googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 28, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:30 pm
    Location / Room: Registration Desk - Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    The Delta Between Incident Response and Incident Command - Part 1
    speaker photo
    Field CISO, Presidio
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: Room 259

    For Advisory Council members only. This roundtable discussion will be moderated by Dave Trader.

    Ever wonder how to bridge the delta between incident responses and incident commands? Join this two-part discussion about cloud contracts, cyber counsel, crisis communications, and the divide between command and response with your Detroit Advisory Council peers.

    9:00 am
    [Breakfast Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    speaker photo
    Network Intrusion Forensic Analyst (NIFA), Michigan Field Office, United States Secret Service
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    9:45 am
    Networking Break & Professional Headshots
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for solution vendor displays or connect with attendees.

    Get your complimentary professional headshot! A photographer will be onsite Day 1 from 9 a.m. to 2 p.m. in the Exhibitor Hall.

    10:15 am
    Best Practices for InfoSec Teams
    • session level icon
    speaker photo
    Vice President, Information Technology, Detroit Pistons
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Room 252A

    Session description to come.

    10:15 am
    Transforming Risk into Opportunity
    • session level icon
    speaker photo
    Director of Information Security & Regulatory Compliance, ETS
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Room 252B

    This session uses the story of traversing a gorge wall leading to the base of a Central American waterfall to convey the principles of risk management.  The story illustrates a practical way to structure risk management to prepare practitioners and managers to identify and create opportunities.

    Attendees will learn three risk management principles that enable organizations to recognize business and enterprise opportunities.

    10:15 am
    Supply Chain Breaches and OT/IoT Scenarios
    • session level icon
    speaker photo
    Sr. Product Marketing Manager, Exabeam
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Room 258

    Today with international sourcing, the mixture of proprietary and open-source code, and enormous variability in vendor practices, perfectly securing the enterprise supply chain borders upon the impossible. The list of supply chain attacks is long and infamous, and, of course, this applies to hardware as well – peripherals, networking equipment, and IoT devices. But in the end, the commonality to all IoT devices and supply chain attacks is the compromise of credentials and authentication, followed by abuses of network privileges in proliferation and spread.

    The infamous SolarWinds supply chain cyberattack in December 2020 was devastating not only because of its reach — extending to at least nine federal agencies, critical infrastructure entities, and more than 100 private sector organizations. Its sophisticated strategy made it virtually invisible unless you had tools to uncover user behavior.

    Attend this session to learn about:

    • What steps can CISOs, and IT security teams take to mitigate risk from supply chain attacks
    • How SIEM and Behavior Analytics solutions can detect attacks that have slipped past your perimeter defenses
    • How 3rd-party credentials are being used, and how user and entity behavior analytics (UEBA) can help detect unauthorized access
    11:10 am
    [Panel] Automotive Cybersecurity—It Isn't Optional
    • session level icon
    speaker photo
    Professor and Director, Graduate Program, University of Detroit Mercy
    speaker photo
    President, Michigan WiCyS Regional Affiliate
    speaker photo
    Principal, Heimer & Associates LLC
    speaker photo
    Cybersecurity Strategic Risk Manager, General Motors
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Room 252A

    It’s not your father’s Oldsmobile anymore. Today’s cars embody a complex array of digital logic that supports everything from software-enabled entertainment to critical functions like steering and braking. Naturally, this all needs protection. This roundtable will outline the U.S. Auto-ISAC’s Automotive Cybersecurity Training (ACT) program and the prospective education and certification initiative that will carry the industry into a new age of vehicular cybersecurity.

    11:10 am
    Building and Maturing a Security Awareness Program
    • session level icon
    speaker photo
    Information Security Team Leader, Rocket Central
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Room 252B

    Security Awareness programs have gone from an afterthought to a critical component of Information Security programs. Most large organizations now have one or more full-time employees dedicated to awareness and managing human risks. This presentation defines a common framework for building a broad awareness program using the Train, Reinforce, Assess, and Manage (TRAM) model. The presentation will also provide logical maturity steps that map out the progression for maturing an awareness program using a Awareness Program Maturity Model (APMM).

    11:10 am
    Learn Why CISOs Are Embracing These Top ASM Use Cases Now
    • session level icon
    speaker photo
    Evangelist, Team Cymru
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Room 258

    CISOs need a plan of attack for their external digital risks. See how these five use cases will help you embrace ASM and make the most out of your investment:

    • Discovery of all assets
    • Discovery of all vulnerabilities and prioritizing them
    • Exposing shadow IT
    • Measuring M&A risk
    • Monitoring third-party assets

    Hear David Monnier, Chief Evangelist with Team Cymru, review the top five use cases that every security team must embrace now to get the most value out of your ASM journey. We’ll be introducing you to ASM 2.0 and explaining why it should top your future plans to reduce risk exposure.

    Key take-away:
    Learn how a unique blend of Attack Surface Management, Vulnerability Management, Threat Intelligence, and Business Risk Management can benefit your needs. Start the journey today.

    12:00 pm
    [Lunch Keynote Panel] Demystifying Cybersecurity in the Boardroom
    • session level icon
    speaker photo
    SVP & Deputy CISO, KeyBank
    speaker photo
    IT GRC and Cybersecurity Professional
    speaker photo
    Sr. Manager, IT Security, BorgWarner
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    Have you ever walked into your company’s board room to give an update and feel like you’re speaking a different language? You probably are–to them. Unfortunately, this is a common occurrence many cybersecurity professionals face along with their day-to-day InfoSec tasks and challenges.
    Join us for a panel discussion where local InfoSec executives share their experiences reporting to the board and different tactics they’ve used that have been successful when communicating risk, along with tips for making your security team stand out amongst other business units. Open to all levels of professionals.
    12:00 pm
    Advisory Council Roundtable Lunch – (VIP / Invite only)
    • session level icon
    The Delta Between Incident Response and Incident Command - Part 2
    speaker photo
    Field CISO, Presidio
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Room 259

    For Advisory Council members only. This roundtable discussion will be moderated by Dave Trader.

    Ever wonder how to bridge the delta between incident responses and incident commands? Join this two-part discussion about cloud contracts, cyber counsel, crisis communications, and the divide between command and response with your Detroit Advisory Council peers.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    [Panel] Incident Response!
    • session level icon
    speaker photo
    Manager, Threat IR & Forensic, Trend Micro
    speaker photo
    Chief of Staff and Co-Founder, Expel
    speaker photo
    Sales Engineer, Armis
    speaker photo
    Incident Response/Channel Sales Engineer, Cybereason
    speaker photo
    Principal Sales Engineer, Exabeam
    speaker photo
    IT GRC and Cybersecurity Professional
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Room 252A

    Security teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.

    1:15 pm
    Cyber Warfare 2022 and Next Level $#@! You Need to Know for Today's Cyber Battleground
    • session level icon
    speaker photo
    Global Cybersecurity Architect & Check Point Evangelist, Check Point
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Room 258

    Nation States, Non-Nation State Actors, Hacktivists, enterprise cyber criminals, shadow government agencies, terrorist organizations, loosely affiliated groups are using this next level $#@! as we speak to conduct cyber warfare: irregular warfare and proxy attacks, disinformation and disruption campaigns, “truth decay” (‎RAND Corp); to manipulate and influence public opinion, foment criminal violence; infiltrate organizations to conduct fraud, scam, and harass; highjack legitimate real human accounts for impersonation; and to distribute malware. These are very interesting times we are living in and this is the new cyber battleground.

    2:30 pm
    The Road to IT Governance Using KRIs
    • session level icon
    speaker photo
    CISO, BorgWarner
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: Room 252B
    Having an effective governance program is no easy task. It is partially due to a lack of visibility concerning organizational strategic and operational risks. In this presentation, we will review some examples to measure and track risk. These key risk indicators (KRIs) will provide early warning signals when risks move in a direction that may impact or prevent the achievement of organizational goals.
    2:30 pm
    Special Film Screening of "Made in Beijing: The Plan for Global Market Domination"
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Room 252A

    The FBI’s Office of Private Sector, Counterintelligence Division, and Training Division present this 30-minute film entitled “ Made in Beijing: The Plan for Global Market Domination.” In the world of global adversaries, the People’s Republic of China stands at the forefront with its sustained and brazen campaign of industrial espionage, posing the single greatest threat to our freedom, national security, and economic vitality.  This film sounds the alarm, helping private sector partners recognize the urgent need to protect their crown jewels against industrial espionage.

    3:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:45 pm
    [Closing Keynote] The Importance of Enterprise Systems: A Legal Look at Cyber Infrastructure
    • session level icon
    speaker photo
    The Geek Lawyer, Butzel Long
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Keynote Theater

    Session description to come.

  • Thursday, September 29, 2022
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:00 pm
    Location / Room: Registration Desk - Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 3:45 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    7:30 am
    InfraGard Chapter Meeting
    • session level icon
    InfraGard Members Only
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:50 pm
    Location / Room: Keynote Theater

    Open to InfraGard members only.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Discussion Topic: Succession Planning
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: Room 259

    Moderated discussion on the topic of succession planning. For Advisory Council members only.

    9:00 am
    [Opening Keynote] Zero Trust: What, Why, and How
    • session level icon
    speaker photo
    Emerging Technology Product Owner, Advanced Infrastructure Technologies, Ford Motor Company
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    This introductory section on “Zero Trust” covers a brief history and explains the reason that this is imperative now. It also touches upon the creation of strategies towards Zero trust.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Forging Security and Building Brand in the Fourth Industrial Revolution
    • session level icon
    speaker photo
    CISO & CPO, Nexteer Automotive
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Room 252A
    This session examines the backdrop of the macro business environment and current/emerging cyber threats. It will present key people, process and technology safeguards to mitigate enterprise risk. Ultimately, the CISO must lead transformative change to accomplish his or her mission. Security practitioners will walk away with trusted advice and key strategies to build both security program and practitioner brand to accelerate and drive successful change.
    10:15 am
    Talent Development in a 'Drought' of Cybersecurity Talent
    • session level icon
    speaker photo
    Information Security (Focusing on Payments), X
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Room 252B

    Cybercrime Magazine states that there will be 3.5 million unfilled cybersecurity jobs in 2025. Hiring managers lament the lack of qualified candidates; at the same time, cybersecurity forums are filled with posts about how difficult it is to get into the field.

    In this breakout session, we will cover common pitfalls in the hiring process, strategies to locate untapped talent, skills that can be built upon, and how your talent management system should influence your technology selections. Over the last five years, Steven has implemented these strategies, grown highly skilled resources into loyal employees, has had an involuntary turnover rate of zero percent, and has enjoyed growing the careers of many cybersecurity professionals.

    11:10 am
    I Just Bought WHAT?! Using the CIS CSAT for M&A Reviews
    • session level icon
    speaker photo
    Privacy Engineer, IT Security and Compliance , Steelcase Inc.
    speaker photo
    Program Director, Michigan Cyber Partners, Michigan DTMB
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Room 252A
    How do you know if a potential purchase has the same security standards as you? Sending them 100+ questions may not make for good relations. Matching them to your framework may take too much time in an M&A crunch. How do you know the risks you may be buying?
    Learn how Steelcase has chosen the free CIS Controls Self-Assessment Tool (CSAT) to determine how aligned a merger or acquisition may be to their framework. Join us as we share this use case as well as others from the State of Michigan’s DTMB Partnership office. DTMB has helped many state and local agencies measure their security programs using CIS CSAT. Come share your use case for CSAT too.
    11:10 am
    The First 48 Hours
    • session level icon
    speaker photo
    Field CISO, Presidio
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Room 252B
    12:00 pm
    [Lunch Keynote] Budgeting for Burnout: Tips for Predicting, Preventing, and Managing Team Burnout in Cybersecurity
    • session level icon
    speaker photo
    VP of IT & InfoSec, Chief Security Officer, DispatchHealth
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    In the middle of the healthcare industry, the startup world, and cybersecurity, you will find a storm of burnout-generating events. Join me to discuss recent research and techniques in combating and managing burnout personally and among security team members.
    12:00 pm
    Advisory Council Roundtable Lunch – (VIP / Invite only)
    • session level icon
    Discussion Topic: Don’t Worry, We've Got Cyber Insurance!
    speaker photo
    CEO, CISO & Founder, Strategic Security Advisors, LLC
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Room 259

    For Advisory Council members only. This roundtable discussion will be moderated by Coover Chinoy.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    [Panel] Securing the Code: AppSec and DevOps 101
    • session level icon
    speaker photo
    Senior Sales Engineer, Checkmarx
    speaker photo
    CEO & Co-Founder, Oxeye
    speaker photo
    Sr. Sales Engineer, Axonius
    speaker photo
    Privacy Engineer, IT Security and Compliance, Steelcase Inc.
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Room 252A

    Everyone says you’ve got to bake security into the development process, but it doesn’t always get done. Speed to market and “other considerations” can get in the way of good, clean secure code. Some developers share code or borrow from open-source platforms on the internet. Is that safe? How do you work with your DevOps teams to create a collaborative, proactive environment where they have the time and resources to build that security in from the beginning? How do you deal with burnout and fatigue? Our panel will address these concerns and more to help you get a handle on securing the code.

    1:15 pm
    [Panel] The Current Threat Landscape
    • session level icon
    speaker photo
    Security Research, Principal Lead, Akamai
    speaker photo
    Sr. Solutions Consultant, Recorded Future
    speaker photo
    Director of Sales Engineering, Qush Security
    speaker photo
    Information Security (Focusing on Payments), X
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Keynote Theater

    If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?

    It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.

    2:30 pm
    The Pursuit of Training
    • session level icon
    speaker photo
    Manager of Security Engineering, The Learning Care Group
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: Room 252A
    Because employees are the core of any business, they will be the main target for cybercriminals. Making sure your people stay up-to-date with cyber security knowledge, and teaching them to recognize threats, is imperative to the security of your business. The threat landscape is constantly evolving, and so should your approach to defense.
    My segment focuses on why Cybersecurity Training and Awareness is the strongest tool to fight the attacks and how it should be achieved. At the end of the day, all it takes is just one click!
    2:30 pm
    Transforming Security Through Design
    • session level icon
    speaker photo
    CISO, Oakland County, Michigan Government
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: Room 252B

    Security has a design problem. Our security programs are unusable, causing people to opt out. Our security tools are unmanageable, leading to staffing shortages and shelfware. The resulting security capabilities simply aren’t defensible. This session details an approach to security design using a framework based upon the path finding and choice architecture. To get people to follow secure practices, to get people to opt in, we must design better experiences.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

Exhibitors
  • Akamai Technologies
    Booth: 375

    Akamai powers and protects life online. Leading companies choose Akamai to build, deliver, and secure digital experiences. With the most distributed compute platform—cloud to edge—customers can build modern apps while keeping experiences closer to users and threats farther away. Learn about Akamai’s security, compute, and delivery solutions at akamai.com.

  • Armis, Inc
    Booth: 400

    Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.

  • Axonius
    Booth: 390

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Barracuda
    Booth: 420

    At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-first, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 200,000 organizations worldwide trust Barracuda to protect them—in ways they may not even know they are at risk—so they can focus on taking their business to the next level. For more information, visit barracuda.com.

  • Checkmarx Inc.
    Booth: 320

    Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.

  • Check Point Software Technologies
    Booth: 480

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Cloud Security Alliance Detroit
    Booth: TBD
  • Cybereason
    Booth: 330

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • Digital Guardian
    Booth: 555

    Digital Guardian provides the industry’s only threat aware data protection platform that is purpose built to stop data theft from insiders and outside adversaries. The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications and is buttressed by a big data security analytics cloud service, to make it easier to see and block all threats to sensitive information.

  • Exabeam
    Booth: 310

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Expel
    Booth: 270

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • InfraGard Michigan
    Booth: TBD

    InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.

  • ISACA Detroit
    Booth: TBD

    Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the metro Detroit area.

  • ISC2 Greater Detroit
    Booth: TBD

    ISC2 is consists of over 80,000 members worldwide. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques. The Greater Detroit chapter was been established in 2012 to help bring together local professionals. Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification.

  • Keysight
    Booth: 280

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Nozomi Networks
    Booth: 450

    Nozomi Networks is the leader in OT & IoT security. We accelerate digital transformation by protecting the world’s critical infrastructure, industrial and government organizations from cyber threats. Our solution delivers exceptional network and asset visibility, threat detection, and insights for OT and IoT environments. Customers rely on us to minimize risk and complexity while maximizing operational resilience. Its Threat Intelligence is now available for use with third-party cybersecurity platforms.

  • Okta
    Booth: 385

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • Oxeye
    Booth: 130

    Oxeye provides a cloud-native application security solution designed specifically for modern architectures. The company enables customers to quickly identify and resolve all application-layer risks as an integral part of the software development lifecycle by offering a seamless, comprehensive, and effective solution that ensures touchless assessment, focus on the exploitable risks, and actionable remediation guidance. Built for Dev and AppSec teams, Oxeye helps to shift security to the left while accelerating development cycles, reducing friction, and eliminating risks. To learn more, please visit www.oxeye.io.

  • Palo Alto Networks & Critical Start
    Booth: 460

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

    Critical Start simplifies breach prevention by delivering the most effective managed detection and incident response services. Powered by our Zero Trust Analytics Platform, the industry’s only Trusted Behavior Registry, and MOBILESOC, our 24x7x365 expert security analysts and Cyber Research Unit monitors, investigates, and remediates alerts swiftly and effectively. For more information on what sets us apart, visit criticalstart.com.

  • Qush Security
    Booth: 300

    Founded in 2016 to create a better, smarter way to deliver security. Innovative companies worldwide use Qush for human-centric data loss protection.

  • Recorded Future
    Booth: 370

    Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.

  • RiskRecon
    Booth: 430

    RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
    easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
    solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
    enabling organizations to efficiently operate scalable, third-party risk management programs for
    dramatically better risk outcomes. Request a demo to learn more about our solution.

  • Team Cymru
    Booth: 250

    Team Cymru’s mission is to save and improve human lives.  We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.

    Our business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.

    Community Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.

    Since 2005, our reputation remains unchallenged.

  • TechTarget
    Booth: N/A

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Trend Micro
    Booth: 260

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • Venafi
    Booth: 340

    Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.

    With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms;  four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.

    For more information, visit: www.venafi.com.

  • Women in CyberSecurity (WiCyS)
    Booth: TBD

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dave Trader
    Field CISO, Presidio
  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Joshua Seney
    Network Intrusion Forensic Analyst (NIFA), Michigan Field Office, United States Secret Service

    Joshua Seney is a Network Intrusion Forensic Analyst with the U.S. Secret Service Criminal Investigative Division. Joshua has over 27 years of law enforcement experience and retired as the Sergeant of Detectives from a local agency. He has conducted forensic examinations for criminal, civil, and insurance related matters, while serving in both the government and private sectors. He is currently assigned to the Detroit, Michigan Field Office in the Electronic Crimes Task Force (ECTF) Digital Evidence Forensic Lab.

  • speaker photo
    Paul Rapier
    Vice President, Information Technology, Detroit Pistons

    Paul Rapier, Vice President of IT for the Detroit Pistons, is a seasoned technology leader with 25 years of IT experience, including a decade in management. Known for his expertise in driving innovation within the sports industry, Paul actively shares his knowledge as a sought-after speaker at cybersecurity conferences and contributes to technology-driven initiatives in professional sports. He also serves on the Advisory Council for SecureWorld Detroit, where he helps shape cybersecurity standards and practices. His diverse skill set enables him to craft IT strategies that enhance efficiency and competitiveness.

  • speaker photo
    Steven F. Fox
    Director of Information Security & Regulatory Compliance, ETS

    Creating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I have successfully led audits testing controls from standards such as NIST CSF, ISO 27001, GDPR, and PCI-DSS. My contributions to the security community include publications in ISSA Journal and CSOonline, and presentations at RSA Conference, Blackhat Executive Summit, and DefCon. As a member of the SecureWorld Expo Advisory Committee, I remain actively engaged in advancing the field of cybersecurity.

  • speaker photo
    Christopher Beier
    Sr. Product Marketing Manager, Exabeam
  • speaker photo
    Daniel Shoemaker
    Professor and Director, Graduate Program, University of Detroit Mercy

    Daniel P. Shoemaker, PhD, is a Full Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy, where he has worked for over 35 years. He has retired from his administrative position as Department Chair, PI for the NSA Center and Subject Matter Expert for DHS and NIST. He is enjoying more time with his students and writing. He has published over 200 cybersecurity papers and articles as well as this list of books:
    • Cybersecurity “The Essential Body of Knowledge”
    • “The CSSLP Certification All-in-One Exam Guide”
    • Cybersecurity “Engineering a More Secure Software Organization”
    • “A Guide to the National Initiative for Cybersecurity Education (NICE) Framework: The Complete Guide to Cybersecurity Risk & Controls in Cyber Security”
    • ”Implementing Cybersecurity: A Guide to the NIST Risk Management Framework”,
    • “Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Product”
    • “How to Build A Cyber Resilient Organization”
    • “The Complete Guide to Cybersecurity Risks and Controls”
    • Information Assurance for the Enterprise: A Roadmap to Information Security”
    • “The Cybersecurity Body of Knowledge”
    • “The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity”

  • speaker photo
    Tamara Shoemaker, Host
    President, Michigan WiCyS Regional Affiliate

    Tamara’s primary mission is to address the shortage of specifically educated and trained cybersecurity professionals across Michigan. She focuses on K-12 Education with the CyberPatriot Program and Recruiting, Retaining, and the Advancement of Women leading the Michigan WiCyS Affiliate’s programs.

    She has facilitated the MCISSE Center’s unique engagement in cybersecurity teaching at the middle and high school level, and through innovative cybersecurity summer camps. In conjunction with this program, she created a digital badging system to further motivate and distinguish Michigan CyberPatriot participation, which is the first of its kind in the nation. She and her husband, Dan Shoemaker, published a groundbreaking book for Secondary school teachers entitled “Teaching Cybersecurity” with CRC Press.

    In June, women from across Michigan stood up the Michigan WiCyS Affiliate and Tamara is leading that charge as President. WiCyS is a global Association that promotes Recruiting, Retaining, and Advancing Women in Cybersecurity, which fits seamlessly into Tamara’s life’s work. She encourages you all to get in the GAME, volunteer, and help ensure we can all properly retire someday!

  • speaker photo
    Karl Heimer
    Principal, Heimer & Associates LLC

    Leader of Training & Development for the Auto-ISAC ACT program. Owner/Principal of Heimer & Associates LLC. Senior Technical Advisor for Cybersecurity to Michigan Economic Development Corporation (MEDC) Auto Office and Michigan Defense Center. Founder of CyberAuto, CyberTruck, CyberBoat Challenges; assisted in the creation of the CyberTractor Challenge. Advisory Board member of: Walsh College’s Automotive Cybersecurity Program, SAE journal of Transportation Cybersecurity and Privacy, and Metro Detroit Regional Vehicle Cybersecurity Institute.

  • speaker photo
    Moderator: Christine Pelione
    Cybersecurity Strategic Risk Manager, General Motors

    Experienced Cybersecurity Specialist with a demonstrated history of working in the automotive industry. Skilled in Business Process, Analytical Skills, Operations Management, Management, and Continuous Improvement. Strong program and project management professional with a Bachelor of Business Administration (BBA) focused in Business Administration and Management, General from Baker College Center for Graduate Studies.

  • speaker photo
    Mark Majewski
    Information Security Team Leader, Rocket Central
  • speaker photo
    Brad LaPorte
    Evangelist, Team Cymru

    One of the most influential voices in cybersecurity and is credited with inventing the term ASM at Gartner. Brad is a former top-rated Gartner analyst for cybersecurity and threat intelligence, veteran of U.S. Cyber Intelligence, Dell, IBM, Kasada evangelist and product leader.

  • speaker photo
    Nick Schappacher
    SVP & Deputy CISO, KeyBank

    Head of Information Security Governance

  • speaker photo
    Mary Rowley
    IT GRC and Cybersecurity Professional

    Mary’s several years of leadership experience encompasses many areas of cybersecurity with a focus on IT risk management, IT audit, security awareness training, vulnerability management and incident response. Her extensive information security background includes working at Henry Ford Health System, Comerica Bank, WorkForce Software, Learning Care Group and most recently, Raytheon Technologies, where she continues to build and mature the company’s Cyber 3rd party risk program. Mary is a graduate from Walsh College with a Master’s degree in Business Information Technology, Information Assurance and holds several certifications including CISSP, CISA and CRISC.

  • speaker photo
    Ryan Mostiller
    Sr. Manager, IT Security, BorgWarner

    Ryan Mostiller is a security leader in the Metro Detroit community, currently serving as the Security Operations Manager for BorgWarner. After more than a decade in both technical and management roles in security, Ryan enjoys any opportunity to engage with fellow practitioners and share learnings. Ryan has worked across various industries and within several Fortune 500 companies, most recently in the automotive industry.

    Ryan has a Masters in IT Management from Oakland University and bachelors in Information Technology, along with security certifications from GIAC. You may have seen other presentations that Ryan has created and presented at, including SecureWorld, GrrCON, ISC2, and Evanta. Ryan has also developed and teaches an OU Executive MBA course at Oakland University titled "Cybersecurity for Executives."

  • speaker photo
    Dave Trader
    Field CISO, Presidio
  • speaker photo
    Chris LaFleur
    Manager, Threat IR & Forensic, Trend Micro

    Chris LaFleur has spent the last three years working to prevent and eradicate threat actors such as Ryuk, Conti, and Lockbit. Chris began his career at Trend Micro in Threat Support, and is now running the Incident Response team. He was a key part of the making a method on how to predict customer attacks with the Smart Protection Early warning Service from Trend Micro. Chris has built a team of dedicated personal that can go into any environment and hunt out threats without needing to rely on just vendor only EDR/XDR tooling to kill the threat actors ability to cause damage.

    Chris has an AS degree in IT solutions from Keiser University, along with AWS and VMWare certifications, coupled with his hands-on experience over the last decade. Chris has always led with the belief that the customer comes first no matter who or what may have caused it. Keeping an attitude that IR work is much like working in a trauma center as a doctor. We don't get to choose what comes next or how long it will take, but we do not stop until the job is complete.

  • speaker photo
    Yanek Korff
    Chief of Staff and Co-Founder, Expel

    Yanek Korff has served in information technology or security roles for over 20 years. Starting out as a student help desk tech in a musty library basement in college he is now co-founder and Chief of Staff at Expel, a DC-area cybersecurity company that makes security easy to understand, use, and continuously improve.

    Yanek began his professional career as a systems administrator at Bell Atlantic and then Cigital. He moved on to Aol where he transitioned into a management role and eventually became responsible for much of Aol’s security infrastructure. In 2010, he joined Mandiant to build a new managed services business line to help customers mitigate the impact of security breaches conducted by state-sponsored attackers.

    Yanek graduated with a Computer Science degree from William and Mary, a Masters in the Management of Information Technology from the McIntire School of Commerce at the University of Virginia and was the principal author for Mastering FreeBSD and OpenBSD Security, published by O’Reilly.

    Yanek lives with his family in Vienna, Virginia with three dogs and as many fish and corals as he can fit into a 300 gallon saltwater aquarium. When he’s not fully engaged with Expel business, he’s likely on vacation or playing video games. Because he’s apparently still ten years old on the inside.

  • speaker photo
    Rick Rutledge
    Sales Engineer, Armis

    Rick Rutledge has been in the Security space for more than 15 years. He has moved from working in the N.O.C. of a fortune 500 company to designing network and security infrastructure of a fortune 20 company to selling security solutions to hundreds of companies across all verticals and sizes. His previous experience with both support and design of some of the largest networks in the world give him a unique insight to a majority of the problems we face today.

  • speaker photo
    Neil Christie
    Incident Response/Channel Sales Engineer, Cybereason

    Neil is a 25+ year veteran of the information technology and cybersecurity field. Forging technology environments that support security to protect business is Neil’s passion. Currently Neil is working with Cybereason to enable customers and partners to use industry leading tooling in incident response engagements and ongoing production environments. Prior to joining Cybereason, Neil helped to build a multi-million dollar cybersecurity practice for SageNet Corporation. He is known for challenging the people around him to find more secure ways to accomplish any and all projects he comes into contact with. Neil has extensive project management and hands-on experience in cyber risk management, network security, SIEM and SOC deployment and management, data loss prevention, incident response, electronic discovery, penetration testing and data governance and privacy. He has spent many years securing both the healthcare, big-pharma, and banking industries among others.

  • speaker photo
    James Herbst
    Principal Sales Engineer, Exabeam
  • speaker photo
    Mary Rowley, Moderator
    IT GRC and Cybersecurity Professional

    Mary’s several years of leadership experience encompasses many areas of cybersecurity with a focus on IT risk management, IT audit, security awareness training, vulnerability management and incident response. Her extensive information security background includes working at Henry Ford Health System, Comerica Bank, WorkForce Software, Learning Care Group and most recently, Raytheon Technologies, where she continues to build and mature the company’s Cyber 3rd party risk program. Mary is a graduate from Walsh College with a Master’s degree in Business Information Technology, Information Assurance and holds several certifications including CISSP, CISA and CRISC.

  • speaker photo
    Micki Boland
    Global Cybersecurity Architect & Check Point Evangelist, Check Point

    Micki Boland is a cybersecurity warrior and evangelist with Check Point Software Technologies Office of the CTO. A practitioner with 20 years in IT, cybersecurity, emerging technology innovation, Micki holds ISC2 CISSP, Master of Science in Technology Commercialization from the University of Texas at Austin, MBA with Global Security concentration from East Carolina University.

  • speaker photo
    Juman Doleh-Alomary
    CISO, BorgWarner

    Juman Doleh-Alomary is BorgWarner's Chief Information Security Officer and an active volunteer board member of the ISACA Detroit Chapter.  With over 15 years of experience in security, audit, investigation, compliance, and privacy policy/standards,

    Juman most recently held the position of Director of Cybersecurity GRC at Little Caesar's Enterprises serving the Ilitch holdings portfolio of companies. Her prior positions include Director of IT Audit at Wayne State University and a significant tenure in IT and Risk Management at Ford Motor Company.

    A leader within the ISACA community, Juman has held various roles, including past president and, notably, chair of the IIA/ISACA Spring Conference, which achieved a record attendance. She is active volunteer with Michigan Council of Women in Technology (MCWT), Women Security Alliance (WomSA), and on the advisory board of Women in Cyber (WiCyS) Michigan. 

    An alumnus of the University of Michigan, she holds both a bachelor’s and a master’s degree, complemented by an impressive suite of certifications: CISA, CISM, CRISC, CDPSE, and ISO 27001.

  • speaker photo
    Jennifer Dukarski
    The Geek Lawyer, Butzel Long

    Emerging Tech, Media, IP, Privacy & Cyber Shareholder

  • speaker photo
    Samatha Harish
    Emerging Technology Product Owner, Advanced Infrastructure Technologies, Ford Motor Company

    Samatha has 19+ years of experience in Enterprise technology with proven expertise in architecting, delivering, and maintaining complex projects in distributed environments.

  • speaker photo
    Arun DeSouza
    CISO & CPO, Nexteer Automotive

    Arun DeSouza is currently Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), security analytics, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. Arun earned M.S. and PhD degrees from Vanderbilt University and is a Certified Information Systems Security professional (CISSP). He has won multiple industry honors: CSO50 Award, Computerworld Premier 100 IT Leaders Award, CIO Ones to Watch Award, and Network World Enterprise All Star Award.

  • speaker photo
    Steven Aiello
    Information Security (Focusing on Payments), X

    Mr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.

  • speaker photo
    Barbara Hiemstra
    Privacy Engineer, IT Security and Compliance , Steelcase Inc.

    Barbara leads the Global Security Awareness/Phishing program to reduce risk and improve the cybersecurity culture at Steelcase. This includes creating content for employee awareness articles, training classes, and conducting multi-language phishing simulation and reporting.

    Prior to joining Steelcase, Barb was the Information Security-Governance Manager at Perrigo; the Information Security Director and the Deputy Director for IT at Kent County, Michigan; and Tech Director for Grandville Public Schools. She co-founded the West Michigan Cyber Security Consortium (WMCSC). She served on the Board and worked part-time for Cybercrime Support Network (CSN), whose goal is to bring a voice to and serve the victims of cybercrime.

    Barb holds a BA degree in Telecommunications from Michigan State University, Certified Information Privacy Technologist (CIPT), GIAC Security Leadership Certification (GLSC) and the GIAC Critical Controls Certificate (GCCC), GIAC Law of Data Security & Investigations (GLEG), and ITIL2 Foundations and Change Management certifications.

  • speaker photo
    Andy Brush
    Program Director, Michigan Cyber Partners, Michigan DTMB

    Andy Brush is the program director for Michigan Cyber Partners. In this role, Andy seeks to improve the cybersecurity posture of governments across the state by finding innovative ways of working together across sectors both locally and nationally. Prior to joining the State of Michigan, Andy served Washtenaw County for 17 years in various roles, including Webmaster, Knowledge Manager, and Innovations Manager, and seven years as the head of the IT organization. Andy has also worked as a managing consultant, technical writer, project manager, teacher, cherry tree shaker operator, and Peace Corps volunteer in Sri Lanka.

  • speaker photo
    Dave Trader
    Field CISO, Presidio
  • speaker photo
    Jaclyn Miller
    VP of IT & InfoSec, Chief Security Officer, DispatchHealth

    Jaclyn is a strategic security leader and advisor working with companies who are building and scaling their security programs in the tech and healthcare industries. With 19 years of experience, she has dedicated her career to building sustainable and secure digital transformations. Additionally, she specializes in building teams to meet the constantly changing demands on technology and of data protection requirements, and spends time mentoring young professionals and women in cybersecurity career development and leadership.

  • speaker photo
    Coover Chinoy
    CEO, CISO & Founder, Strategic Security Advisors, LLC
  • speaker photo
    Ryan Wakeham
    Senior Sales Engineer, Checkmarx

    Experienced leader with a demonstrated history of expertise in risk, compliance, and security. Strong builder, collaborator, and mentor who applies security fundamentals in the context of business objectives and requirements.

  • speaker photo
    Dean Agron
    CEO & Co-Founder, Oxeye

    Dean Agron is a cybersecurity expert with over 15 years of experience in the industry. He’s known for his expertise in identifying market gaps, and in being able to clearly articulate complex and highly technical topics. Prior to co-founding Oxeye, Dean led the strategic consulting group at Kayhut, a cyber-security service provider, and held executive, leadership and engineering roles at Imperva and Checkpoint.

  • speaker photo
    Peter Starceski
    Sr. Sales Engineer, Axonius

    Peter is a sales and systems engineering professional with more than 37 years experience with a solid track record. Dedicated to the success of the organization and extended account teams and driving continuous customer satisfaction. Maintained a track record of excellence by going above and beyond to provide goal oriented solutions to business challenges.

  • speaker photo
    Barbara Hiemstra, Moderator
    Privacy Engineer, IT Security and Compliance, Steelcase Inc.

    Barbara leads the Global Security Awareness/Phishing program to reduce risk and improve the cybersecurity culture at Steelcase. This includes creating content for employee awareness articles, training classes, and conducting multi-language phishing simulation and reporting.

    Prior to joining Steelcase, Barb was the Information Security-Governance Manager at Perrigo; the Information Security Director and the Deputy Director for IT at Kent County, Michigan; and Tech Director for Grandville Public Schools. She co-founded the West Michigan Cyber Security Consortium (WMCSC). She served on the Board and worked part-time for Cybercrime Support Network (CSN), whose goal is to bring a voice to and serve the victims of cybercrime.

    Barb holds a BA degree in Telecommunications from Michigan State University, Certified Information Privacy Technologist (CIPT), GIAC Security Leadership Certification (GLSC) and the GIAC Critical Controls Certificate (GCCC), GIAC Law of Data Security & Investigations (GLEG), and ITIL2 Foundations and Change Management certifications.

  • speaker photo
    Or Katz
    Security Research, Principal Lead, Akamai

    Or Katz is a security veteran, with years of experience at industry leading vendors, currently serves as principal lead security researcher for Akamai. Katz is a frequent Speaker in security conferences such as SecTor, OWASP global events and various BSides events. Katz also published numerous articles, blogs and white papers on threat intelligence and defensive techniques. Data driven security researcher that is constantly looking on how to move security challenges into the science and solutions space.

  • speaker photo
    Kathleen Kuczma
    Sr. Solutions Consultant, Recorded Future

    Kathleen Kuczma (she/her) is a Senior Solutions Consultant with Recorded Future. Her prior experience includes 3.5 years as an Intelligence Analyst within the U.S. Department of Defense where she specialized in counterterrorism, digital forensics, and nation-state cyber threats. In her current role, Kathleen uses her intelligence background to run efficient and impactful demos for a variety of audiences.

  • speaker photo
    Chris Tyrrell
    Director of Sales Engineering, Qush Security
  • speaker photo
    Steven Aiello, Moderator
    Information Security (Focusing on Payments), X

    Mr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.

  • speaker photo
    Chahak Mittal
    Manager of Security Engineering, The Learning Care Group

    Chahak Mittal is a Certified Information Systems Security Professional (CISSP) and Manager of Security Engineering at The Learning Care Group. Chahak is deeply committed to knowledge sharing and community engagement. She has actively contributed to the cybersecurity ecosystem through her roles as a Judge at Major League Hacking (MLH) Hackathons and a dedicated Cybersecurity Teacher in the Microsoft TEALS Program. Chahak's active involvement in organizations such as the Cybersecurity Collaboration Forum and SecureWorld's Detroit Advisory Council has been instrumental in her pursuit of staying at the forefront of industry trends and challenges. She has also channeled her insights into thought-provoking cybersecurity articles, published on SecureWorld.io, making a meaningful contribution to the field's intellectual discourse. Chahak's commitment to diversity and inclusion in cybersecurity is unwavering. She has actively participated in organizations like Women in Cybersecurity (WiCyS) and the Michigan Council of Women in Technology (MCWT), where she has championed the cause of gender diversity within the field. Her outreach efforts extend to interviews on prominent media platforms like PBS Channel and the Women in Technology podcast, where she has shared her insights to inspire young girls to consider cybersecurity as a viable and rewarding career path.

  • speaker photo
    J. Wolfgang Goerlich
    CISO, Oakland County, Michigan Government

    J. Wolfgang Goerlich is an active part of the Michigan security community. He hosts a YouTube video series and the Encode/Decode Security podcast. Wolfgang regularly advises on and presents on the topics of risk management, incident response, business continuity, secure development life cycles, and more.

    Prior to his current role, Wolfgang led IT and IT security in the healthcare and financial services verticals. He has held VP positions at several consulting firms, leading advisory and assessment practices. He is an active part of the security community, and regularly advises on and presents on the topics of security architecture and design.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes