Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, September 7, 20169:00 amSecureWorld Plus - Sept. 7th - Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)President, CISSP, O'Leary Management EducationRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: 201 - Thursday, September 8, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration Desk7:30 amAdvisory Council Kickoff Breakfast - Third Party Risk Management - (VIP / INVITE ONLY)Registration Level:VIP / Exclusive
7:30 am - 8:30 amLocation / Room: 2048:30 amManaging Your Security Career; Which Hill Will You Climb?Information Technology Chief Security Officer, Western & Southern Financial GroupRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: 2018:30 amOpenDNS, Part of Cisco: How to Block Threats Before, During & After an AttackSystems Engineer, OpenDNS, now part of CiscoRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: 2028:30 amSelling a Product? Don’t Be The Breach!Global Product Security Manager, Johnson & JohnsonRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: 2039:00 amExhibit Floor OpenRegistration Level:Open Sessions
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Cybersecurity 2.0 - Thought Leadership for Changing TimesFounder & CEO, BlackCloakRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 am11:15 amArbor Networks: The DDoS Shakedown: Extortion is Alive and WellSr. Director, Product Marketing, Arbor NetworksRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: 20311:15 amRadware: Cyber War Chronicles - Stories From the Virtual TrenchesSystems Engineer, RadwareRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: 20111:15 amSecuring Payment Card Transactions with PCISenior Director, Data Security Standards, PCI Security Standards CouncilRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: 20212:00 pmAdvisory Council Roundtable Lunch - (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: 20412:15 pmLUNCH KEYNOTE: Radware The Current Economics of Cyber AttacksSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote Theater1:15 pmPanel: After the HackRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: 2011:15 pmPanel: Current ThreatscapeRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote Theater2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pm2:30 pmDash for Prizes and CyberHunt Winners AnnouncedRegistration Level:2:30 pm - 2:45 pm3:00 pmCollaborative Security Awareness ProgramsCISO, American Financial GroupSenior Communications Manager, American Financial GroupRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 2013:00 pmPrivacy and Data Security Law Update: Data Breach & Cyber Incident Response PreparednessPartner, Graydon HeadRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 2023:00 pmThird Party Vendor Management and Reports Provided by Service Organization Related to ControlsAudit Senior Manager - IT Assurance, Crowe Horwath LLPRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 203
- <Cincinnati, OH 2016Booth: 200
- <Cincinnati, OH 2016Booth: 106
- <Cincinnati, OH 2016Booth: 204
- <Cincinnati, OH 2016Booth: 330
- <Cincinnati, OH 2016Booth: 104
- <Cincinnati, OH 2016Booth: 302
- <Cincinnati, OH 2016Booth: 210
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Mike RockInformation Technology Chief Security Officer, Western & Southern Financial Group
Michael Rock is the information technology chief security officer for Western & Southern Financial Group (Western & Southern) based in Cincinnati. In this role, Rock oversees security efforts across the enterprise and identifies security initiatives and standards. He leads three functions: information technology risk, information security risk management services and cybersecurity operations. Prior to joining the company in 2014, Rock managed information security at Procter & Gamble. He began his career at Procter & Gamble in 2000, became an information security manager in 2009 and was promoted to information security section manager in 2013.
Rock is a 2006 graduate from the University of Phoenix with a master of arts in business administration and a 1994 graduate from Florida State University with a bachelor of science in political science and government. He holds the Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP) designations. Rock resides in West Chester, Ohio, with his wife, April, and their four children, McKenzie, Bishop, Sophia and Sawyer.
- Paul SingletonSystems Engineer, OpenDNS, now part of Cisco
- Jon LitchfieldGlobal Product Security Manager, Johnson & Johnson
Jon Litchfield is the Global Product Security Manager at Johnson & Johnson. Jon has 15 years of information technology experience and 8 years of information security experience. Jon holds several industry and security certifications including CISA, PMP, and has recently applied for his CISM certification. Jon started his career in information security as a security lead and was promoted to Information security manager within Johnson & Johnson where he managed web applications, network security, third party risk, security incidents, and security awareness functions. Recently Jon has been focusing on security within Internet of Things (IoT) products and medical devices.
- Dr. Christopher PiersonFounder & CEO, BlackCloak
Dr. Chris Pierson is the Founder & CEO of BlackCloak, a pioneer of personal digital protection for corporate executives, high-profile and high-net-worth individuals and their families. Chris has been on the front lines of cybersecurity, privacy protection, and fighting cybercrime in both the public and private sectors over 20 years. At the Department of Homeland Security, Chris served as a special government employee on their Cybersecurity and Privacy Committees. He’s also spent time as the Chief Privacy Officer for Royal Bank of Scotland, the world’s 3rd largest bank, as the Chief Information Security Officer for two prominent FinTechs, and as President of the Federal Bureau of Investigation’s Arizona InfraGard. Chris is also a Distinguished Fellow of the Ponemon Institute, a globally recognized keynote speaker & cybersecurity thought leader, and is frequently quoted by the media on cybersecurity & privacy topics.
- Sean BradySr. Director, Product Marketing, Arbor Networks
- Jeff DolenceSystems Engineer, Radware
- Emma SutcliffeSenior Director, Data Security Standards, PCI Security Standards Council
Emma Sutcliffe oversees a number of PCI Security Standards, including the PCI DSS and PA-DSS. She chairs the PCI SSC’s Technical Working Group (TWG) and the Tokenization Working Group, where she works closely with the Payment Brands and Affiliate members to develop standards, supporting documentation and guidance papers. Sutcliffe has over 15 years’ information security experience.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - JD RogersCISO, American Financial Group
JD Rogers is the Chief Information Security Officer for American Financial Group, where he leads the IT security vision, strategy and function for the insurance holding company. JD has more than 20 years of information security experience working in the energy, manufacturing, finance and insurance industries. He joined American Financial Group in 2008 as the Director of Information Security for Great American’s Annuity Group, and assumed leadership of this function enterprise-wide in 2013. In this role, he created a cross-company information security group—the first of its kind for the organization. Previously, he held information security positions at Toyota, Duke Energy and Cinergy. Placing a strong focus on security integration into business process and culture, JD serves as a security evangelist to the 36 different business units within American Financial Group, regularly conducting department-wide presentations and one-on-one conversations, as well as presenting at industry conferences such as Black Hat, SecureWorld and the Dayton Defense Conference. JD Rogers holds a Bachelor of Science in computer science from Northern Kentucky University and a Master of Science in information systems from the University of Denver. He also holds numerous designations, including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), and GIAC Certified ISO-27000 Specialist (G2700).
- Amy ZimmermanSenior Communications Manager, American Financial Group
- Jack GreinerPartner, Graydon Head
Jack Greiner is a commercial litigator who has is heavily involved in the areas of data privacy, Information Law, and social media. His peers selected him for inclusion in The Best Lawyers in America for his work in Commercial Litigation, Litigation-Banking and Finance, Litigation-First Amendment, and Litigation-Intellectual Property from 2005 to 2006.
- Sue HornAudit Senior Manager - IT Assurance, Crowe Horwath LLP
Sue is a Senior Manager in the IT Assurance Group within the Audit practice of Crowe Horwath, LLP with over 12 years of experience. Sue specializes in IT Assurance services such as support for all areas of computer based controls evaluated as part of Crowe’s financial audits, Service Organization Controls (SOC) attestation reports, and HITRUST certifications for various industries. Sue has been involved in the creation of the methodology used to perform SOC examinations and HITRUST certified assessments at Crowe and is a thought leader in regard to SOC reporting. Her clients include information technology services, financial services, insurance, healthcare, and manufacturing organizations.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes