Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, October 18, 20177:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 9:15 amLocation / Room: Spring GladeModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amSecureWorld PLUS Part 1 – Big Data and IoT: Wonderful, Terrible, InevitableSecureWorld PLUS Registrants ONLYPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: HillhavenBig Data and the Internet of Things are revolutionizing virtually every industry. We’re told of pinpoint accurate medical records and diagnostics, all-encompassing analytics, mastery of industrial processes, effortless control of our static and moving environments and complete connectivity and communication with anything and everything we might ever imagine being useful. Wonderful!
But SecureWorld attendees and others who’ve been in IT Security for any appreciable time have an internal red flag that goes up upon hearing “It’s gonna be great!” Then those euphoria-deflating security questions start multiplying and running through our somewhat addled brains. Where is all this Big Data coming from? Where will it reside? Who controls it? Who grants access? On what basis? How do we know it’s accurate, relevant? Is it complete enough for life and death medical decisions? What about analytics system administration; data monitoring and correction procedures; incompatible security architectures? Oh yeah, and privacy?
What kind of security is built into all these Internet-connected devices? How easy is it to control access? Is the data they trade and store encrypted? Who’s liable if they fail or give erroneous signals?
Big Data and IoT are neither fads nor merely trends, they constitute a revolution. There’s no going back. Join us as we look from a security perspective at both the bright and dark sides.
8:00 am[SecureWorld PLUS] Part 1 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkEarn 16 CPEs With This in-Depth 3-Part CourseSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: WindhavenThe University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
8:30 amEncrypting the Human MindESD Tech Analyst, Army Corp of Engineers - ACE-ITRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: FairviewThe human mind is the weakest link in cyber space. We will show what to look for to be safe online.
8:30 amBlockchain + IoT = <3Co-Founder, Oaken InnovationsRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Northbrook IIBlockchain technology is very young and often times overhyped. In this talk we will cut through the hype and explore the use of blockchain technology to secure IoT devices. No previous understanding of blockchain technology is required to attend.
8:30 amShifting from “Incident” to “Continuous” ResponseDevOps Revolutionary - Information Security, State FarmRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Northbrook IThe core of the next-generation security protection process will be continuous, pervasive monitoring and visibility that is constantly analyzed for indications of compromise. Security Monitoring will encompass as many layers of the IT stack as possible including network activity, endpoints, system interactions, application transactions and user activity
My presentation will provide several security related scenarios where centralized security data analytics and adaptive security architecture are used to respond in a dynamic way to enable this next generation security protection. The design and benefit of joining the foundational elements of intelligence, context, and correlation with an adaptive architecture will be discussed. I will look behind the curtain of “marketecture” to the real and aspirational solutions for the SOC that will likely materialize as vendor products mature over the next few years.9:00 amExhibitor Hall openRegistration Level:Open Sessions
9:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:30 amOPENING KEYNOTE: The Internet of Threats - A Look at Macro Trends in Technology and the Ever Expanding Cyber Threat LandscapeFUD is back, can you pitch it correctly?CISO, CignaRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council LUNCH RoundTable: (VIP / Invite Only)Topic: Prioritization of Top 20 Critical Security ControlsRegistration Level:VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: Spring GladeThis session is for our Advisory Council members only.
11:15 amGDPR Compliance: Key Issues and Practical GuidanceAttorney, Law Office of Katherine BrittonRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Northbrook IIThe General Data Protection Regulation (GDPR) is a uniform data security law becomes effective in May 25, 2018, as the primary law regulating how companies that store or process an EU citizens’ personal data must protect that data. It applies to businesses in the EU and all businesses marketing services or goods to EU citizens regardless of their geographic location. The GDPR provides a baseline set of standards for companies that handle EU citizens’ data to better safeguard how EU citizens’ personal data is processed and transferred. Penalties for non-compliance can be up to 4% of the violating company’s global annual revenue depending on the nature of the violation.
The GDPR contains 11 chapters and 91 articles that:
• give data subjects more control over personal data that is processed automatically.
• require data breach notification to a government enforcer within 72 hours of learning of the breach and must provide certain specific details of the breach and requires data controllers to notify data subjects as quickly as possible of breaches when the breaches place their rights and freedoms at high risk.
• require companies to perform Data Protection Impact Assessments to identify risks to consumer data and Data Protection Compliance Reviews to ensure those risks are addressed.
• require most all companies to appoint a data protection officer to advise about GDPR compliance and act as a point of contact.Those data protection officers have certain reporting responsibilities as outlined in the GDPR. US regulators have looked to European privacy laws in their own enforcement and legislative actions. As geographic boundaries where companies do business and where customers access products and services, it is important to be aware of the GDPR’s requirements. Where the GDPR does apply, it is crucial for companies to comply in order to avoid potentially devastating fines.
11:15 amTrend Micro: The Trends Within the Cyber Threat Landscape in 1H 2016Director, Global Threat Communications, Trend MicroRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: SunnyslopeThe evolution of the TTP’s or Tactics, Techniques and Procedures in cybercrime in the 1H of 2016 based on threat intelligence derived from Trend Micro’s global Smart Protection Network™ with focus on ransomware and other key threats.
11:15 amRepresenting Cyber MaturityFinding an easy way to represent your program to the board.Sr. Information Systems Auditor, Parkland HealthCISO, Texas Scottish Rite Hospital for ChildrenRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Northbrook IEvery organization has a unique way of representing their cyber security maturity. In this informative session, we will be covering a variety of topics including risk management, the full spectrum of security considerations, and 2 different approaches you can use to represent a maturing security program. Join Michael R. Smith and James Carpenter as they present two different views on how to evaluate whether an Information Security Department is maturing.
11:15 am[Radware] Cybersecurity Pushed to the LimitSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: FairviewThroughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the U.S. presidential election, worldwide malware outbreaks and the Equifax data breach. These and other high-profile events spurred greater cyber-defense investment by everyone from nation states and global corporations to individuals purchasing anti-malware solutions for personal devices. Yet even as investments increase so do threats, hacks and vulnerabilities. This session will help you understand these complex and challenging dynamics. Based on findings from Radware’s research and a global industry survey, the session will show real attack data and customer stories to paint a picture of where we are and what security professionals can do.
Join the session to learn more about:
• The threat landscape deep dive—the who, what and why of attacks
• Potential impact on your business, including associated costs of different cyber-attacks
• Critical attacks in the midst: DNS, IoT and risks lurking in the cloud
• Emerging threats and how to protect against them
• A look ahead – predictions and what to prepare for12:00 pmAdvisory Council LUNCH Round Table - (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: Spring Glade12:15 pmLUNCH KEYNOTE: The Legal Case for CybersecurityCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote TheaterShawn Tuma will explain why cybersecurity is a legal issue and overall business risk issue that companies must manage. He will address why federal, state, and international law (including the GDPR and NY Cyber Regs) requires companies to have a cyber risk management program and key components to include.
1:15 pmPanel: Stopping the Attacks (Incident Response)Registration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: WindhavenSecurity teams are struggling to keep up with the myriad of attack vectors that exist. Future InfoSec professionals will take a more adversarial approach to incident response. Will we have artificial intelligence helping threat hunters squash attacks before they can do any significant damage on the network while alerting the authorities in real time? Can a true partnership form between organizations and law enforcement to share information? Join our experts as they discuss challenges modern security teams face and how we can build a better plan for tomorrow.
Panelists:
Rick Miles, Red Seal
Tommy Hui, SentinelOne
Ron Winward, Radware
Marcelo Brunner, CloverIT
Moderator: Dion McBride1:15 pmPanel: What Will They Think of Next? (Emerging Threats)Registration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterIt would seem the more we “build a better mousetrap” the better the threats become. Will machine learning and AI be used against us in the future? Will these and other innovations be hacked and used for gain? Will the Crime as a Business platform take off where business competitors are utilizing these attacks for the upper hand? Perhaps the cars that are being hacked will evolve into driverless vehicles that are hacking companies from inside there own parking lots. What about drones? So many questions, let’s see what our experts say on this panel.
Panelists:
Kristi Thiele, Ixia
Bryan Lares, Sparkcognition
John Macintosh, Comodo
Paul Trulove, SailPoint
Steve Shalita, Pluribus Networks
Moderator: JP Hill, (ISC)22:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
3:00 pmYour First and Last Line of Defense!Sr. Security Architect, CDWRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: SunnyslopeEasy to remember actions that they can implement in their environment today, use my presentation as a template to create your own Security Awareness. Educate attendees about their home / private cyber lives today. Security Awareness has become the number one action in many companies that pays the most dividends in your network, do you have one?
3:00 pmInternet of Bio-Nano Things: Using the In Vivo Biochemical & Connecting to the Electrical of the Human InternetOwner, GCE, LLCRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Northbrook IThe Internet of Things has become a topic of concern over the past few years: the interconnection of devices have brought to life the Internet in a manner seldom conceived in science and is looking to broaden its expansive nature. Enter nano-robotics with an extension of IoT called the Internet of Bio-NanoRobotic Things: linking human physiology and human vulnerability to the internet. How do we secure what we do not understand?
3:00 pmDarktrace: AI for Cyber DefenseAI for Cyber Defense: That Machine Fights BackAccount Executive, DarktraceRegistration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Northbrook IIFrom insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
In this session, learn:
• How new machine learning and mathematics are automating advanced cyber defense
• Why 100% network visibility allows you to detect threats as they happen, or before they happen
• How smart prioritization and visualization of threats allows for better resource allocation and lower risk
• Real-world examples of unknown threats detected by ‘immune system’ technology3:00 pmCryptography: What You Don't Know, and How it Can Hurt YouComputer Scientist, Northcentral UniversityRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: FairviewThere are gaps in most security professionals knowledge of cryptography, and these lead to significant security issues. This presentation is about filling those gaps.
3:00 pmSecureWorld PLUS Part 2 – Big Data and IoT: Wonderful, Terrible, InevitableSecureWorld PLUS Registrants ONLYPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: HillhavenBig Data and the Internet of Things are revolutionizing virtually every industry. We’re told of pinpoint accurate medical records and diagnostics, all-encompassing analytics, mastery of industrial processes, effortless control of our static and moving environments and complete connectivity and communication with anything and everything we might ever imagine being useful. Wonderful!
But SecureWorld attendees and others who’ve been in IT Security for any appreciable time have an internal red flag that goes up upon hearing “It’s gonna be great!” Then those euphoria-deflating security questions start multiplying and running through our somewhat addled brains. Where is all this Big Data coming from? Where will it reside? Who controls it? Who grants access? On what basis? How do we know it’s accurate, relevant? Is it complete enough for life and death medical decisions? What about analytics system administration; data monitoring and correction procedures; incompatible security architectures? Oh yeah, and privacy?
What kind of security is built into all these Internet-connected devices? How easy is it to control access? Is the data they trade and store encrypted? Who’s liable if they fail or give erroneous signals?
Big Data and IoT are neither fads nor merely trends, they constitute a revolution. There’s no going back. Join us as we look from a security perspective at both the bright and dark sides.
3:00 pm[SecureWorld PLUS] Part 2 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkSecureWorld PLUS Registrants ONLYSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: WindhavenThe University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
3:45 pmCasino Happy HourNetworking, Games, Prizes, Drinks, and SnacksRegistration Level:Open Sessions
3:45 pm - 5:30 pmLocation / Room: Exhibitor FloorJoin your peers at 3:45 p.m. in the Exhibit Hall for beverages and snacks. Test your luck at Blackjack, Roulette, and Craps. Hand the voucher you receive at registration to one of the participating exhibitors to get started with $1,000 and win big for your chance at some cool prizes!
Thank You Sponsors:
Mimecast: Happy Hour Sponsor
Cobalt: Black Jack Table
ISSA North Texas: Poker Table
SpearTip: Craps Table
Corelight: Roulette Table - Thursday, October 19, 20177:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amSecureWorld PLUS Part 3 – Big Data and IoT: Wonderful, Terrible, InevitableSecureWorld PLUS Registrants ONLYPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: HillhavenBig Data and the Internet of Things are revolutionizing virtually every industry. We’re told of pinpoint accurate medical records and diagnostics, all-encompassing analytics, mastery of industrial processes, effortless control of our static and moving environments and complete connectivity and communication with anything and everything we might ever imagine being useful. Wonderful!
But SecureWorld attendees and others who’ve been in IT Security for any appreciable time have an internal red flag that goes up upon hearing “It’s gonna be great!” Then those euphoria-deflating security questions start multiplying and running through our somewhat addled brains. Where is all this Big Data coming from? Where will it reside? Who controls it? Who grants access? On what basis? How do we know it’s accurate, relevant? Is it complete enough for life and death medical decisions? What about analytics system administration; data monitoring and correction procedures; incompatible security architectures? Oh yeah, and privacy?
What kind of security is built into all these Internet-connected devices? How easy is it to control access? Is the data they trade and store encrypted? Who’s liable if they fail or give erroneous signals?
Big Data and IoT are neither fads nor merely trends, they constitute a revolution. There’s no going back. Join us as we look from a security perspective at both the bright and dark sides.
8:00 am[SecureWorld PLUS] Part 3 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkSecureWorld PLUS Registrants ONLYSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: WindhavenThe University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
8:00 amInfraGard Chapter Meeting and Presentation - Open to all AttendeesTopic: When Does a Data Theft Incident Qualify as a Reportable Data Breach?Special Agent, Federal Bureau of InvestigationRegistration Level:Open Sessions
8:00 am - 9:15 amLocation / Room: Keynote TheaterJoin InfraGard for their chapter meeting and guest presentation. This opportunity is open to all attendees.
Presentation:
Upon discovering that a data theft incident has occurred, a significant question arises: Is there an obligation to report the data theft incident, to victims and authorities, as a data breach? The “encryption exception” that is within the GDPR and many US laws indicates that if the data was encrypted when stolen, there has not been a breach and so reporting is not required. This presentation will provide an alternative view: for example, seven different ways that encrypted data may be compromised will be presented. Only by eliminating all seven as possibilities, should you rely on the “encryption exception.”
Presentation Level:
GENERAL (InfoSec best practices, trends, solutions, etc.)8:30 amCybersecurity Crisis Management: A Prep GuideUnderstanding why crisis management is different from incident responseVP & CISO, Neiman MarcusRegistration Level:Conference Pass
8:30 am - 9:15 pmLocation / Room: Northbrook IData breaches are inevitable. A company’s survival could depend on the way it reacts and responds to a data breach. Cybersecurity crisis management goes beyond the nuances of day to day incident response and addresses the very specific elements that a company needs to implement in order to effectively survive a breach.
8:30 amData Breach Digest – Perspective is RealityDigital Forensics Investigator , Verizon RISK TeamRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: FairviewData breaches are complex affairs. Response activities are proportionately complex involving various stakeholders with slightly different perspective. This presentation covers the 2017 “Data Breach Digest – Perspective is Reality”; a compendium of data breach scenarios told from different stakeholder points of view covering their decisions, actions and crucial lessons learned.
9:00 amExhibitor Hall openRegistration Level:Open Sessions
9:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:30 amOPENING KEYNOTE: Defending the Nation in Cyber SpaceFormer Director of Operations at U.S. Cyber CommandMajor General, U.S. Air Force (Retired)Registration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote TheaterThe Russians hacked the election, the Chinese are stealing our trade secrets, the Iranians and North Koreans see cyber as the ultimate asymmetric attack vector against the United States. Every day, the country’s critical infrastructure is under attack—financial services, the electric grid, oil and gas, telecommunications, transportation. As the former Director of Operations at U.S. Cyber Command, Maj Gen (Ret) Brett Williams is one of the few speakers available who can talk with the credibility that comes from being on the front lines of defending the Nation in cyberspace. General Williams unique combination of both military and private sector experience, provides a clear understanding of the nation-state cyber threat and how it could impact business interests in every sector.
10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council Round Table: (VIP / INVITE ONLY)Topic: Privacy Versus Security (CCPA, GDPR, DevOpsSec)Registration Level:VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: Spring Glade11:15 amThe World at Cyber War!CTO / CISO, Colliers GroupRegistration Level:Conference Pass
11:15 am - 12:15 pmLocation / Room: FairviewWe are blinded and handcuffed to the truth of our current cyber war and how it affects us every day. As long as we are constantly reacting to threats both personally and for our business, we are like the man brow sweating and running mad to keep all of his plates spinning in the air without dropping one.
The only question you should ask yourself is…Not If, but when, you will prepare for your enemies? Where is your data?11:15 amEmerging Trends in SecuritySecurity Manager, FujitsuRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Northbrook ICome hear and participate in discussion around new trends in security, threats, mitigations, and real
world approaches to addressing the operational and security needs of your organization.11:15 amMimecast: Email Security and the Importance of Cyber-ResiliencySr. Solutions Engineer, North America, MimecastRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Northbrook IIThe concept of cyber-resiliency and how it relates to the #1 attack vector for organizations.
11:15 amInformation Security PlansCounsel, Elkins PLC; Associate Fellow, Kings College, University of LondonRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Sunny SlopeThe presentation examines the need for policies, objectives, controls, processes and procedures to help companies manage the risk, threats, and vulnerabilities that can cause loss as a result of a cyber breach or loss of confidential/proprietary information. It examines organizational responsibilities, key steps in forging and executing an Information Security Plan, and what you can do to better protect yourself from loss.
12:00 pmAdvisory Council LUNCH Round Table - (VIP / Invite Only)Topic: Zero Trust, What’s the Big Deal?Registration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: Spring Glade12:15 pmLUNCH KEYNOTE: Surviving the Siege: Medieval Lessons in Modern SecurityDiscover the 2017 SecureWorld ThemePresident, CISSP, O'Leary Management EducationRegistration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote TheaterWarfare and the arts of intrusion have advanced considerably since the Middle Ages, but in many ways the principles of fortification we use today remain the same. The great castles of antiquity were ingeniously designed with multiple layers of physical security to protect their inhabitants from persistent, even advanced enemy threats. Their carefully planned and creative defensive measures provide rich metaphors, both positive and negative, for today’s cyber guardians. On the other hand, clever, daring, sometimes brilliant offensive strategies and tactics have historically breached battlements thought to be unassailable. Come join us as we examine lessons that can be applied to securing our own sophisticated digital fortresses.
1:15 pmSecurity Vs CompliancePresident , (ISC)2 Dallas/Fort Worth ChapterRegistration Level:Conference Pass
1:15 pm - 2:15 pmLocation / Room: Windhaven1:15 pmPanel: Phishing and other Social Engineering ScamsRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterPhishing continues to be the #1 attack vector for the bad guys. Why? Simply put: it works. These attacks keep getting more realistic and sophisticated. In the future we should expect nothing less. Criminals will do more homework on their potential victims and possible pose as business leads or clients to gain our trust. What sales person doesn’t want email from a potential client who wants a new solution? Or they may just lay in wait until they’ve collected enough information to strike. Will they actually come to your business and drop thumb drives like pen testers do? Use drones to do their dirty work? Our experts will discuss the current state of affairs and brainstorm possible new scenarios.
Panelists:
Jason Robohm, Thales
Caspian Kilkelly, Rapid7
Luis Rodriguez, Mimecast
Brent Chapman, RoundPoint Mortgage
Duaine Styles, Torchmarkcorp
Moderator: Chris Mears2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
2:30 pmDash for Prizes & CyberHuntRegistration Level:Open Sessions
2:30 pm - 2:45 pmLocation / Room: SecureWorld Exhibitor FloorBe sure to have exhibitors scan your badge for a chance to win prizes. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win
3:00 pmData Privacy for Information Security ProfessionalsChanging Our Old Compliance MethodsConsulting Director, PS InnovationsRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Northbrook IJust as we are getting IoT, cloud computing, SOX/HIPAA/FISMA etc. under our belts, Europe changed the rules. The General Data Protection Regulation (GDPR) may just change the way we look at “compliance” once and for all. This isn’t just another regulation. We’re going to need to make a fundamental change in the way we think about data to get past this newest challenge.
3:00 pmDay in the Life of a Security ArchitectLead Security Architect, DXC TechnologyRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: FairviewThis presentation will be engaging for technical & not-so-technical audiences, as I explain career progressions from IT Analyst, to software consultant, to lead security architect, & my experience designing security solutions for businesses & governments. I’ll gladly answer questions & share my advice for upcoming security professionals.
3:00 pmCyber Threats – Are You Mitigating Your Most Vulnerable Risk?VP, Information Security, Financial InstitutionRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Sunny SlopeThe human factor – what are you doing to mitigate your most vulnerable cyber security risk?
- NETSCOUT ArborBooth: 710
For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.
- Bay Pay ForumBooth: n/a
The BayPay Forum, a Silicon Valley-based international network composed of over 14,000 payment and commerce executives, entrepreneurs and investors from thousands of different companies, serves as a forum to connect members in identifying and understanding the emerging trends and innovations in the industry.
- Binary DefenseBooth: 340
Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.
- CIOReviewBooth: n/a
CIOReview is a technology magazine that talks about the enterprise solutions that can redefine the business goals of enterprises tomorrow. It is the leading source that shares innovative enterprise solutions developed by established solutions providers, upcoming hot enterprises and is a neutral source for technology decision makers. Published from Fremont, California, CIOReview is an excellent platform for the enterprise to showcase their innovative solutions.
- Cloud Security Alliance (CSA)Booth: 420
The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
- Critical StartBooth: 600
Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.
- DarktraceBooth: 840
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.
- Delta RiskBooth: 810
Delta Risk is breaking the mold for managed security, delivering Security Operations Center (SOC)-as-a-Service and security services that bridge the gap to a modern security approach. We enable any size organization to leverage our expert security operations team and respond to endpoint, network, and cloud security threats 24×7. ActiveEye, our proprietary platform, uses Security Orchestration Automation and Response (SOAR) to cut through the noise and address the most critical threats faster. The ActiveEye Portal is the cornerstone of our customer-centric approach, providing clients a transparent view into SOC activities and Key Performance Indicators (KPIs) that demonstrate the value of our co-managed security approach.
- DirectDefenseBooth: 610
Founded in 2011, DirectDefense offers security services that are unmatched within the industry. Our core strength is our deep experience in performing assessments for a wide array of networks, platforms, and applications. Our seasoned consultants are focused on providing world-class security services to our clients.
Regardless of industry – financial, insurance, retail, hospitality, healthcare, education, gaming, technology, or energy and utilities, our wealth of knowledge and experience can assist you in achieving your security testing and strategy goals.
- EC-CouncilBooth: n/a
International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.
- ExtraHopBooth: 650
ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com
- FireMonBooth: 410
FireMon is the only agile network security policy platform for hybrid cloud enterprises. FireMon delivers persistent network security for multi-cloud environments through a powerful fusion of real-time asset visibility, compliance and automation. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers located in nearly 70 countries around the world. For more information, visit www.firemon.com.
- HOPZEROBooth: 200
Firewalls control access, HOPZERO controls distance. Learn how newly patented technology automates setting of “packet toll value” controlling distance data may travel across networks. We keep sensitive database information inside the data center so hackers can’t get a login prompt – even when firewalls fail.
- InfraGardBooth: 310
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- IronNetBooth: 460
IronNet is a Cybersecurity / Behavior Analytics Product and Cyber Services company started by former NSA Director Keith Alexander (retired 4-star General). IronDefense, our behavior analytics system, brings real-time visibility and cutting edge analytics to customer networks to discover the most elusive threats, then ranks them by risk through an expert system to amplify analyst capabilities.
- ISC2Booth: 330
ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, ISC2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation, The Center for Cyber Safety and Education™.
- North Texas ISSABooth: 440
The Dallas/Fort Worth area has many large corporations, government organizations, and educational institutions. Our membership comes from the network and information systems professionals of these organizations and institutions, as well as vendors of security products. We seek to provide our members with access to information and resources to assist their employers in securing critical information resources. Our monthly luncheon meetings, conferences, and other resources are available to members and non-members alike to assist in educating security practitioners of all types.
- Ixia, a Keysight BusinessBooth: 300
We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.
- JuniperBooth: 510
Our customers don’t set out to build networks. They build on ideas that reinvent, reimagine, and improve the world around them. It makes sense that we should begin there, too.
Through our passion for creating high-performing networks, Juniper extends knowledge, collaboration, and human advancement in industries around the world—such as energy, healthcare, education, and many others.
While our innovative product and services portfolio evolves continuously, we need to reach farther to secure our customers’ long-term success. We’re looking beyond the horizons of today’s business challenges, and the technology future we see is built on real-time service integration. That means everything we develop must align with our vision.
- KasperskyBooth: 318
We’re an independent global cybersecurity company that empowers people to make the most of technology and the endless opportunities it brings. Backed by our deep threat intelligence, security and training expertise, we give businesses the power to stay safe—and the confidence to accelerate their own success. With insights gained from our unique international reach, we secure consumers, governments and more than 270,000 organizations. We’re proud to be the world’s most tested and awarded cybersecurity, and we look forward to keeping your business safe. Bring on the future.
- LockpathBooth: 630
Lockpath is a software company bringing order to the chaos of managing risk. From SMB to enterprise, our risk management platforms flex and scale to existing processes enabling customers a straightforward approach to identify, understand, manage and report on risk.
- LogRhythmBooth: 150
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
- MimecastBooth: 850
Mimecast empowers our customers to help mitigate risk and manage complexities across a threat landscape driven by cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.
- ProofpointBooth: 540
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- RadwareBooth: 400
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- Rapid7Booth: 130
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- ReblazeBooth: TBD
A comprehensive, cloud-based protective shield for web platforms. Reblaze offers an all-in-one virtual private cloud solution (VPC) that includes DDoS protection, WAF, IPS, bot detection and anti-scraping solutions, and more. Using a unique approach, Reblaze protects its customers’ sites, web apps, and services by monitoring and cleansing incoming traffic before it reaches the protected data centers. Bandwidth and other resources auto-scale as needed. The platform is fully managed, always up-to-date, and provided via a SaaS monthly subscription. Reblaze is available on a try-before-you-buy basis, and can easily work with existing security solutions.
- SAINT CorporationBooth: 140
SAINT Corporation offers integrated vulnerability assessment, penetration testing, and security checklist compliance. Examine your network with the SAINT® vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with the SAINTexploit® penetration testing tool and exploit the vulnerability to prove its existence.
- Secure Data SolutionsBooth: 540
Secure Data Solutions is a Texas based Security Partner providing comprehensive results to our clients and giving them confidence in their security strategy. Using fundamental and leading-edge security technologies, Secure Data Solutions delivers expertise and visibility in all aspects of Network and Cyber-Security.
- Skybox SecurityBooth: 830
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
- SomansaBooth: 820
Somansa is a global leader in Data Loss Prevention security to protect sensitive data from leakage. Somansa provides its worldwide customers in financial services, healthcare, government with a total DLP solution to Monitor, Prevent, and Discover sensitive data in the Network, Emails, Cloud Storage and Endpoints, USB’s, and Printing.
- SparkCognitionBooth: 450
SparkCognition is a global leader in cognitive computing analytics. A highly awarded company recognized for cutting-edge technology, SparkCognition is successfully deploying a cognitive, data-driven analytics platform for clouds, devices, and the Internet of Things industrial and security markets by applying patented algorithms that deliver out-of-band, symptom-sensitive analytics, insights, and security. For more information on the company, its technology and team, please visit http://www.sparkcognition.com.
- SynopsysBooth: 210
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThalesBooth: 120
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- Trend MicroBooth: 640
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- TrustedSecBooth: 340
TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.
- UnisysBooth: 150
Unisys is a global information technology company that specializes in providing industry-focused solutions integrated with leading-edge security to clients in diverse markets. Unisys combines experienced security consulting, Stealth micro-segmentation security solutions and efficient managed security services to deliver dramatic improvement in security posture and operational efficiencies.
Visit http://unisys.com/security for more information. - VenafiBooth: 100
Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.
With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms; four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.
For more information, visit: www.venafi.com.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Robert HergenroederESD Tech Analyst, Army Corp of Engineers - ACE-IT
Hugh cyber security buff. Worked in Computer IT over the past 10 years and would like to do my part training people in online safety.
- Hudson JamesonCo-Founder, Oaken Innovations
Hudson Jameson is a blockchain enthusiast and smart contract developer exploring the intersection of decentralized technologies and security. He is the co-founder at Oaken Innovations, an IoT blockchain start-up that builds identity and security solutions to smart cities and IoT devices.
- Moderator--Bill WhiteDevOps Revolutionary - Information Security, State Farm
Bill is an Information Security professional with 30 years’ experience in IT, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for Information Security architectural at a Fortune 50 company. He started as a bench technician while learning his way up to Information Security Management. Bill is a Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA) and Certified in Risk and Information Systems Controls (CRISC) and a GIAC Certified Python Coder. (GPYC).
- James BeesonCISO, Cigna
James has over 28 years of experience in cyber security and technology. He has 17 years of direct experience as an information security leader and is currently the Chief Information Security Officer at Cigna, a global health insurance company. James previously worked 20 years for General Electric in various security and technology leadership positions.
James was an Evanta 2016 Breakaway Leadership Award finalist and a T.E.N. ISE North America Executive Award finalist in 2011.
He has Co-Chaired the CISO Executive Summit in Dallas for the past eight years, and participates as a keynote speaker at various events across the globe.
James also works closely with the SINET, the Security Innovation Network, to promote public and private sector collaboration and increase the awareness of innovative emerging companies.
James is actively involved in FS-ISAC (Financial Services – Information Sharing and Analysis Center), ISSA (Information Systems Security Association), and ISACA (Information Systems Audit and Control Association), which work to drive standards, improvements, and networking in security and risk management globally.
He has an MBA from Southern Methodist University and a BBA in Management and Leadership.
He is a Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), and Six Sigma Quality certified.
- Katherine BrittonAttorney, Law Office of Katherine Britton
Katherine Elvira Britton is an attorney with a broad range of experience in regulatory compliance, corporate training and presentation and focuses her law practice on privacy and data security law, complex civil litigation, employment and human resources counseling, and consumer protection. Katherine advises clients and trains management and employees on compliance with federal and state privacy and data security laws, best practices, and self-regulatory programs, specifically focusing on issues involving emerging technologies. She evaluates clients’ compliance with federal, state, and self-regulatory requirements relating to the storage, transfer, sharing, and disposal of customer personal information. Katherine reviews, drafts, and negotiates vendor/supplier contracts, technology transactions, services and consulting agreements, and licensing agreements. Additionally, she drafts privacy policies, social media policies, and terms of use agreements for websites and applications tailored to clients’ business practices and implements changes to existing policies to address current and future data collection and use. Katherine earned her J.D. in 2007 from The John Marshall Law School, where she was an editor for The John Marshall Review of Intellectual Property Law, and her B.A. in 2004 from Tulane University. Katherine is a Certified Information Privacy Professional, Certified Privacy Manager, and is admitted to the bars in Illinois, the District of Columbia, and Texas.
- Jon ClayDirector, Global Threat Communications, Trend Micro
Jon Clay has worked in the cybersecurity space for over 21 years. He is responsible for managing marketing messages and external publication of all the threat research and intelligence within Trend Micro as well as different core technologies. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats. Jon is also a volunteer speaker for the Trend Micro Internet Safety for Kids and Families program.
- Michael R. SmithSr. Information Systems Auditor, Parkland Health
Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.
Industry Certifications, Licensure, & Training
Certified Information Security Specialist (CISSP)
Certified Internal Auditor (CIA)
Project Management Professional (PMP)
Certified Fraud Examiner (CFE)
Certified Information Systems Auditor (CISA)
Information Library Information Technology (ITIL) - James CarpenterCISO, Texas Scottish Rite Hospital for Children
James Carpenter is a Healthcare Information Technology & Security Professional with 20 years of IT leadership experience. James is currently the Director of Information Technology & Security for Texas Scottish Rite Hospital for Children in Dallas, Texas. Over the course of his career James has created and led healthcare information security teams and helped organizations successfully navigate the complex and ever-changing landscape of security and technology. James has been responsible for strategic design of information security programs, implementation of key enterprise information security technologies such as DLP, IDM/IAM, eDiscovery, MDM, and the teams and processes that support successful integration. James is a CISSP, CISM, and CISA and holds a Master’s degree in Strategic Leadership from Amberton University.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Shawn E. TumaCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Pedro Serrano, ModeratorSr. Security Architect, CDW
Pedro Serrano has over 35 years of experience managing and installing technical controls in networks around the world, 20 of those in military systems. Previously Pedro was a former CISO, Network Security for an integrated healthcare system as well as Security Architect for major Oil and Gas Exploration company, today he is CDW’s Senior Security Architect. He holds two postgraduates’ degrees one in Telecommunications Management and Computer Science and serves in the Board of Directors of The Information System Security Association (ISSA) chapter in Tulsa, and BSides Oklahoma. He also serves as an advisor to the Latino Leadership Institute and is a graduate from the Leadership Oklahoma program. Pedro holds the CISSP certification from ISC2.
- DrPH Gregory "Junkbond" CarpenterOwner, GCE, LLC
Former NSA/CSS & retired military, owner: GCE, National & Cyber Security contributer - newsl.org, BOD ATNA Systems, International Board of Advisors MacKenzie Institute; radio host, author: Reverse
Deception translated into 4 languages. Frequently on Fox, ABD & SiriusXM; International Keynote Speaker. Recipient of NSA Military Performer of the Year Award. - Andrew GyenisAccount Executive, Darktrace
Andrew Gyenis is a Cybersecurity Account Executive at Darktrace, the world's leading machine learning company for cyber defense. He has worked extensively with clients across the numerous industry verticals, from Fortune 500 energy companies to the federal government, helping them deploy Darktrace's Enterprise Immune System, the only AI technology capabale of detecting and autonomously responding to early-stage cyber threats. Gyenis graduated with a bachelor's degree from Stanford University and is based out of Darktrace's Washington D.C. office.
- Chuck EasttomComputer Scientist, Northcentral University
Dr. Easttom is the author of 26 computer science books and over 40 research papers, as well as an inventor with 14 patents. He is a frequent speaker at computer science and security conferences, and is a Distinguished Speaker of the ACM (Association of Computing Machinery). He holds a Doctor of Science in cyber security and three masters degrees.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John C. PowersSpecial Agent, Federal Bureau of Investigation
FBI Agent in the Counter Intelligence and Insider Threat group.
- Moderator Shamoun Siddiqui, PhDVP & CISO, Neiman Marcus
Dr. Shamoun Siddiqui is currently the Vice president and Chief Information Security Officer at the Neiman Marcus Group of companies located in Dallas, Texas. has been a leader in the information security space for over 15 years. He possesses a Bachelor’s and a Master’s degree in Mechanical Engineering and a Doctorate in Aerospace Engineering from the University of Texas at Austin. His recent employments include well-known companies like Nationstar/Mr. Cooper Mortgage, Sabre, CVS and Hitachi.
- Darren WindhamDigital Forensics Investigator , Verizon RISK Team
Darren is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Darren responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures.
- Brett WilliamsMajor General, U.S. Air Force (Retired)
Major General (Ret) Brett Williams co-founded IronNet Cybersecurity and is the President of the Operations, Training and Security Division. Providing strategic vision and the foundational security platform solutions for IronNet, General Williams also serves as the Chief Security Officer responsible for product, enterprise and physical security. His division provides security analytics, hunt operations, and threat analysis and intelligence support for the IronNet Cyber Operations Center, as well as product training and support for client operations centers.
A highly experienced combat fighter pilot, General Williams held several significant command positions during his 33-year career with the U.S. Air Force. As Director of Operations for U.S. Cyber Command, General Williams was the architect of DoD's operational approach to cyberspace operations. He was responsible for the operations and defense of DoD networks, and offensive cyberspace operations in support of U.S. strategic objectives. General Williams also served as Director of Operations (A30) at the Pentagon, leading more than 1,300 Airmen and civilians stationed worldwide; and as Director of Communications, Command and Control for U.S Pacific Command.
As an authority on cybersecurity, General Williams has appeared on NBC's Meet the Press with Chuck Todd, ABC's This Week with George Stephanopoulos and MSNBC's The Last Word with Lawrence O'Donnell. In addition, he conducts cyber-risk training seminars for corporate boards as a faculty member of the National Association of Corporate Directors. He earned a BS in Computer Science from Duke University and three additional graduate degrees in management and national security studies.
- Robin AustinCTO / CISO, Colliers Group
As a CTO/CISO, Robin is responsible for overseeing all technical aspects of the company including Cyber Security, Risk and Compliance. Using an active and practical approach, Robin oversees all employees in IT, IO and OT departments to attain the company's strategic goals established in the company's digital strategic plan. Robin has also built several successful technology companies like Cyber Defense Resources providing additional lines of revenue for the company. As a critical thinker and Technology Evangelist, Robin publishes articles and books on disruptive technology in AI/ML and cryptography and acts as Fortune 1000 C-Suite Executives Trusted Advisor.
- Shaun DrutarSecurity Manager, Fujitsu
A leading security practitioner with over 18 year of experience in cybersecurity, forensics, and incident
response. Shaun leads security practice and persuits for a global technology organization. - T.J. AdamowiczSr. Solutions Engineer, North America, Mimecast
An IT professional for over 15 years with more than half of that time dedicated to email, T.J. has worked in the university and financial sectors before coming to Mimecast, where he engages with many organizations in protecting against email-borne threats.
- James FarwellCounsel, Elkins PLC; Associate Fellow, Kings College, University of London
James counsels clients in the areas of Cybersecurity and Privacy Protection. He has a CIPP/US certification from the International Association of Privacy Professionals. James advised the U.S. Department of Defense and U.S. Special Operations Command on cybersecurity and strategic communication. He served as consultant to the U.S. Department of Defense. Non-resident Senior Fellow, Middle East Institute, Washington, D.C.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Dione McBride, CISSP, CIPP/EConsulting Director, PS Innovations
Dione McBride is a data protection expert for PS Innovations, who consults, trains, and tutors customers in privacy, information security and operational processes across multiple regulatory standards. Formerly a CISO for a publicly held healthcare organization, her 15 years of information security experience started as a consultant and included operational roles, architecture, software development, customer support and data security for healthcare and high tech companies. She is the author of a technology textbook, trains legal professionals on data protection and regulatory interpretation and attempts to translate geek to business value whenever possible.
- Marco FernandesLead Security Architect, DXC Technology
Born & raised in Dallas, Marco loved cyber security since youth, leading him to become a Security Architect after graduating from UNT. Marco also served as President of the North Texas Cyber Security Association to help upcoming security professionals. Marco’s hobbies include fitness, card games, & marksmanship.
- Jacqueline ScarlettVP, Information Security, Financial Institution
Over 20 years of experience within information technology management and information security applied within operations, cyber training and awareness and enterprise risk assessment and process auditing and partnering with financial services, automotive and legal industries. Proven track record developing, implementing strategies and systems to increase security to defend against cyber attacks.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes