googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 14, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    Executive Advisory Council Breakfast: Benchmarking and Best Practices - (VIP / INVITE ONLY)
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    Location / Room: Lookout
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: 203A
    8:00 am
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: 106
    8:30 am
    Challenges In Our Hyper Connected World - IoT, SCADA and Cyber Physical Risks.
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chair, Undergraduate Information Technology, Capella University
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 105
    8:30 am
    Contracts: A Focus on Security & Related Clauses
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Founder & CEO, Ossian Law P.C.
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Theater
    8:30 am
    Dude, Where's My Car?: The Increasing Hackability of the Vehicle
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Cybersecurity Lab Engineer, Thomas Edison State University
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Suite 3
    8:30 am
    Risk Management, the Basis For Your Security Program
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CISO, Meritor
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 101
    8:30 am
    Social Aftermath - Responding to Social Engineering Incidents
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Deputy CISO, State of Washington
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 pm
    Location / Room: 103
    9:00 pm
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 pm - 3:00 pm
    9:45 am
    OPENING KEYNOTE: The Cost and Consequences of the Insider Threat: What the Latest Ponemon Institute Research Reveals
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chairman and Founder, Ponemon Institute
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:45 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable: Identity is the New Firewall - (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Executive Boardroom
    11:15 am
    Establishing a Quality Vulnerability Management Program Without Wasting Time or Money
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Advisory Manager / Security Researcher, Deloitte
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Suite 3
    11:15 am
    Of Apples and Bears: A Lawyer's Look At InfoSec 2016
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Attorney, Hall, Render, Killian, Heath & Lyman
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 105
    11:15 am
    Protecting Payments with PCI
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Chief Technology Officer, PCI Security Standards Council
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Theater
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 103
    11:15 am
    Trend Micro: The Trends within the Cyber Threat Landscape in 1H 2016
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Global Threat Communications, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 101
    12:00 pm
    Advisory Council Roundtable Lunch: Embracing the Risk - (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Executive Boardroom
    12:15 pm
    LUNCH KEYNOTE: Optiv - Beyond the Security Team: The Economics of Breach Response
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: After The Hack
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Suite 3
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    1:15 pm
    Venafi: Protecting The Foundation of Online Security
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Vice President of Americas Business Development, Venafi
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:00 pm
    Location / Room: 103
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    OpenDNS, Part of Cisco: How to Block Threats Before, During & After an Attack
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Product Management, Qadium
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 103
    3:00 pm
    Panel: Locking Down the Endpoints
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: Suite 3
    3:00 pm
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: 203A
    3:00 pm
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    3:00 pm - 4:30 pm
    Location / Room: 106
    3:00 pm
    You Don't Know Cyber Insurance
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Corporate Vice President, Burns & Wilcox
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: Theater
    3:00 pm
    You Want to Put What in the Cloud? Security Issues to Consider
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Information Security Governance Specialist, Perrigo Company plc
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 101
    3:45 pm
    Optiv & Partners Happy Hour
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:45 pm - 6:00 pm
    Location / Room: The Lookout (Ford Motor Event Center - 2nd Floor)
  • Thursday, September 15, 2016
    7:00 am
    Registration Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    8:00 am
    InfraGard Breakfast Meeting - Members Only
    • session level icon
    speaker photo
    Founder & President, CanBusHack
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 9:15 am
    8:00 am
    SecureWorld Plus: Building a Successful Information Security Awareness Program
    • session level icon
    speaker photo
    CSO, Security Mentor; Former CISO, State of Michigan
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: 203A
    8:00 am
    SecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework
    • session level icon
    speaker photo
    Manager, Cyber and Information Security, Point32Health
    Registration Level:
    • session level iconSecureWorld Plus
    8:00 am - 9:30 am
    Location / Room: 106
    8:30 am
    Cybersecurity: A New Paradigm
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CISO, Forcepoint
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: 103
    8:30 am
    Data Breach Digest - Scenarios from the Field
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Evangelist, Verizon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Suite 3
    8:30 am
    Information Security Governance
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    CISO, Elevations Credit Union
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    8:30 am
    The Essential Elements of a Secure SDLC
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    8:30 am - 9:15 am
    Location / Room: Theater
    9:00 am
    Exhibit Floor Open
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:00 am - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    9:30 am
    OPENING KEYNOTE: The Fourth Amendment and Seizing Cell Phone Location Tracking
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Assistant U.S. Attorney, U.S. Attorney's Office, Eastern District of Michigan
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    10:15 am - 11:15 am
    Location / Room: SecureWorld Exhibit Floor
    11:00 am
    Advisory Council Roundtable: After the Hack - (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    11:00 am - 12:00 pm
    Location / Room: Executive Boardroom
    11:15 am
    Arbor Networks: History has Taught Us Nothing: Why Security Cannot Learn from the Past
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Market Insights Leader, Arbor Networks
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 105
    11:15 am
    Centrify: Half Protected is Half Not – Platform Approach to Securing Enterprise Identities
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    System Engineer, Centrify
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 103
    11:15 am
    Gaining Better Visibility into Risk- The Future of GRC
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Director, Cyber Security & Compliance, People Driven Technology
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: 101
    11:15 am
    Panel: Michigan's CyberPatriot Program
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    ATAG-Installations, DMVA Deputy Director, Commander 46th Military Police Command, Michigan Army National Guard and DMVA
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    11:15 am - 12:00 pm
    Location / Room: Suite 3
    12:00 pm
    Advisory Council Roundtable Lunch: Manage the Damage - (VIP / INVITE ONLY)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Executive Boardroom
    12:00 pm
    ISSA/(ISC)2 Chapter Meeting - Open to All Attendees
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Internal Audit, Risk & Compliance
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Lookout
    12:15 pm
    LUNCH KEYNOTE: Radware The Current Economics of Cyber Attacks
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Emerging Threats
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: You've Got Humans on Your Network
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    1:15 pm - 2:15 pm
    Location / Room: Suite 3
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:15 pm - 3:00 pm
    Location / Room: SecureWorld Exhibit Floor
    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    • session level icon
    • session level icon
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    Critical Security Controls and Business Context: Finding Your Way Through The Woods
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    Treasurer, Motor City ISSA Chapter
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: Theater
    3:00 pm
    Have You Been Breached (How Would You Know?)
    • session level icon
    • session level icon
    • session level icon
    speaker photo
    GRC Consultant, Comp-West, LLC
    Registration Level:
    • session level iconConference Pass
    • session level iconSecureWorld Plus
    • session level iconVIP / Exclusive
    3:00 pm - 3:45 pm
    Location / Room: 105
Exhibitors
  • Detroit, MI 2016
    Booth: 408
  • Detroit, MI 2016
    Booth: 240
  • Detroit, MI 2016
    Booth: 208
  • Detroit, MI 2016
    Booth: 202
  • Detroit, MI 2016
    Booth: 232
  • Detroit, MI 2016
    Booth: 402
  • Detroit, MI 2016
    Booth: 422
  • Detroit, MI 2016
    Booth: 416, 214
  • Detroit, MI 2016
    Booth: 242
  • Detroit, MI 2016
    Booth: 206
  • Detroit, MI 2016
    Booth: 426
  • Detroit, MI 2016
    Booth: TBD
  • Detroit, MI 2016
    Booth: 224
  • Detroit, MI 2016
    Booth: 414
  • Detroit, MI 2016
    Booth: 218
  • Detroit, MI 2016
    Booth: 242
  • Detroit, MI 2016
    Booth: 232
  • Detroit, MI 2016
    Booth: 300
  • Detroit, MI 2016
    Booth: 440
  • Detroit, MI 2016
    Booth: 220
  • Detroit, MI 2016
    Booth: 250
  • Detroit, MI 2016
    Booth: 407
  • Detroit, MI 2016
    Booth: TBD
  • Detroit, MI 2016
    Booth: 258
  • Detroit, MI 2016
    Booth: 256
  • Detroit, MI 2016
    Booth: 308
  • Detroit, MI 2016
    Booth: 412
  • Detroit, MI 2016
    Booth: 436
  • Detroit, MI 2016
    Booth: 312
  • Detroit, MI 2016
    Booth: TBD
  • Detroit, MI 2016
    Booth: 248
  • Detroit, MI 2016
    Booth: 438
  • Detroit, MI 2016
    Booth: 234
  • Detroit, MI 2016
    Booth: 212
  • Detroit, MI 2016
    Booth: 420
  • Detroit, MI 2016
    Booth: 242
  • Detroit, MI 2016
    Booth: 242
  • Detroit, MI 2016
    Booth: 236
  • Detroit, MI 2016
    Booth: 230
  • Detroit, MI 2016
    Booth: 246
  • Detroit, MI 2016
    Booth: 424
  • Detroit, MI 2016
    Booth: 251
  • Detroit, MI 2016
    Booth: 222
  • Detroit, MI 2016
    Booth: 232
  • Detroit, MI 2016
    Booth: TBD
  • Detroit, MI 2016
    Booth: TBD
  • Detroit, MI 2016
    Booth: 210
  • Detroit, MI 2016
    Booth: 401
  • Detroit, MI 2016
    Booth: 202
  • Detroit, MI 2016
    Booth: 442
  • Detroit, MI 2016
    Booth: 400
  • Detroit, MI 2016
    Booth: 226
  • Detroit, MI 2016
    Booth: 244
  • Detroit, MI 2016
    Booth: 248
  • Detroit, MI 2016
    Booth: TBD
  • Detroit, MI 2016
    Booth: 235
  • Detroit, MI 2016
    Booth: 216
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Barbara L. Ciaramitaro
    Chair, Undergraduate Information Technology, Capella University

    Dr. Barbara L. Ciaramitaro is the Chair of the Undergraduate Information Technology program at Capella University. She has taught graduate and undergraduate courses on a variety of topics including cybersecurity, emerging technology, complex systems dynamics, software engineering and project management. Dr. Ciaramitaro is a frequent speaker and author on cybersecurity, current technology issues, business intelligence, data and decision-making, and cyber physical systems. She has authored and edited books on quality assurance, virtual world technologies, mobile technology, privacy, security, social engineering and forensics.

  • speaker photo
    Kathy Ossian
    Founder & CEO, Ossian Law P.C.

    Kathy Ossian is Founder and CEO of Ossian Law, P.C., a firm focused exclusively on Information Technology Law. Kathy has practiced for 35 years; over 22 in Information Technology law. She is a frequent author and speaker on timely IT law topics and the Managing Editor of “Social Media and the Law” published by PLI. Kathy is also an Adjunct Faculty Member at Oakland University and the University of Detroit Mercy Law School. She has been named for many years as a Best Lawyer in America and a Michigan Super Lawyer in information technology law.

  • speaker photo
    Charles Parker II
    Cybersecurity Lab Engineer, Thomas Edison State University

    Charles Parker, II has been in the computer science/InfoSec industry for over a decade in working with medical, sales, labor, OEM and Tier 1 manufacturers, and other industries. Presently, he is a Cybersecurity Lab Engineer at a Tier 1 manufacturer and professor. To further the knowledge base for others in various roles in other industries, he published in blogs and peer reviewed journals. He has completed several graduate degrees (MBA, MSA, JD, LLM, and PhD (ABD)), completed certificate programs in AI from MIT and other institutions, and researches AI’s application to InfoSec, FinTech, and other areas, and is highly caffeinated.

  • speaker photo
    Christine Wheaton
    CISO, Meritor

    Christy Wheaton currently serves as the Sr. Director & CISO for Meritor, overseeing the enterprise cybersecurity and GRC programs, globally. Wheaton previously served as global identity and access management lead for GE Capital, overseeing global IAM programs. Her role expanded to also oversee the information security intelligence program, information security risk, governance and compliance programs. Prior to this, she rotated through the director and CIO roles for Ally Bank holding several roles in motors insurance, corporate security, and global sales and service management, overseeing various IT departments and IT and InfoSec, data protection, governance, risk and compliance programs.

  • speaker photo
    Steven F. Fox
    Deputy CISO, State of Washington

    Steven F. Fox provides security guidance to ensure risk-informed compliance with federal standards and requirements as a Deputy CISO for the State of Washington. He brings a cross-disciplinary, international perspective to the practice of information security, combining his experience as a security consultant, an IT Audit leader, and a systems engineer with principles from behavioral/organizational psychology to address security challenges.

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.

    Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.

    Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.

  • speaker photo
    Zee Abdelnabi
    Advisory Manager / Security Researcher, Deloitte

    Zee is a security researcher and a manager experienced in managing large, complex global teams that focus on: advanced penetration testing, connected car security, SIEM, vulnerability management, threat modeling, and mobile security. Zee is an active security community member.

  • speaker photo
    Melissa Markey
    Attorney, Hall, Render, Killian, Heath & Lyman

    Melissa Markey is a shareholder with Hall, Render, Killian, Heath & Lyman, and is licensed in Michigan, Utah, Colorado and Texas. Melissa's practice focuses on technology and life sciences, especially cybersecurity, data privacy, and legal issues at the developing edges of technology. Ms. Markey is a paramedic, and a nationally recognized author and presenter. She is a candidate for a Masters of Professional Studies in Cyber Policy and Risk Analysis.

  • speaker photo
    Troy Leach
    Chief Technology Officer, PCI Security Standards Council

    : Troy Leach is the Chief Technology Officer for the PCI Security Standards Council. In his role, Mr. Leach partners with Council representatives, Participating Organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject matter expert on payment security and holds advanced degrees from Syracuse University in network management and information security.

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Jon Clay
    Director, Global Threat Communications, Trend Micro

    Jon Clay has worked in the cybersecurity space for over 21 years. He is responsible for managing marketing messages and external publication of all the threat research and intelligence within Trend Micro as well as different core technologies. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats. Jon is also a volunteer speaker for the Trend Micro Internet Safety for Kids and Families program.

  • speaker photo
    Dawn-Marie Hutchinson
    CISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)

    Dawn-Marie Hutchinson brings more than 15 years of enterprise information technology experience to her role as CISO of GSK. She is an innovative business partner with extensive experience serving on Enterprise Risk Management teams. Hutchinson is an expert in providing data privacy and security solutions to manage information risk, improve IT governance and strengthen internal controls. Hutchinson’s extensive experience in information security and privacy program development has served the healthcare, insurance, retail and higher education sectors.

    While serving on the HITRUST working group for Data De-Identification, Hutchinson established standards and controls for the anonymization of patient level data and is credited with authoring the white paper for defining those levels, as well as use cases for the secondary uses of medical data. Additionally, she served on the HITRUST Privacy working group tasked with revising the HITRUST Common Security Framework to include additional privacy controls and the inclusion of NIST application recommendations.

    Prior to joining GSK, Hutchinson was the CSO at Comm Solutions and also led the information security program at Urban Outfitters, based in Philadelphia. Her tenure in IT also includes work at Walt Disney World, Co., Banknorth Group, Inc., Independence Blue Cross, Protiviti, and Optiv.

    Hutchinson currently sits on the Cyber Security Canon Committee, was the recipient of the CRM Women’s Power 50 award and hold accreditations that include Certified Information Security Manager (CISM), Certified in Risk and Information System Controls (CRISC), Certified Information Systems Auditor (CISA) and former Payment Card Industry Qualified Security Assessor (QSA). She is also a 2013 Master’s of Business Administration graduate of the Saint Joseph’s University Haub School of Business.

  • speaker photo
    Jeff Lauer
    Vice President of Americas Business Development, Venafi

    A recognized speaker, authority and thought leader in security authentication and encryption field. As a key executive in successful, high-technology start-ups including Venafi, Jeff Lauer also brings over 28 years of experience in information technology and security. Mr. Lauer’s recent speaking engagements have included Secure World, CIO Forum and RSA Security Conference.

    Venafi is the leader in Securing and Protecting Keys and Certificates within global organizations. Venafi mission statement is: any key, any certificate, anywhere. At Venafi, Jeff Lauer is responsible for business development in the America’s.

    Prior to Venafi, Lauer has held various senior positions from VP to Director of Business Development at companies including Symantec a leader in IT security, Altiris the leader in device management (acquired by Symantec), Cognos a leader in business intelligence (acquired by IBM) and PTC the leading company in the engineering and product development market.

  • speaker photo
    Jeremy Linden
    Director, Product Management, Qadium
  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    David Derigiotis
    Corporate Vice President, Burns & Wilcox

    Corporate Vice President with the largest independent wholesale insurance broker in the country, Burns & Wilcox. David has participated in cyber roundtable discussions with the US Treasury Department in Washington D.C. and has appeared on Fox Business and CNBC. Publications featuring David include Detroit Crain’s and The Wall Street Journal.

  • speaker photo
    Dr. Faith Heikkila
    Information Security Governance Specialist, Perrigo Company plc

    Faith Heikkila, Ph.D., CISM, FIP, CIPM, CIPP-US is an Information Security Architect - Governance at Perrigo Company plc. Dr. Heikkila has prior CISO practitioner experience in overall information security governance, compliance, vendor management, protection of personal and financial information, along with GDPR expertise in a global pharmaceutical company.

  • speaker photo
    Robert Leale II
    Founder & President, CanBusHack
  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.

    He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.

    Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.

    Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

    He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."

    Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    David Barton
    CISO, Forcepoint

    David Barton is the Chief Information Security Officer for Forcepoint, responsible for securing the company and sharing key learnings with customers. Barton brings to his role more than 20 years of experience in security leadership across a variety of sectors, including telecommunications, healthcare, software development, finance and government. Prior to joining the company in 2015, he spent three years as the Head of Information Security at Hireright, where he was responsible for securing the company’s information and physical assets on a global scale. Barton holds an MBA from the University of Missouri – Kansas City and a bachelor’s degree in Management Information Systems from Simpson College. He is also a Certified Information Systems Security Professional (CISSP).

  • speaker photo
    Mark Rasch
    Security Evangelist, Verizon

    Mark Rasch is a Security Evangelist for Verizon Enterprise Solutions (VES) where he helps develop strategy and messaging for the Information Security team.

    Rasch’s career spans more than 25 years of corporate and government cybersecurity, computer privacy, regulatory compliance, computer forensics and incident response. He is trained as a lawyer and, prior to joining Verizon was a recognized author of numerous security- and privacy-related articles. Prior to joining Verizon, he taught courses in cybersecurity, law, policy and technology at various colleges and Universities including the University of Maryland, George Mason University, Georgetown University, and the American University School of law and was active with the American Bar Association’s Privacy and Cybersecurity Committees and the Computers, Freedom and Privacy Conference.

    Rasch had worked as cyberlaw editor for SecurityCurrent.com, as Chief Privacy Officer for SAIC, and as Director or Managing Director at various information security consulting companies, including CSC, FTI Consulting, Solutionary, Predictive Systems, and Global Integrity Corp.

    Earlier in his career, Rasch was with the U.S. Department of Justice where he led the department’s efforts to investigate and prosecute cyber and high-technology crime, starting the computer crime unit within the Criminal Division’s Fraud Section, efforts which eventually led to the creation of the Computer Crime and Intellectual Property Section of the Criminal Division. He was responsible for various high-profile computer crime prosecutions, including Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris.

    Prior to joining Verizon, Mark was a frequent commentator in the media on issues related to information security, appearing on BBC, CBC, Fox News, CNN, NBC News, ABC News, the New York Times, the Wall Street Journal and many other outlets.

  • speaker photo
    Christopher Mandelaris
    CISO, Elevations Credit Union

    Chris Mandelaris is the Chief Information Security Officer of Elevations Credit Union. He has over 16 combined years’ experience in IT and Information Security. He received his Bachelor of Science from Central Michigan University and Master’s Degree Information Technology - Walsh College of Business Chris has earned CCISO, CISM, CISA, CRISC, PMP, ITILv3, Six Sigma, MCSA, MCP, CNA, Network+, A+ certifications and is an active member of PMI and ISACA organizations. Previously Chris has worked for Ford Motor Credit, Flagstar Bank, Electronic Arts, Dell, First Tennessee Bank and Bank of America taking on increased roles and responsibilities globally.

  • speaker photo
    Patrick Corbett
    Assistant U.S. Attorney, U.S. Attorney's Office, Eastern District of Michigan

    A 1987 graduate of Notre Dame Law School, Corbett commenced employment as a lawyer working as a law clerk for U.S. District Court Judge Horace Gilmore. From 1989-1999, he prosecuted a variety of federal crimes for the U.S. Attorney’s Office in Detroit. Recruited by former Michigan Attorney General Jennifer Granholm, Corbett then served for 2 1/2 years as Deputy Chief of the High Tech Crime Unit, investigating and prosecuting Internet and computer-related crimes. From 2001-2014, Corbett served as a Professor of Law at Western Michigan University Cooley Law School, teaching Criminal Law, Criminal Procedure, and Cyber Crimes. In January 2015, Corbett returned to the U.S. Attorney’s Office. Initially assigned to the Drug Task Force, Corbett is presently assigned to the White Collar Crime Unit to prosecute cybercrimes.

  • speaker photo
    JP Blaho
    Market Insights Leader, Arbor Networks

    John Paul (JP) Blaho currently leads the Market Insights group for Arbor Networks, and is a seasoned Product and Solutions professional with more than 15 years in the product and services marketing ares in IT. With eight years focused specifically on network security solutions, JP has developed a focus on understanding the buyer journey for Enterprises and identify the unique personas who engage in making complex IT security assessment and purchase decisions. Mr. Blaho has worked for leading security and services organizations such as Sungard Availability Services, Blue Coat Systems, Teradyne, and IBM Security. JP received his BS degree from Bethany College in Bethany, West Virginia, and received his MBA from Northeastern University’s D’Amore-McKim School of Business in Boston, Massachusetts.

  • speaker photo
    Shad Gunderson
    System Engineer, Centrify

    Shad Gunderson has been working with identity management since 2001. In addition to working as a practitioner and consultant in the field, he has worked at CA and Hewlett Packard Enterprise Security Services. Shad joined Centrify three years ago as the System Engineer for the Midwest region.

  • speaker photo
    Brian Gawne
    Director, Cyber Security & Compliance, People Driven Technology
  • speaker photo
    Michael A. Stone
    ATAG-Installations, DMVA Deputy Director, Commander 46th Military Police Command, Michigan Army National Guard and DMVA

    Major General Michael A. Stone is the Commander, 46th Military Police Command, Michigan Army National Guard. In this capacity he provides leadership, mission command and strategic priorities in order to ensure effective and efficient accomplishment of the Command’s missions. General Stone is also an Assistant Adjutant General and responsible for Army armories and installations in the State of Michigan and a Deputy Director of the Michigan Department of Military & Veterans Affairs.

  • speaker photo
    Alex Kayayian
    Internal Audit, Risk & Compliance

    Alex has professional experience in conducting SSAE-16 audits, attestations, PCI audits, HIPAA audits, policy and procedure writing, IT controls frameworks such as: ISO 27001, SANS critical controls, gap analysis testing, and general controls testing. A combination of academia, private and public sector experience has provided him with understanding the significance that cybersecurity has on a global scale. He completed his Bachelor of Science from the University of Detroit Mercy, and went on to complete his Master of Science in Technology Studies with concentration in Information Assurance Management.

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    Jen Fox
    Treasurer, Motor City ISSA Chapter

    Jen Fox is an active member of the Michigan Information Security community and is an ISSA Motor City chapter board member. Her 20+ years of experience in IT and Information Security span the insurance, utility, finance, manufacturing and IT sectors. Her speaking engagements include GrrCON, Security BSides Detroit and CircleCityCon.

  • speaker photo
    Clark R. Crain
    GRC Consultant, Comp-West, LLC

    I have been a CISSP for more that 19 years, CISM for more that 14, and a CRISC for more that 7. I have worked as a compliance consultant for PCI, HIPAA-HITECH, NERC, NRC and others.

secure world app
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes