googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, June 5, 2024
    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, June 6, 2024
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Risk Management in the Age of AI
    • session level icon
    speaker photo
    CTO, Cook County Clerk's Office
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    This session is a combination of presentation with interactive dialogue to examine how AI affects the risk management practices of organizations. Be ready to discuss different aspects of AI vulnerability including model drift, “hallucinations,” and privacy concerns of using public LLM models versus private internal LLM models. It covers the differences between generative AI and analytical AI using examples of use cases for each. Attendees are encouraged to bring their own examples of either planned or implemented solutions to showcase how various risk factors were identified and mitigated.

    Key take-away:
    The audience will come away with a better understanding of the added complexity of risk management resulting from the introduction of AI into business operations.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    The Surprising List of CISO Top Concerns
    speaker photo
    Chief Security Officer & Technology Lead, Trexin Group
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Taking a cross-section of recent surveys (ISC2 , Dark Reading, PwC), arguably the top CISO concerns—not “priorities” but “concerns”—are third-party security risks, data manipulation, and burnout. Together, these represent the true CISO-level risks, compared to what’s in the news on a daily basis: AI, ransomware, supply chain and insider risks, cyber warfare, nation-state actors, etc. In this private, closed-door discussion, we challenge whether these three concerns are a correct and complete list, and discuss how/why they differ from those other top CISO priorities. The goal is to walk away with a new-look “to-do list” for your job versus the one with which you walked in.

    This roundtable discussion is for our Advisory Council members only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Cyber Behavioral Profiling: Assessing Cyber Threat Actors
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    This keynote introduces participants to the innovative Pathway to Cyber Attack™ model, designed to assess the distinct steps and behaviors that cyber threat actors engage in leading up to their execution of a cyber attack. Cameron Malin provides a unique window into cyber behavioral profiling—the application of traditional criminal behavioral profiling to cyber adversaries. Learn how to map the trajectory of potential cyber threats and consider mitigation strategies based on human behavior.
    Malin covers how to:
    • Understand Cyber Threat Actor Behaviors:  Learn the psychological and technical factors along attackers’ Pathway to Cyber Attack™.
    • Utilize the Pathway to Cyber Attack™ Model: Gain proficiency in applying this model to analyze the sequence of cyber threat actor decisions and actions leading up to a cyber attack.
    • Understand the value of augmenting Cyber Threat Intelligence with Behavioral Threat Intelligence: Learn how understanding cyber adversary behavior enhances the richness of cyber threat intelligence.
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    The Drama of AI Responsibility: Where Do You Fit In?
    • session level icon
    speaker photo
    CISO & CPO, University of Illinois at Chicago
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    In this presentation, attendees will learn about where AI responsibilities should reside and who gets to make the decision on who is responsible for AI. We will explore various AI responsibility use cases, what determinants drive the adoption of AI, and understand if AI is just another function or if it is a philosophical debate. Furthermore, we will discuss who should be responsible when AI misbehaves and if a governance framework with special attention to AI ethical concerns may prevent unintended biases and algorithmic drift in AI models.

    10:15 am
    Conquering the Past: Strategies for Overcoming Technical Debt in IT and Cybersecurity
    • session level icon
    speaker photo
    Director of Cybersecurity, Avelo Airlines
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    This presentation tackles the challenge of overcoming technical debt in IT and cybersecurity, defined as outdated or underinvested technology and infrastructure. It offers leaders practical strategies to update and enhance their technological assets. The talk covers the causes, impacts, and risks of technical debt and provides systematic approaches for its identification, assessment, and prioritization. Actionable steps for addressing technical debt will be shared, focusing on resource allocation, technology selection, and fostering a culture of continuous improvement. This is vital for professionals aiming to improve their cybersecurity posture and IT efficiency, leading to a more secure and future-proof organization.
    Learn to identify and assess technical debt in IT and cybersecurity, implement strategic remediation approaches, including resource allocation and technology selection, and foster a culture of continuous improvement to update infrastructure and align with industry standards regularly.
    10:15 am
    Breaking Down Silos: Aligning Cybersecurity and HR for a Cohesive Risk Strategy
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    For too long, cybersecurity and human resources have often operated in separate silos within organizations. With the threat landscape getting dicier every day,  closer collaboration between these two critical functions is essential. This session explores strategies for fostering a productive partnership that bridges perspectives and enables a cohesive approach to managing human risk factors.

    Key takeaways include:

    • Understanding each team’s priorities, pain points, and motivations to identify areas of misalignment and opportunities for tighter integration. For example, HR avoiding punitive actions that deter security incident reporting.
    • Developing a framework for handling cybersecurity-HR crossover scenarios like:
      • Employee phishing simulations that generate HR complaints or concerns
      • Balancing cybersecurity monitoring needs with employee privacy
      • Handling insider threat investigations through a human-centric lens
      • Aligning on security awareness initiatives that resonate with the workforce
    • Insights into recruiting and talent strategies that prioritize critical cybersecurity skillsets while promoting a strong organizational risk culture. How HR and security can jointly identify and cultivate these valuable professionals.
    • Building a cross-functional governance model that codifies cybersecurity as a core HR priority area, beyond just a technical IT issue. Centralizing human risk data to inform holistic risk management decisions.
    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Social Engineering: Training the Human Firewall
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    11:10 am
    Deepfakes: The New Frontier in Cybersecurity or Just Hype?
    • session level icon
    speaker photo
    VP & CISO, DeVry University
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Deepfakes leverage AI and machine learning to create hyper-realistic fake videos, images, and audio that can deceive even the most discerning eye and ear.

    Imagine a scenario where a convincingly real video of your CEO announcing a major policy shift goes viral, but it’s all a hoax created by deepfake technology. Or consider the implications of a deepfake voice phishing attack on your financial department. These are not just hypotheticals, but real threats that enterprises must prepare for.

    As we move forward, understanding the potential risks and developing strategies to detect and combat deepfakes will be crucial for maintaining trust, integrity, and security in the digital landscape. Let’s dive in and discuss whether this is just fodder for celebrities or if enterprise organizations need to be prepared, as well.

    11:10 am
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    Principal Solutions Architect, Lacework
    speaker photo
    Public Sector CTO, Lookout
    speaker photo
    CISO, Contrast Security
    speaker photo
    Co-Founder & CEO, Zafran Security
    speaker photo
    Principal Security Architect, Cummins Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    12:00 pm
    [Lunch Keynote] Fast-Track Funding of Your Cyber Initiatives by Focusing on Cyber Resilience
    • session level icon
    speaker photo
    Global CISO, Ingredion Incorporated
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Cyber resilience has increased in priority as technology reliance deepens and cyberattacks become more sophisticated. Cyber leaders spend countless hours trying to bolster their cyber strategy and constantly hit hurdles when it comes to funding those initiatives. This session will delve into what cyber resilience really means and explore practical approaches to leverage resilience to accelerate funding.

    12:00 pm
    Advisory Council Lunch Roundtable (VIP / Invite Only)
    • session level icon
    Breaches: Accepting the Risk of When Not If
    speaker photo
    VP & Chief Security Officer, Claro Healthcare
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    CISOs are surrounded by risk and charged with minimizing it as much as possible. Join this closed-door session for Advisory Council members and invited guests to discuss:

    • How do you deal with the risk?
    • What considerations do you take into account?
    • What do you tell management?
    • What support do you need or expect from them?
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Legal and Regulatory Risk: Challenges and Solutions for InfoSec Leaders
    • session level icon
    speaker photo
    First Vice President & Senior Consultant, Alliant Insurance
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Information Security leaders are facing unprecedented challenges in managing core information assets and data alongside responding to increasing legal, regulatory, and insurance risks. This presentation outlines some of the core challenges facing leaders in these areas. Come ready to hear practical recommendations to ensure that leaders understand, manage, and respond to these risks while achieving broader security and organizational objectives.
    1:15 pm
    Safeguarding Your Organization's Digital Presence Against Advanced Cyber Threats
    • session level icon
    speaker photo
    TEDx and Cybersecurity Technology Speaker
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    As guardians of your organization’s cybersecurity strategy, the responsibility to fortify social media accounts and websites against evolving cyber threats rests squarely on the shoulders of cybersecurity leaders. Join us for an exclusive session designed to equip you with the insights and strategies necessary to secure digital platforms effectively.
    1:15 pm
    [Panel] Elevating Security Through Threat Intelligence, Cloud Resilience, and AI Innovations
    • session level icon
    speaker photo
    Sr. Director, Global Security Specialists, Elastic
    speaker photo
    Co-Founder & CPO, Veriti
    speaker photo
    VP & Chief Security Officer, Zebra Technologies
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Join us for an informative panel that delves into the strategic integration of threat intelligence, cloud resilience, and AI innovations, revealing the untold stories of unsung heroes in cybersecurity. 

    Discover how to optimize digital defenses and learn approaches to elevate your security leadership and your security posture. Don’t miss this opportunity to gain actionable knowledge that will empower you to stay ahead of the cybersecurity curve.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Always the Last Place You Look: Unlocking Security Team Potential
    • session level icon
    speaker photo
    Principle Technical Security Engineer, Yahoo
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Much like the beloved Christmas hero “Rudolph,” I navigated the challenges of being different and ultimately used my unique skills to infiltrate Yahoo’s well-known security team, the Paranoids. Instead of trying to fit in with technical prowess, I paired with various characters, from resident AOL old schoolers to the inhabitants of the Island of Misfit Toys at Yahoo—complimenting developers, challenging the cybersecurity status quo, and changing the perception of “what a techie should be” of one of the best security teams in the industry.

    This talk will take you through my journey as a nontraditional engineer who used “special sauce” to unlock the potential of security architects at Yahoo, the security accomplishments achieved, and why every company should supercharge its existing talent with its own “Misfit.”

    2:10 pm
    How to Protect Yourself as a Security Leader
    • session level icon
    speaker photo
    Sr. Attorney, Clark Hill PLC
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Given the prosecution of Joe Sullivan (former CSO of Uber) and the charges against Timothy Brown (former CISO of SolarWinds), what steps can a CISO or other security leader take to protect him or herself? Are there lessons to be learned from these cases, or do they herald an “open season” on security leaders? Do the new SEC incident reporting requirements help or hurt security leaders and personal liability moving forward? What are reasonable best practices that can be applied during the incident response process that can limit your personal liability?

    Key take-away:
    How do I as a security leader limit my legal exposure during the incident response process?

    2:10 pm
    Illuminating the Dark Risk Universe: A New Frontier in Third-Party Security
    • session level icon
    speaker photo
    Sr. Strategic Advisor & vCISO, Sentinel Technologies
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    The modern enterprise exists within a vast cosmos of interconnected third-party relationships—suppliers, vendors, partners, and more. Yet this indispensable ecosystem also represents a rapidly expanding attack surface rife with often unaddressed cyber risks. Far too many organizations still rely on checklist security assessments providing only a fragmented snapshot-in-time of third-party risk posture. This illuminating session sheds light on the dark universe of third-party security threats lurking beyond the corporate perimeter. Get ready to:

    • Explore the real-world cyber risk impacts of complex, opaque supply chain relationships through analysis of recent high-profile breaches.
    • Gain insights into emerging AI/ML techniques for continuously monitoring third parties at scale across public, deep/dark web sources.
    • Learn a novel risk quantification framework for performing objective criticality assessments of all third-party partners.
    • Understand key regulatory trends around third-party cyber risk governance, including SEC-proposed rules.
    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

    3:30 pm
    [Closing Keynote] Why the Business Still Believes CISOs and Their Teams Are Too Techie
    • session level icon
    speaker photo
    CISO, The Kraft Heinz Company
    speaker photo
    CISO, JBT Corporation
    speaker photo
    VP & Chief Security Officer, Zebra Technologies
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater
    Despite the increasing prominence of cybersecurity in today’s business landscape, many organizations still struggle to bridge the gap between their security teams and the broader enterprise. CISOs and their teams are often perceived as too “techie”—speaking in jargon and failing to effectively communicate risk in business terms that resonate with executive leadership and stakeholders across the company.
    In this insightful session, our panel of seasoned cybersecurity leaders explore the root causes behind this persistent divide and its detrimental impact on an organization’s ability to manage cyber risk holistically. They examine:
    • The “language barrier” between security and business professionals
    • Cultural differences and misaligned incentives between IT and business units
    • Lack of business acumen and leadership skills in traditional security roles
    • Challenges in quantifying and translating cyber risk into financial/operational impacts
    • Overemphasis on technical controls at the expense of business context
Exhibitors
  • AccessIT Group + Check Point
    Booth: 320

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • Arctic Wolf Networks
    Booth: 350

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Axonius
    Booth: 150

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Contrast Security
    Booth: 240

    Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.

  • Elasticsearch
    Booth: 340

    At Elastic, we help organizations, their employees, and their customers accelerate the results that matter.

    With solutions in Enterprise Search, Observability, and Security, we help enhance customer and employee search experiences, keep mission-critical applications running smoothly, and protect against cyber threats. Delivered wherever data lives, in one cloud, across many clouds, or on-prem, Elastic enables more than 50% of the Fortune 500, and 17,000+ customers including Netflix, Uber, Slack, and Microsoft, to achieve new levels of success at scale and on a single platform. Learn more at elastic.co.

  • InfraGard Chicago
    Booth: TBD

    All InfraGard participants are committed to the proposition that a robust exchange of information about threats to and actual attacks on these critical infrastructures is an important element for successful infrastructure protection efforts. This chapter is governed by our local bylaws.

    The goal of InfraGard is to enable the flow of information so that the owners and operators of infrastructure assets can better protect themselves and so that the United States government can better discharge its law enforcement and national security responsibilities.

  • ISACA Chicago Chapter
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Chicago area.

    Chapter meetings are generally held the third Thursday of each month at The Conference Center at One North Wacker (1 N. Wacker Drive, 2nd Floor, Chicago, Illinois 60606)

    Please check our web site from time to time for the most up-to-date listing of chapter related events and training opportunities.

  • ISSA Chicago Chapter
    Booth: TBD

    The Chicago Chapter of the Information Systems Security Association (ISSA) has a mission to offer a stimulating combination of discussion forums, hands-on learning, CISSP certification training, conferences, and other events which are designed to enhance understanding and awareness of information security issues for information security professionals.

    Whether you are exploring a career in cybersecurity, honing your technical expertise or an established security executive, the ISSA offers you a network of 10,000 colleagues worldwide to support you in managing technology risk and protecting critical information and infrastructure. Enhance your professional stature, expand your peer network and achieve your personal career goals. Your local chapter and ISSA International will provide you with a wealth of resources to keep you current with industry trends and developments in our ever-evolving field.

  • Lacework
    Booth: 275

    Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.

  • Lookout
    Booth: 230

    Lookout is a cybersecurity company that makes it possible for individuals and enterprises to be both mobile and secure. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseen—predicting and stopping mobile attacks before they do harm.

  • National Cybersecurity Alliance
    Booth: TBD

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Rapid7
    Booth: 310

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Robert Half
    Booth: 100

    Robert Half, the world’s first and largest specialized talent solutions firm, connects opportunities at great companies with highly skilled job seekers. We offer contract, temporary and permanent placement solutions for roles in finance and accounting, technology, marketing and creative, legal, and administrative and customer support. Named to Fortune’s World’s Most Admired Companies and 100 Best Companies to Work For® lists and a Forbes Best Employer for Diversity, Robert Half is the parent company of Protiviti®. Robert Half is traded on the New York Stock Exchange (symbol: RHI) and is a member of the S&P 500 index.

  • Snyk
    Booth: 210

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • Stratascale
    Booth: 170

    As a digital and cyber security services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. Our purpose is to help clients realize their vision and create value, faster. We call it Digital Agility.

    From attack surface control to modern vulnerability management, stop by our booth to see how we’re shaping the future of digital business and a more secure world.

  • Synopsys
    Booth: 300

    Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.

  • Syxsense
    Booth: 250

    Syxsense is the world’s first software vendor providing cloud-based, automated endpoint and vulnerability management solutions that streamline IT and security operations. With our advanced platform, businesses gain complete visibility and control over their infrastructure, reducing IT risks and optimizing operational efficiency. Our real-time alerts, risk-based vulnerability prioritization, pre-built remediations, and intuitive automation and orchestration engine enable organizations to focus on their core business goals—confident in the knowledge that their enterprise is secure, compliant, and running smoothly. Rely on Syxsense to safeguard your IT infrastructure, so you can concentrate on what you do best—driving your business forward.

  • Tevora
    Booth: 160

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • ThreatLocker
    Booth: 270

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Tines
    Booth: 390

    Founded in 2018 in Dublin by experienced security engineers, Tines makes enterprise automation simple.

    Security and operations teams are too often stuck doing manual, repetitive tasks, and we want to change that. Tines is an automation platform designed to allow anyone to automate any manual task, regardless of complexity. No apps, plugins, or custom code required.

    With 1,000+ template options for common security actions, Tines is power and simplicity through direct integration with your existing tools.

  • Veriti
    Booth: 330

    Veriti is a fast-growing security infrastructure innovator that helps organizations maximize their security posture while ensuring business uptime.

    Integrated with the entire security stack, Veriti provides a consolidated management layer that continually and proactively monitors exposure to threats and provides actionable remediation paths for security gaps and high-risk vulnerabilities across the organization’s infrastructure and attack surface.

  • Zafran Security
    Booth: 260

    Zafran Risk & Mitigation Platform defuses threat exploitation by mobilizing existing security tools

  • WiCyS Chicago Affiliate
    Booth: TBD
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Kevin McDermott
    CTO, Cook County Clerk's Office

    Mr. McDermott has more than 35 years of management and consulting experience in the IT field, with broad background in government, banking, and financial services, as well as experience in healthcare, higher education, the convention and trade show industry, and the not-for-profit world. Mr. McDermott holds an MBA degree from the University of California, Berkeley, and a BA from Northwestern University.

  • speaker photo
    Glenn Kapetansky, Moderator
    Chief Security Officer & Technology Lead, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Glenn's current focus areas—as Senior Principal and Chief Security Officer at Trexin Group—are agile management, data protection, and audit/regulatory compliance.

    Glenn speaks and publishes on occasion. He has been named numerous times in various Who's Who, and is a repeat recipient of Bell Labs' Arno Penzias Award for Innovation in the Marketplace. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Glenn's certifications and memberships include IEEE, ISC2 (CISSP), ISACA (CISA), and ITIL (SM).

  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Shefali Mookencherry
    CISO & CPO, University of Illinois at Chicago
  • speaker photo
    David Sledge
    Director of Cybersecurity, Avelo Airlines

    David Sledge is the Director of Cybersecurity for Avelo Airlines, where he collaborates with the CISA and FBI. He holds +20 IT and cybersecurity-focused professional certifications, including CISSP, CISM, and CIPM. He brings 16 years of experience in IT and security leadership, working with global Fortune 500 companies. Previous speaking engagements include keynote speaker and panelist. He is a current ISACA – Greater Houston Chapter Board Member and active member of SIM Houston, ISSA South Texas, OWASP Austin, and ISC2 Austin. A cybersecurity advisory board member at multiple universities and is recognized as an ambassador, mentor, and advocate in the cybersecurity industry.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.

  • speaker photo
    Dr. Fred Kwong
    VP & CISO, DeVry University

    Dr. Fred Kwong has been in the information security and technology field for the past 20 years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security Officer. He is a member of several advisory boards and is a frequent speaker at national security forums on cyber security and information technology and is often asked to consult on matters of security and leadership

    Fred also serves as an adjunct faculty member at Roosevelt and Benedictine Universities. He received his Bachelor of Arts in psychology and professional communications, Master of Business Administration in management information systems from Roosevelt University, and holds his Doctorate in organization development from Benedictine University. Fred has earned several certifications including the CISSP, CISA, CISM, CDPE, PCIP, PMP and ITILv3f.

  • speaker photo
    Carlos Bacquet
    Principal Solutions Architect, Lacework

    Carlos Bacquet is a Principal Solutions Architect at Lacework where he solves Cloud Security problems for enterprise customers in the Toronto region. Before joining Lacework Carlos spent the last 15 years working on network management and security applications in the Telecommunications, Cable and Streaming Media industries. Carlos holds a Bachelor of Computer Science and a Master in Computer Science with focus on machine Learning applied to Security applications. His areas of expertise include Kubernetes security and machine learning security applications applied to cloud infrastructure.

  • speaker photo
    Jim Coyle
    Public Sector CTO, Lookout

    Jim Coyle is the U.S. public sector CTO at Lookout Security, utilizing his 20+ years of knowledge and expertise to help close the security gap many government agencies and organizations face today. A cybersecurity industry thought leader exploring geo-political cyber related issues, the latest threats and defense strategies, as well as industry trends providing insights through his career. Jim is currently responsible for leading the charge to redesign and revolutionize cybersecurity programs of customers to battle today's threats.

  • speaker photo
    David Lindner
    CISO, Contrast Security

    David Lindner is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security programs. Throughout his career, David has worked within multiple disciplines in the security field—from application development, to network architecture design and support, to IT security and consulting, to security training, and application security. Over the past decade, David has specialized in all things related to mobile applications and securing them. He has worked with many clients across industry sectors, including financial, government, automobile, healthcare, and retail. David is an active participant in numerous bug bounty programs.

  • speaker photo
    Sanaz Yashar
    Co-Founder & CEO, Zafran Security
  • speaker photo
    Sankarasubramaniam Chockalingam, Moderator
    Principal Security Architect, Cummins Inc.
  • speaker photo
    Kenneth Townsend
    Global CISO, Ingredion Incorporated

    Kenneth Townsend is a proven results-oriented CISO with a successful track record of delivering business value by leveraging technology and leading transformational cybersecurity strategies. Kenneth’s understanding of the digital technology stack across the enterprise and cyber risk management has allowed him to successfully operate in a variety of industries and become a highly respected leader in Financial Services, Retail, Healthcare, and Manufacturing.

    As the Global CISO for Ingredion, Kenneth is responsible for establishing and executing a cyber strategy to manage risk across the corporate and manufacturing environments. He brings a deep understanding of cybersecurity threats, regulations, and best practices to the role to build a strong security culture. Beyond his core responsibilities, Kenneth is a dedicated thought leader in the cybersecurity community. He is a cyber product advisor, active speaker at various industry events, and volunteers time to support and mentor youth in STEM fields.

  • speaker photo
    Tony Beaird, Moderator
    VP & Chief Security Officer, Claro Healthcare
  • speaker photo
    Dominic Keller
    First Vice President & Senior Consultant, Alliant Insurance

    Dominic Keller has global experience across the cybersecurity, law and risk management fields. Dominic has worked as an attorney in Australia and California, a cyber risk consultant, and a cyber insurance broker with domestic and international companies across many industries. He holds the CISSP certification and has studied Corporate Strategy at the Chicago Booth School of Business.

    Dominic has worked extensively with organizations in developing cyber risk management strategies incorporating cybersecurity, legal, insurance, and business goals. He has advised Boards, C-suites, and organizational leaders in implementing effective cyber risk governance approaches, and is a regular speaker at conferences and industry events.

  • speaker photo
    Burton Kelso
    TEDx and Cybersecurity Technology Speaker
  • speaker photo
    Lisa Jones-Huff
    Sr. Director, Global Security Specialists, Elastic

    Lisa Jones Huff is a seasoned cybersecurity expert with over two decades of experience in the field. As the Senior Director of Global Security Specialists, SA Team at Elastic, she brings a wealth of knowledge and a consultative approach to the table.

    Lisa's passion lies in helping organizations identify and tackle their ongoing security challenges by leveraging their existing technology investments. She takes the time to engage with customers, working closely to provide them with invaluable insights into their security landscape.

    Her primary focus is on providing Enterprise Visibility, by shedding light on threats that may be targeting entities within organizations. By doing so, Lisa empowers her clients with the critical information they need to make informed decisions regarding potential cyber threats that may be lurking within their environment.

    Over her illustrious career, Lisa has collaborated with some of the largest and most prominent organizations in the world, aiding them in staying one step ahead of targeted cyber threats. Her dedication to the cybersecurity field has solidified her reputation as a trusted expert in safeguarding digital assets and mitigating security risks.

    Lisa is a trailblazer in the cybersecurity realm, committed to fortifying organizations against the ever-evolving landscape of cyber threats. With her deep expertise and consultative approach, she continues to make invaluable contributions to the realm of digital security.

  • speaker photo
    Oren Koren
    Co-Founder & CPO, Veriti

    Oren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings 19 years of experience in cybersecurity, advanced threat analysis, and product management,. Prior to founding Veriti, Oren was a Senior Product Manager at Check Point Software Technologies, where he led AI-based innovations and advanced data analytics projects redefining threat hunting and SIEM applications. Before Check Point, Oren served for 14 years at the prestigious 8200 unit and was responsible for different cybersecurity activities and research. Oren won the Israeli Security Award and 3 MOD awards for cutting-edge innovations in cyber security.

  • speaker photo
    Mike Zachman, Moderator
    VP & Chief Security Officer, Zebra Technologies
  • speaker photo
    Bonnie Viteri
    Principle Technical Security Engineer, Yahoo

    Building security programs and devising simple solutions to complex problems is what I do. I didn't travel the traditional path into cyber, and I don't plan to conform now.

    A behavioral psychologist at heart who is always watching and actively listening when everyone else is waiting to respond, paired with an M.S. in Criminology, makes me the ideal social engineer.

    My first success was merging Yahoo and AOL security programs into a thriving, single-security culture through global psychological and behavioral change management techniques, specializing in human risk and designing programs to address it. Understanding what motivates developers and building solid relationships one conversation at a time, focusing on people, programs and processes lended to 98% global security adoption at Yahoo. Bridging the gap between developers and non-technical colleagues made me invaluable.

  • speaker photo
    Richard Halm
    Sr. Attorney, Clark Hill PLC

    Rick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private practice—all blend together to allow him to approach cybersecurity and privacy incidents from a unique vantage point. As a U.S. Army veteran, he blends this vantage point with an ability to bring order and calm to complex and high-stress incidents.

  • speaker photo
    Arvin Verma
    Sr. Strategic Advisor & vCISO, Sentinel Technologies

    Arvin Verma is a highly motivated and talented cybersecurity professional with over 8 years of experience across a diverse set of cyber domains and industries such as Aerospace and Defense, Technology, Financial and Insurance, Commercial Retail, Manufacturing and several more. He has filed more than 4 invention disclosures in the field of cybersecurity with one being granted as a patent and continues to leverage new concepts to drive higher confidence in today’s continuously changing environment. Arvin is CISSP certified, Security+ Certified and a ISO 27001 Certified Lead Auditor. He serves as NSSRP IT Sector Chief and Chicago Chapter Board Member for InfraGard.

  • speaker photo
    Happy Hour
  • speaker photo
    Ricardo Lafosse
    CISO, The Kraft Heinz Company

    Ricardo Lafosse is responsible for IT risk governance, software and product security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security topics at global conferences, including Defcon, MirCon, and ISACA CACS. Lafosse has more than 15 years of experience in information security for the government, finance, legal, and healthcare. Lafosse holds a Master’s in Information Assurance from the Iowa State University. He also holds the Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) designations.

  • speaker photo
    Elizabeth Ogunti
    CISO, JBT Corporation
  • speaker photo
    Mike Zachman
    VP & Chief Security Officer, Zebra Technologies
  • speaker photo
    Lisa Plaggemier, Moderator
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Best practices & solutions, straight from the source

Join your local cybersecurity community for learning and professional growth!