- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, June 5, 20249:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO, Cyber Risk Opportunities LLCRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, June 6, 20247:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amRisk Management in the Age of AICTO, Cook County Clerk's OfficeRegistration Level:- Open Sessions
8:00 am - 8:45 amThis session is a combination of presentation with interactive dialogue to examine how AI affects the risk management practices of organizations. Be ready to discuss different aspects of AI vulnerability including model drift, “hallucinations,” and privacy concerns of using public LLM models versus private internal LLM models. It covers the differences between generative AI and analytical AI using examples of use cases for each. Attendees are encouraged to bring their own examples of either planned or implemented solutions to showcase how various risk factors were identified and mitigated.
Key take-away:
The audience will come away with a better understanding of the added complexity of risk management resulting from the introduction of AI into business operations.8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:- VIP / Exclusive
8:00 am - 8:45 amThis roundtable discussion is for our Advisory Council members only.
8:00 amAssociation Chapter MeetingsRegistration Level:- Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Cyber Behavioral Profiling: Assessing Cyber Threat ActorsCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterSession description to come.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amThe Drama of AI Responsibility: Where Do You Fit In?CISO & CPO, University of Illinois at ChicagoRegistration Level:- Conference Pass
10:15 am - 11:00 amIn this presentation, attendees will learn about where AI responsibilities should reside and who gets to make the decision on who is responsible for AI. We will explore various AI responsibility use cases, what determinants drive the adoption of AI, and understand if AI is just another function or if it is a philosophical debate. Furthermore, we will discuss who should be responsible when AI misbehaves and if a governance framework with special attention to AI ethical concerns may prevent unintended biases and algorithmic drift in AI models.
10:15 amConquering the Past: Strategies for Overcoming Technical Debt in IT and CybersecurityDirector of Cybersecurity, Avelo AirlinesRegistration Level:- Conference Pass
10:15 am - 11:00 amThis presentation tackles the challenge of overcoming technical debt in IT and cybersecurity, defined as outdated or underinvested technology and infrastructure. It offers leaders practical strategies to update and enhance their technological assets. The talk covers the causes, impacts, and risks of technical debt and provides systematic approaches for its identification, assessment, and prioritization. Actionable steps for addressing technical debt will be shared, focusing on resource allocation, technology selection, and fostering a culture of continuous improvement. This is vital for professionals aiming to improve their cybersecurity posture and IT efficiency, leading to a more secure and future-proof organization.Learn to identify and assess technical debt in IT and cybersecurity, implement strategic remediation approaches, including resource allocation and technology selection, and foster a culture of continuous improvement to update infrastructure and align with industry standards regularly.10:15 amRansomware: How to Stay Off the Front PagesRegistration Level:- Open Sessions
10:15 am - 11:00 am11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amSocial Engineering: Training the Human FirewallTeam Leader of Information Security, GarminRegistration Level:- Conference Pass
11:10 am - 11:55 amPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
11:10 amDeepfakes: The New Frontier in Cybersecurity or Just Hype?VP & CISO, DeVry UniversityRegistration Level:- Conference Pass
11:10 am - 11:55 amDeepfakes leverage AI and machine learning to create hyper-realistic fake videos, images, and audio that can deceive even the most discerning eye and ear.
Imagine a scenario where a convincingly real video of your CEO announcing a major policy shift goes viral, but it’s all a hoax created by deepfake technology. Or consider the implications of a deepfake voice phishing attack on your financial department. These are not just hypotheticals, but real threats that enterprises must prepare for.
As we move forward, understanding the potential risks and developing strategies to detect and combat deepfakes will be crucial for maintaining trust, integrity, and security in the digital landscape. Let’s dive in and discuss whether this is just fodder for celebrities or if enterprise organizations need to be prepared, as well.
11:10 am[Panel] Unveiling the Threat Landscape and Unmasking Digital VillainsPrincipal Solutions Architect, LaceworkSolutions Architect, SyxsenseCISO, Contrast SecurityCo-Founder & CEO, Zafran SecurityRegistration Level:- Open Sessions
11:10 am - 11:55 amIn the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.
Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.
Our panel provides a comprehensive overview of the current threat landscape.
12:00 pm[Lunch Keynote] Fast-Tack Funding of Your Cyber Initiatives by Focusing on Cyber ResilienceGlobal CISO, Ingredion IncorporatedRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterCyber resilience has increased in priority as technology reliance deepens and cyberattacks become more sophisticated. Cyber leaders spend countless hours trying to bolster their cyber strategy and constantly hit hurdles when it comes to funding those initiatives. This session will delve into what cyber resilience really means and explore practical approaches to leverage resilience to accelerate funding.
12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:- VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmLegal and Regulatory Risk: Challenges and Solutions for InfoSec LeadersFirst Vice President & Senior Consultant, Alliant InsuranceRegistration Level:- Conference Pass
1:15 pm - 2:00 pmInformation Security leaders are facing unprecedented challenges in managing core information assets and data alongside responding to increasing legal, regulatory, and insurance risks. This presentation outlines some of the core challenges facing leaders in these areas. Come ready to hear practical recommendations to ensure that leaders understand, manage, and respond to these risks while achieving broader security and organizational objectives.1:15 pmSafeguarding Your Organization's Digital Presence Against Advanced Cyber ThreatsTEDx and Cybersecurity Technology SpeakerRegistration Level:- Conference Pass
1:15 pm - 2:00 pmAs guardians of your organization’s cybersecurity strategy, the responsibility to fortify social media accounts and websites against evolving cyber threats rests squarely on the shoulders of cybersecurity leaders. Join us for an exclusive session designed to equip you with the insights and strategies necessary to secure digital platforms effectively.1:15 pm[Panel] Elevating Security Through Threat Intelligence, Cloud Resilience, and AI InnovationsSr. Director, Global Security Specialists, ElasticCo-Founder & CPO, VeritiRegistration Level:- Open Sessions
1:15 pm - 2:00 pmJoin us for an informative panel that delves into the strategic integration of threat intelligence, cloud resilience, and AI innovations, revealing the untold stories of unsung heroes in cybersecurity.
Discover how to optimize digital defenses and learn approaches to elevate your security leadership and your security posture. Don’t miss this opportunity to gain actionable knowledge that will empower you to stay ahead of the cybersecurity curve.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmAlways the Last Place You Look: Unlocking Security Team PotentialPrinciple Technical Security Engineer, YahooRegistration Level:- Conference Pass
2:10 pm - 2:55 pmMuch like the beloved Christmas hero “Rudolph,” I navigated the challenges of being different and ultimately used my unique skills to infiltrate Yahoo’s well-known security team, the Paranoids. Instead of trying to fit in with technical prowess, I paired with various characters, from resident AOL old schoolers to the inhabitants of the Island of Misfit Toys at Yahoo—complimenting developers, challenging the cybersecurity status quo, and changing the perception of “what a techie should be” of one of the best security teams in the industry.
This talk will take you through my journey as a nontraditional engineer who used “special sauce” to unlock the potential of security architects at Yahoo, the security accomplishments achieved, and why every company should supercharge its existing talent with its own “Misfit.”
2:10 pmHow to Protect Yourself as a Security LeaderSr. Attorney, Clark Hill PLCRegistration Level:- Conference Pass
2:10 pm - 2:55 pmGiven the prosecution of Joe Sullivan (former CSO of Uber) and the charges against Timothy Brown (former CISO of SolarWinds), what steps can a CISO or other security leader take to protect him or herself? Are there lessons to be learned from these cases, or do they herald an “open season” on security leaders? Do the new SEC incident reporting requirements help or hurt security leaders and personal liability moving forward? What are reasonable best practices that can be applied during the incident response process that can limit your personal liability?
Key take-away:
How do I as a security leader limit my legal exposure during the incident response process?2:10 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:- Open Sessions
2:10 pm - 2:55 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:- Open Sessions
3:00 pm - 3:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.
3:30 pm[Closing Keynote] CISO Panel: The State of CybersecurityCISO, The Kraft Heinz CompanyVP & Chief Security Officer, Zebra TechnologiesRegistration Level:- Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterSession description coming soon.
- Arctic Wolf NetworksBooth: 350
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- AxoniusBooth: TBD
Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately.
- Contrast SecurityBooth: TBD
Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.
- ElasticsearchBooth: TBD
At Elastic, we help organizations, their employees, and their customers accelerate the results that matter.
With solutions in Enterprise Search, Observability, and Security, we help enhance customer and employee search experiences, keep mission-critical applications running smoothly, and protect against cyber threats. Delivered wherever data lives, in one cloud, across many clouds, or on-prem, Elastic enables more than 50% of the Fortune 500, and 17,000+ customers including Netflix, Uber, Slack, and Microsoft, to achieve new levels of success at scale and on a single platform. Learn more at elastic.co.
- ISACA Chicago ChapterBooth: TBD
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.
Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)
Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.
- ISSA Chicago ChapterBooth: TBD
The Chicago Chapter of the Information Systems Security Association (ISSA) has a mission to offer a stimulating combination of discussion forums, hands-on learning, CISSP certification training, conferences, and other events which are designed to enhance understanding and awareness of information security issues for information security professionals.
Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.
- LaceworkBooth: TBD
Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.
- Rapid7Booth: TBD
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- Robert HalfBooth: TBD
Robert Half, the world’s first and largest specialized talent solutions firm, connects opportunities at great companies with highly skilled job seekers. We offer contract, temporary and permanent placement solutions for roles in finance and accounting, technology, marketing and creative, legal, and administrative and customer support. Named to Fortune’s World’s Most Admired Companies and 100 Best Companies to Work For® lists and a Forbes Best Employer for Diversity, Robert Half is the parent company of Protiviti®. Robert Half is traded on the New York Stock Exchange (symbol: RHI) and is a member of the S&P 500 index.
- SIM ChicagoBooth: TBD
The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:
- Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
- Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
- Challenging our comfort levels by exchanging ideas with peers and business counterparts.
- Being a resource for each other, and personal networking.
- SnykBooth: TBD
Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.
- SynopsysBooth: TBD
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
- SyxsenseBooth: TBD
Syxsense is the world’s first software vendor providing cloud-based, automated endpoint and vulnerability management solutions that streamline IT and security operations. With our advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT risks and optimizing operational efficiency. Our real-time alerts, risk-based vulnerability prioritization, pre-built remediations, and intuitive automation and orchestration engine enable organizations to focus on their core business goals—confident in the knowledge that their enterprise is secure, compliant, and running smoothly. Rely on Syxsense to safeguard your IT infrastructure, so you can concentrate on what you do best—driving your business forward.
- TevoraBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- VeritiBooth: TBD
Veriti is a fast-growing security infrastructure innovator that helps organizations maximize their security posture while ensuring business uptime.
Integrated with the entire security stack, Veriti provides a consolidated management layer that continually and proactively monitors exposure to threats and provides actionable remediation paths for security gaps and high-risk vulnerabilities across the organization’s infrastructure and attack surface.
- Zafran SecurityBooth: TBD
Zafran Risk & Mitigation Platform defuses threat exploitation by mobilizing existing security tools
- WiCyS Chicago AffiliateBooth: TBD
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Kevin McDermottCTO, Cook County Clerk's Office
Mr. McDermott has more than 35 years of management and consulting experience in the IT field, with broad background in government, banking, and financial services, as well as experience in healthcare, higher education, the convention and trade show industry, and the not-for-profit world. Mr. McDermott holds an MBA degree from the University of California, Berkeley, and a BA from Northwestern University.
- Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.). - Shefali MookencherryCISO & CPO, University of Illinois at Chicago
- David SledgeDirector of Cybersecurity, Avelo Airlines
David Sledge is the Director of Cybersecurity for Avelo Airlines, where he collaborates with the CISA and FBI. He holds +20 IT and cybersecurity-focused professional certifications, including CISSP, CISM, and CIPM. He brings 16 years of experience in IT and security leadership, working with global Fortune 500 companies. Previous speaking engagements include keynote speaker and panelist. He is a current ISACA – Greater Houston Chapter Board Member and active member of SIM Houston, ISSA South Texas, OWASP Austin, and ISC2 Austin. A cybersecurity advisory board member at multiple universities and is recognized as an ambassador, mentor, and advocate in the cybersecurity industry.
- Reanna SchultzTeam Leader of Information Security, Garmin
Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.
- Dr. Fred KwongVP & CISO, DeVry University
Dr. Fred Kwong has been in the information security and technology field for the past 20 years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security Officer. He is a member of several advisory boards and is a frequent speaker at national security forums on cyber security and information technology and is often asked to consult on matters of security and leadership
Fred also serves as an adjunct faculty member at Roosevelt and Benedictine Universities. He received his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University, and holds his Doctorate in organization development from Benedictine University. Fred has earned several certifications including the CISSP, CISA, CISM, CDPE, PCIP, PMP and ITILv3f.
- Carlos BacquetPrincipal Solutions Architect, Lacework
Carlos Bacquet is a Principal Solutions Architect at Lacework where he solves Cloud Security problems for enterprise customers in the Toronto region. Before joining Lacework Carlos spent the last 15 years working on network management and security applications in the Telecommunications, Cable and Streaming Media industries. Carlos holds a Bachelor of Computer Science and a Master in Computer Science with focus on machine Learning applied to Security applications. His areas of expertise include Kubernetes security and machine learning security applications applied to cloud infrastructure.
- Blaise FelloSolutions Architect, Syxsense
Blaise is currently a Solutions Architect at Syxsense and has been working in the IT field for the last 12 years as part of retail, MSP contracted to educational systems, and systems administrator for a spectral imaging startup company. He currently holds A+, Network+, Server+, and Security+ Certifications.
- David LindnerCISO, Contrast Security
David Lindner is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, and application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.
- Kenneth TownsendGlobal CISO, Ingredion Incorporated
Kenneth Townsend is a proven results-oriented CISO with a successful track record of delivering business value by leveraging technology and leading transformational cybersecurity strategies. Kenneth’s understanding of the digital technology stack across the enterprise and cyber risk management has allowed him to successfully operate in a variety of industries and become a highly respected leader in Financial Services, Retail, Healthcare, and Manufacturing.
As the Global CISO for Ingredion, Kenneth is responsible for establishing and executing a cyber strategy to manage risk across the corporate and manufacturing environments. He brings a deep understanding of cybersecurity threats, regulations, and best practices to the role to build a strong security culture. Beyond his core responsibilities, Kenneth is a dedicated thought leader in the cybersecurity community. He is a cyber product advisor, active speaker at various industry events, and volunteers time to support and mentor youth in STEM fields.
- Dominic KellerFirst Vice President & Senior Consultant, Alliant Insurance
Dominic Keller has global experience across the cybersecurity, law and risk management fields. Dominic has worked as an attorney in Australia and California, a cyber risk consultant, and a cyber insurance broker with domestic and international companies across many industries. He holds the CISSP certification and has studied Corporate Strategy at the Chicago Booth School of Business.
Dominic has worked extensively with organizations in developing cyber risk management strategies incorporating cybersecurity, legal, insurance, and business goals. He has advised Boards, C-suites, and organizational leaders in implementing effective cyber risk governance approaches, and is a regular speaker at conferences and industry events.
- Lisa Jones-HuffSr. Director, Global Security Specialists, Elastic
Lisa Jones Huff is a seasoned cybersecurity expert with over two decades of experience in the field. As the Senior Director of Global Security Specialists, SA Team at Elastic, she brings a wealth of knowledge and a consultative approach to the table.
Lisa's passion lies in helping organizations identify and tackle their ongoing security challenges by leveraging their existing technology investments. She takes the time to engage with customers, working closely to provide them with invaluable insights into their security landscape.
Her primary focus is on providing Enterprise Visibility, by shedding light on threats that may be targeting entities within organizations. By doing so, Lisa empowers her clients with the critical information they need to make informed decisions regarding potential cyber threats that may be lurking within their environment.
Over her illustrious career, Lisa has collaborated with some of the largest and most prominent organizations in the world, aiding them in staying one step ahead of targeted cyber threats. Her dedication to the cybersecurity field has solidified her reputation as a trusted expert in safeguarding digital assets and mitigating security risks.
Lisa is a trailblazer in the cybersecurity realm, committed to fortifying organizations against the ever-evolving landscape of cyber threats. With her deep expertise and consultative approach, she continues to make invaluable contributions to the realm of digital security.
- Oren KorenCo-Founder & CPO, Veriti
Oren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings 19 years of experience in cybersecurity, advanced threat analysis, and product management,. Prior to founding Veriti, Oren was a Senior Product Manager at Check Point Software Technologies, where he led AI-based innovations and advanced data analytics projects redefining threat hunting and SIEM applications. Before Check Point, Oren served for 14 years at the prestigious 8200 unit and was responsible for different cybersecurity activities and research. Oren won the Israeli Security Award and 3 MOD awards for cutting-edge innovations in cyber security.
- Panel Discussion
- Bonnie ViteriPrinciple Technical Security Engineer, Yahoo
Building security programs and devising simple solutions to complex problems is what I do. I didn't travel the traditional path into cyber, and I don't plan to conform now.
A behavioral psychologist at heart who is always watching and actively listening when everyone else is waiting to respond, paired with an M.S. in Criminology, makes me the ideal social engineer.
My first success was merging Yahoo and AOL security programs into a thriving, single-security culture through global psychological and behavioral change management techniques, specializing in human risk and designing programs to address it. Understanding what motivates developers and building solid relationships one conversation at a time, focusing on people, programs and processes lended to 98% global security adoption at Yahoo. Bridging the gap between developers and non-technical colleagues made me invaluable.
- Richard HalmSr. Attorney, Clark Hill PLC
Rick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private practice—all blend together to allow him to approach cybersecurity and privacy incidents from a unique vantage point. As a U.S. Army veteran, he blends this vantage point with an ability to bring order and calm to complex and high-stress incidents.
- Happy Hour
- Ricardo LafosseCISO, The Kraft Heinz Company
Ricardo Lafosse is responsible for IT risk governance, software and product security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security topics at global conferences, including Defcon, MirCon, and ISACA CACS. Lafosse has more than 15 years of experience in information security for the government, finance, legal, and healthcare. Lafosse holds a Master’s in Information Assurance from the Iowa State University. He also holds the Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) designations.
- Mike ZachmanVP & Chief Security Officer, Zebra Technologies
- Panel Discussion
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your local cybersecurity community for learning and professional growth!