed to be different, deepwatch provides customers with world-class managed security services and unrivaled value by extending their cybersecurity teams, curating leading technologies into deepwatch’s cloud SecOps platform, and proactively driving their SecOps maturity.

  • Digital Shadows
    Booth: 270

    Digital Shadows monitors and manages an organization’s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation.

  • Exabeam
    Booth: 260

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Imperva
    Booth: 250

    Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.

  • InfraGard Chicago
    Booth: 230

    All InfraGard participants are committed to the proposition that a robust exchange of information about threats to and actual attacks on these critical infrastructures is an important element for successful infrastructure protection efforts. This chapter is governed by our local bylaws.

    The goal of InfraGard is to enable the flow of information so that the owners and operators of infrastructure assets can better protect themselves and so that the United States government can better discharge its law enforcement and national security responsibilities.

  • Insight
    Booth: 440

    Insight is a comprehensive solutions integrator that helps organizations transform technology, operations, and service delivery to meet challenges and future-proof the business. With a client-focused approach to delivery, we recommend the most appropriate solutions to drive digital transformation and modernization for innovation. As clients look for ways to optimize data for better business, empower speed and scale of service, and drive next-gen security, Insight delivers expertise that is grounded, unbiased, and refreshingly straightforward.

  • ISACA Chicago Chapter
    Booth: 100

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.

    Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)

    Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.

  • ISC2 Chicago Chapter
    Booth: 540

    The mission of the Chicago Chapter is to advance the local Chicagoland information security community by providing its members with opportunities to increase knowledge, grow professional networks, share information and advance the profession as a whole by promoting certification, ethical behavior, and social responsibility.

    Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification. Our chapter program is focused on sharing knowledge and exchanging ideas among security professionals in the local area.  Ultimately, we want to advance the field of information security by educating practitioners and the public at large on how to protect and defend against security threats.

  • Okta
    Booth: 310

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Open Systems
    Booth: 200

    The escalated threat level, the cyber talent shortage, and the sheer complexity of deploying and managing a multitude of security solutions, are the perfect storm for security and IT teams. We are deeply passionate about protecting organizations from that storm.

    We provide a set of AI-based, cloud-delivered security solutions that are simple to deploy and manage, and provide the highest level of protection. And Mission Control, our integrated NOC and SOC, is staffed by experts, not only in threat hunting and cyber hygiene, but also in the proper configuration and maintenance of the Microsoft security stack. So we can leverage what you already own.

    The combination is changing the lives of our customers, giving them security traditionally reserved for only the largest organizations. We give them “shelter from the storm”. That is our passion.

  • Recorded Future
    Booth: 220

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • Red Canary
    Booth: 530

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • RiskRecon
    Booth: 210

    RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
    easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
    solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
    enabling organizations to efficiently operate scalable, third-party risk management programs for
    dramatically better risk outcomes. Request a demo to learn more about our solution.

  • Salt Security
    Booth: 350

    Salt Security delivers an API Threat Protection solution focused on securing the ubiquitous APIs connecting everything from web and mobile applications to microservices and IoT devices. These are the APIs that you develop and own and are at the core of connecting your applications and data.

    Salt Security was founded in 2016 by alumni of the Israeli Defense Forces (IDF) to deliver the first, patented API Protection platform to secure APIs. Salt Security deploys in minutes, automatically learns your unique APIs, and requires no configuration or customization to help you protect and improve your API security.

  • Cyber Fraud Task Force – U.S. Secret Service
    Booth: 140

    Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • Synopsys
    Booth: 460

    Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.

  • TechTarget
    Booth: N/A

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tessian
    Booth: 450

    Tessian’s mission is to secure the human layer. Using machine learning technology, Tessian automatically stops data breaches and security threats caused by human error – like data exfiltration, accidental data loss, business email compromise and phishing attacks – with minimal disruption to employees’ workflow. As a result, employees are empowered to do their best work, without security getting in their way. Founded in 2013, Tessian is backed by renowned investors like March Capital, Sequoia, Accel, and Balderton and has offices in San Francisco, Boston and London.

  • ThreatLocker
    Booth: 380

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Wiz
    Booth: 300

    We’re on a mission to help organizations effectively reduce risks in their Cloud environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights  that don’t waste time.

    Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and DevOps teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches. For more information, visit www.wiz.io.

  • Women in CyberSecurity (WiCyS)
    Booth: 500

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Derek J. Mayer
    Assistant Special Agent in Charge, Chicago Field Office, U.S. Secret Service

    Assistant Special Agent in Charge

  • speaker photo
    Chad Rienerth
    Special Agent, Chicago Field Office, U.S. Secret Service

    SA Rienerth serves on the Cyber Fraud Task Force (CFTF).

  • speaker photo
    Tamika Bass
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Bryant Schuck
    Sr. Product Manager, Checkmarx

    Bryant Schuck is a Senior Product Manager for Checkmarx, where he is responsible for both the API Security and IAST products. Bryant has several years of experience in product management, software engineering, and agile ranging from being a co-founder of a startup to running teams for Fortune 500 companies. In his free time, Bryant enjoys tinkering with hardware and new technologies by building prototypes, with a special interest in Voice User Interfaces. He also enjoys home remodeling and woodworking. Bryant graduated from The Ohio State University with a BS in Computer Science and Engineering, specializing in security.

  • speaker photo
    Katherine Mowen-Matz
    VP, Information Security, Guaranteed Rate
  • speaker photo
    Bob Reny
    Sales CTO & Principal Systems Engineer, Exabeam

    Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network access control and end point security architecture. Large program security include zero trust, Operational Architecture safety/security. His expertise has supported customer organizations public and private. This covers scaling for many large federal agencies, global 1000 companies in many business verticals across finance, utilities, service, and technology. Bob has been a CISSP for the past almost 22 years and continues to help organizations evaluate the broad security policy to streamline Security Operations Center activities. This includes improving cross-functional processes for change management, incident response, event escalation, and response.

  • speaker photo
    Dr. Srini Vadlamani
    CTO & Co-Founder, Cyral

    Dr. Srinivas Vadlamani is a hands-on expert in designing databases, big data management systems, and security solutions. He is the cofounder and CTO of Cyral, a venture-backed data security startup. He was most recently the founder and chief architect at Imanis Data, a big data protection pioneer that was acquired by Cohesity. He was previously the architect at Couchbase, where he worked on their NoSQL query engine, and before that was the database architect at Aster Data, a Sequoia backed big data startup that was acquired by Teradata. His research spanning database, infrastructure, and security has been published in several peer reviewed conferences and spawned multiple patents.

  • speaker photo
    Chad Maskill
    Cyber Hero, ThreatLocker

    Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infinity Ward, as well as numerous municipalities throughout the U.S. and countless SMBs. Previously, he worked with local government in designing and sourcing emergency apparatus and can still parallel park a Ladder Truck.

  • speaker photo
    Nathan Zimmerman
    Cyber Security Engineer, Feeding America
  • speaker photo
    Matthew Alec Alvarado
    Solutions Architect, Digital Shadows

    Alec Alvarado has a unique blend of both private and public sector cyber threat intelligence (CTI) experience with 10 years serving in multiple all-source intelligence positions with the United States Army Reserve and 5 years in varying CTI positions with Digital Shadows. A career sparked by a discovered passion for intelligence analysis and understanding complex problems, Alec has been tracking critical aspects of the cyber threat landscape and has helped in the development of threat intelligence capabilities with growing CTI teams across all sectors.

  • speaker photo
    Dan Janiczek
    Solutions Director, Deepwatch

    Dan Janiczek is a seasoned Solutions Architect who takes a unique approach to engaging with customers on complex security problems. Coming from a background in Psychology he brings a fresh perspective to the unique challenges faced by organizations today, understanding the people and technology components of a successful security program. As a Solutions Director for Central Region at Deepwatch, Dan focuses on understanding organizational risk and aligning security operations to understand and reduce risk to provide secure business enablement practices.

  • speaker photo
    Bob Skinner
    Security Principal, Insight

    Bob Skinner has worked for over 30 years in Information Technology and Security in highly complex and regulated industries such Financial Services & Banking, Defense, Telecommunications, and Airline Transportation. His technical experience includes Systems Administration, Database Design, Application Development, and IT Auditing. As a consultant, Mr. Skinner has assisted clients in retail with obtaining compliance with the Payment Card Industry Data Security Standard (PCI); these clients include device retailers, airline transportation, grocers, e-commerce, and business process outsourcers. Mr. Skinner has managed numerous projects, as well as other consultants.
    Bob Skinner has a Bachelor of Science in Business Administration, with a concentration in Finance, from the University of Florida, and a Master of Science in Computer Information Systems from Georgia State University. He has held board positions with the Information Services Security Administration (ISSA), in both Atlanta and Dallas.

  • speaker photo
    Sean Boulter
    Principal Security Engineer, Salt Security

    Sean Boulter is a technical leader with Salt Security where he helps his customers protect their APIs from abuse and keep their customers’ data secure. His career in IT and consulting spans three decades and covers a wide variety of infrastructure platforms and several industries including fintech, finserv, insurance, healthcare, medtech, and retail. He lives in the Minneapolis area with his wife, and shares a passion for bicycling and wilderness expeditions with his two grown children.

  • speaker photo
    Glenn Kapetansky, Moderator
    Chief Security Officer & Technology Lead, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Glenn's current focus areas—as Senior Principal and Chief Security Officer at Trexin Group—are agile management, data protection, and audit/regulatory compliance.

    Glenn speaks and publishes on occasion. He has been named numerous times in various Who's Who, and is a repeat recipient of Bell Labs' Arno Penzias Award for Innovation in the Marketplace. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Glenn's certifications and memberships include IEEE, ISC2 (CISSP), ISACA (CISA), and ITIL (SM).

  • speaker photo
    Mark Scrano
    Information Security Manager, Cobalt

    Mark Scrano is an information security manager at Cobalt, the leading pentest as a service company, where he focuses on maintaining network security, threat management and mitigation, vulnerability assessments, amongst other responsibilities. With over 15 years of experience he’s worked at notable companies including Vimeo, Paxos, and General Assembly. Previous to joining the world of infosec, Mark was a computer networking engineer.

  • speaker photo
    Alex Berger
    Sr. Director, Product Marketing, Open Systems

    With nearly a decade of experience in the cybersecurity industry, Alex Berger joined Open Systems to lead Product Marketing in 2021. Throughout his career, he has worked on a wide range of solutions spanning identity and access management, network security, cloud workload protection, data access governance and more. In his spare time, he enjoys spending time with his wife and dog, running and hiking in the hills of California, and supporting his favorite sports teams.

  • speaker photo
    David Creed
    VP, Business Development, MSSP & GSI, Armis
  • speaker photo
    Paul Hammons
    Principal Sales Engineer, Imperva

    Paul has been working at Imperva for 10 years and he has seen it all. He started in IT Security roles in the mid-90s helping customers visualize, protect, and secure their environments. Having previously worked at companies like e-Security, Novell, Varonis, and various other startups, Paul has personally implemented security solutions on five continents, in corporate environments, in secret government environments, and secure military installations. This has given Paul a deep insight into practical security practices and how they are implemented.

  • speaker photo
    Rebecca Rakoski, Moderator
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski, Esq., is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to aggressively mitigate her client's litigation risks. As an experienced litigator, she has handled hundreds of matters in state and federal courts. Rebecca advises her clients on a proactive, multi-jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She works with clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.

    As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section, and also served on the Complex Business Litigation Committee that drafted and revised the Court Rules involving electronic discovery in complex litigation matters. She has been appointed in several litigation matters by the New Jersey Superior Court as a Discovery Special Master.

    Rebecca is on the Board of Governors for Temple University Health Systems, and is an adjunct professor at Drexel University’s Thomas R. Kline School of Law and Rowan University.

  • speaker photo
    Ryan Leirvik
    Cybersecurity Author

    CEO of Neuvik and author of the book “Understand, Manage, and Measure Cyber Risk”. Past adventures include growing a cyber research and development company, serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, and sparking a fondness for technology problem-solving at IBM.

  • speaker photo
    Darren Carroll
    Managing Principal - Security Services, Insight

    Darren is a risk management and information security leader with diverse global experience in operational, technical, management, and presales roles. He has had the pleasure to build and lead multiple diverse, dynamic, high-performing teams. Throughout his career, he has provided consultative thought leadership, strategic direction, and tactical response to multiple federal, state, and local agencies, many of the Fortune 100, and hundreds of mid-sized enterprises.

  • speaker photo
    Dr. Nate Brady
    Executive Board Member, Chicago Chapter, (ISC)2
  • speaker photo
    Ben Nicholson
    Global Practice Leader, Prisma Cloud, Palo Alto Networks
  • speaker photo
    Rebecca Rakoski
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski is the managing partner at XPAN Law Partners, LLC. Rebecca advises her clients on a proactive, multi jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She uses her extensive experience to work with her clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.

    Rebecca counsels and aggressively defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. As an experienced litigator, Rebecca has handled hundreds of matters in state and federal courts. Rebecca skillfully manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to minimize her client's litigation risks.

    Rebecca regularly negotiates complex contractual provisions that are impacted by domestic and international data privacy regulations including the California Consumer Privacy Act of 2018, and the European Union's General Data Protection Regulation. She understands how the nature of the data can affect the role her client plays in the data transaction and uses that knowledge to mitigate corporate liability.
    As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section.

    Rebecca has been appointed and served in multiple highly complex litigation matters by the New Jersey Superior Court as a Special Master in the areas of technology and eDiscovery. She also served on the Complex Business Litigation Committee that drafted and revised the New Jersey Court Rules involving electronic discovery. Rebecca was on the eDiscovery committee of her prior law firm and created its eDiscovery subgroup.

    Rebecca is on the Board of Governors for Temple University Health Systems and is also the Acting Dean of Online Learning and an adjunct professor at Drexel University’s Thomas R. Kline School of Law.

  • speaker photo
    Glenn Kapetansky
    Chief Security Officer & Technology Lead, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Glenn's current focus areas—as Senior Principal and Chief Security Officer at Trexin Group—are agile management, data protection, and audit/regulatory compliance.

    Glenn speaks and publishes on occasion. He has been named numerous times in various Who's Who, and is a repeat recipient of Bell Labs' Arno Penzias Award for Innovation in the Marketplace. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Glenn's certifications and memberships include IEEE, ISC2 (CISSP), ISACA (CISA), and ITIL (SM).

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes