Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, September 25, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.
11:00 am[Opening Keynote] Post-Quantum Cryptography on Google CloudCloud Security Architect, Google CloudGoogle Cloud Security Architect Team, US East & CanadaRegistration Level:
Open Sessions
11:00 am - 11:45 amAt Google, we take post-quantum computing risks seriously, and we are taking proactive steps to secure customer’s data against the potential threats of future quantum computers. In this session, we will be discussing our PQC journey on Google Cloud.
The goals of this session are to:
-
Understand the proactive steps Google is taking to secure customer data against post-quantum computing threats
-
Gain insight into Google’s journey and implementation of Post-Quantum Cryptography (PQC) on Google Cloud
-
Learn best practices for organizations to prepare their infrastructure and PKI for the transition to PQC
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmCyber Behavioral Profiling: Assessing Cyber Adversary Deception Tactics in FinServ AttacksCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:
Open Sessions
12:00 pm - 12:45 pmFinancial services remain prime targets for sophisticated cyber adversaries who leverage deception tactics to evade detection, manipulate trust, and exploit cognitive vulnerabilities. This session explores the intersection of cyber threat intelligence and behavioral profiling to dissect adversaries’ modus operandi in FinServ attacks. Attendees will gain insights into how psychological manipulation and adversarial adaptation shape modern cyber threats—equipping security teams with proactive strategies to detect, disrupt, and mitigate deceptive cyber campaigns.
12:00 pmZero Trust in Action: A Practical Roadmap for Security TransformationCDO & CDTO | Board Member & Advisor | PodcasterRegistration Level:
Open Sessions
12:00 pm - 12:45 pmZero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.
Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.
12:00 pmAutomation with PowerShell and dbatools: Streamlining SQL Server ManagementSenior Software Engineer, Cornerstone Building BrandsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmManaging SQL Server environments can be time-consuming, error-prone, and difficult to scale—especially when juggling backups, migrations, security audits, and performance checks. In this session, we’ll explore how to supercharge your workflow with PowerShell and the dbatools module to automate and simplify routine DBA tasks.
Through practical demos, you’ll see how to effortlessly migrate databases between servers, manage permissions, validate backups, and inventory your entire SQL estate with just a few lines of PowerShell. We’ll cover best practices for creating reusable scripts, integrating automation into CI/CD pipelines, and scheduling jobs for proactive maintenance.
Whether you’re managing a single instance or hundreds of servers, you’ll learn how dbatools can save time, improve consistency, and reduce human error—letting you focus on higher-value tasks like performance tuning and architecture.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmSecurity Awareness Reimagined: Marketing Tactics for Real ImpactTechnology Learning & Adoption Practitioner, NationwideRegistration Level:
Open Sessions
1:00 pm - 1:45 pmCybersecurity isn’t just a tech problem—it’s a people problem. Too many awareness programs are forgettable checkboxes.
This session shows you how to change that by applying proven marketing strategies to drive real behavior change. You’ll learn to:
- Craft targeted, emotionally resonant messages that stick
- Build a security brand employees trust and remember
- Use data and segmentation to deliver the right message to the right person
Whether you lead Security Awareness & Training or partner with HR and communications teams, you’ll walk away ready to drive engagement, reduce risky behaviors, and embed security into your organization’s culture.1:00 pmLocking the Future: Why Data Security Is the Key to Trustworthy AIData Strategy and Data Information Architect, Bank of AmericaRegistration Level:
Open Sessions
1:00 pm - 1:45 pmAs AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.
1:00 pmThe Dissonance Test: What Can't Be Faked?IT Support Specialist, Boston UniversityRegistration Level:
Open Sessions
1:00 pm - 1:45 pmIn 2024 alone, the U.S. Treasury Department linked over $6.8 million in earnings from fake freelance IT work to the North Korean regime, representing a growing national security and cybersecurity concern. These operatives pass identity checks, video interviews, and even technical screenings by mimicking genuine applicants, targeting almost every Fortune 500 company. But beneath the surface, they carry buried truths that create invisible strain.This session introduces a novel behavioral screening tool, called the Dissonance Test, that aims to detect deception before damage is done. By triggering cognitive dissonance between a liar’s persona and their suppressed identity, this test provokes micro-reactions, like flinching, freezing, tone shifts, even defensiveness and bailing, that truth-tellers glide through. We’ll explore how this can be applied in hiring and vetting processes to expose nation-state operatives like North Korean operatives, scammers, and social engineers, long before they can do damage.1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmAssumption of Risk or the Risks of Assumption? Examining the Impact of Thoughtful CommunicationVP, Cyber Services, AmTrust Financial ServicesRegistration Level:
Open Sessions
2:00 pm - 2:45 pmSecurity is a growth strategy, but are we delivering that message effectively? Risk assumption is the mainstay of the security professional, but let’s look at assumption through a different lens. What beliefs do you presume about other initiatives, teams, leaders in your organization? How might these be stymying your effectiveness or decelerating growth and innovation?This presentation explores what words and actions purport and examines how accurate (or inaccurate) our hasty conclusions about others can be. Participants will learn how abandoning assumptions in favor of objective alignment can multiply security program impact and efficacy, accelerating innovation and business growth.2:00 pmEnhancing Security, Easing Compliance: PCI DSS for Multi-Payment Channel OrganizationsManaging Director, SchellmanRegistration Level:
Open Sessions
2:00 pm - 2:45 pmNavigating PCI DSS compliance can be daunting for multi-payment channel merchants and service providers handling diverse transaction environments. This presentation explores practical strategies to reduce compliance burden while bolstering security. Attendees will learn how simple process changes, such as tokenization and point-to-point encryption, can minimize sensitive data exposure. We’ll also examine the benefits of outsourcing specific PCI DSS responsibilities to trusted third-party providers, enabling organizations to focus on core operations without compromising security. Drawing on real-world examples, the session will highlight how these approaches streamline compliance efforts, reduce costs, and enhance protection across online, in-store, and mobile payment channels. Ideal for merchants and service providers, this talk offers actionable insights to achieve PCI DSS compliance efficiently.2:00 pmThe Current Threat Landscape in FinServCISO, Americas, ZscalerChief Analyst, Google Threat Intelligence GroupCISO, The Anschutz CorporationRegistration Level:
Open Sessions
2:00 pm - 2:45 pmJoin us as we dive into several of the top concerns in Financial Services. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.
2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmCyber on the Brink: Inside the Relentless Threat Surge Facing Financial InstitutionsSr. Security Engineer, Exeter Finance LLCRegistration Level:
Open Sessions
3:00 pm - 3:45 pmAs someone working in the finance sector every day, I see firsthand how rapidly the threat landscape is evolving, from AI-generated deepfakes and impersonation scams to advanced persistent threats and the looming risks posed by quantum computing. This talk will explore the whole cyber frontier that financial institutions are now navigating, with a focus on the real-world challenges CISOs are facing as they enter 2026.3:00 pmYou Are Not a CISO, You Are a 'CO IS'Cybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
3:00 pm - 3:45 pmThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
3:00 pmCyber Intel Briefing: FinServCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:
Open Sessions
3:00 pm - 3:45 pmIn an increasingly volatile world, this session provides a crucial debrief on the most pressing global security issues and their direct impact on cybersecurity and business resilience. The talk will cover geopolitical flashpoints, including recent developments in China, Russia, Ukraine, and the European Union, examining how these international power shifts influence the digital landscape. It will also explore the dramatic changes in data privacy regulations in the age of AI, highlighting the new responsibilities for corporations.Finally, the presentation will provide actionable insights for building resilience against a backdrop of sophisticated cyber threats, from financially motivated groups targeting the financial sector to state-sponsored attacks. Attendees will leave with a clear understanding of the evolving threat landscape and a strategic framework to protect their organizations in 2025 and beyond.3:45 pmNetworking BreakRegistration Level:
Open Sessions
3:45 pm - 4:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pm[Closing Keynote] Zero Trust: Cutting Cyber Risks, Lowering Claims, and Unlocking Better Cyber Insurance!Global VP of M&A/Divestiture, Private Equity, and Cyber Risk, ZscalerRegistration Level:
Open Sessions
4:00 pm - 4:45 pmBreaches, ransomware, and AI-driven attacks are exposing the flaws of outdated perimeter defenses. Discover how Zero Trust Architecture can transform your cybersecurity strategy while unlocking better insurance outcomes! Marsh & McLennan’s recent report reveals that nearly $500 billion in annual cyber losses could be prevented with Zero Trust and robust cyber hygiene.
This session will empower you to:
- Minimize the impact of CVE’s and prevent breaches, while leveraging Zero Trust
- Reduce cyber insurance claims and losses with proactive defense
- Deductive analysis to secure more favorable cyber insurance policies
Attendees will learn how adopting zero trust network access enhances security posture and results in more favorable cyber insurance policies including:
- Preventing one third of cyber incidents
- Cutting breach costs by over 20%
- Reducing insured loss by up to 31%
- Google Cloud SecurityBooth: N/A
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- ZscalerBooth: N/A
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
Daniel GremaudCloud Security Architect, Google CloudAs a Google Cloud Security Architect, Daniel is a trusted advisor to HCLS customers and partners. Before Google, Daniel was a consultant at PricewaterhouseCoopers in their Cyber, Privacy and Forensics Practice. He is on the Board of Advisors to the University of Alabama Management Information Systems Department, serving the faculty and students brings him great joy. His goal is to not only secure his customer’s Google Cloud workloads, but also work to secure the entire sector.
Lanre OgunmolaGoogle Cloud Security Architect Team, US East & CanadaLanre is a member of Google Cloud Security Architect team for the US East & Canada. Lanre advises Google’s clients on cyber security and helps them to be in compliance with laws and regulations when using Google Cloud.
Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiCameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).
Amy YeeCDO & CDTO | Board Member & Advisor | PodcasterAmy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.
Bhaskar Bharat SawantSenior Software Engineer, Cornerstone Building BrandsBhaskar Bharat Sawant is a Senior Software Engineer and Team Lead at Cornerstone Building Brands with over 15 years of experience in enterprise architecture, cloud development, and regulatory compliance. Bhaskar has led initiatives in AI-driven testing, data privacy engineering, and pricing automation across complex .NET and Azure ecosystems. He is an IEEE Senior Member and a frequent reviewer and speaker at national and international tech conferences.
Mike TaylorTechnology Learning & Adoption Practitioner, NationwideMike Taylor is a learning designer, speaker, and consultant who helps organizations make cybersecurity awareness stick. With 20+ years of experience spanning instructional design, marketing, and technology, Mike specializes in transforming forgettable training into engaging, behavior-changing programs. He has led learning innovation at Fortune 500 companies and regularly shares practical strategies at conferences worldwide. As the author of Think Like a Marketer, Learn Like an L&D Pro, Mike empowers teams to communicate security messages that resonate and drive action.
Jennifer FiteData Strategy and Data Information Architect, Bank of AmericaExperienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.
Ian SunIT Support Specialist, Boston UniversityIan Sun is a cybersecurity researcher and conference speaker focused on social engineering defense and human layer security. He previously presented original research at SecureWorld Financial Services in 2025, where he introduced the Dissonance Test, a behavioral method for surfacing deception in hiring and access control, including nation-state infiltration into IT roles. His work bridges threat intelligence with practical defenses for help desks, hiring, onboarding, and workforce identity. Ian brings hands-on experience from MSP and university IT roles and holds CompTIA Network+, Security+, and ISC² Certified in Cybersecurity credentials. He is currently pursuing the PNPT.
Courtney HansVP, Cyber Services, AmTrust Financial ServicesCurrently the Vice President of Cyber Services for AmTrustCyber, Courtney Hans brings a variety of experience into her work. In her early career, Courtney was an adventure travel guide with a short window to make a strong impression. Curiosity became her superpower as she learned how to uncover the inner motivations of diverse groups of guests. Guiding, just like cybersecurity, requires agility and a cool head during a crisis. Formerly the Head of Security and IT for a growing SaaS startup, Courtney joined AmTrust to help to reduce risk and deepen the relationship between carrier and insured.
Adam BushManaging Director, Schellman
Benjamin CorllCISO, Americas, ZscalerBen is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, and CISO roles.
Prior to joining Zscaler, Ben was the VP/Head of Cybersecurity (CISO) for Coats, a global manufacturer of industrial thread. This was a newly created role that allowed Ben to build a program: from policies, creating and refining processes, to choosing technology controls. Ben is passionate about engaging with both security practitioners and business leaders on the value of digital transformation and preparing businesses to defend against threats. Much of his time is spent focusing teams on the fundamental practices or basics and doing them well before pivoting to more advanced solutions.
John HultquistChief Analyst, Google Threat Intelligence GroupJohn Hultquist is Chief Analyst of Mandiant Intelligence at Google Cloud. Prior to the acquisition of iSIGHT Partners by FireEye/Mandiant, John led iSIGHT’s cyber espionage practice, where his team uncovered the Russian threat actor best known as Sandworm. He has more than 15 years of experience covering emerging threats in cyber espionage and information operations, working in the private sector and the U.S. government. He is the founder of CYBERWARCON and SLEUTHCON.
Sam MasielloCISO, The Anschutz CorporationSam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to The Anschutz Corporation, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the protection of employee, consumer, and customer data for all of the organization's clients, which included many Fortune 500 companies.
Sam has also been the Chief Security Officer, Head of Application Security, and Head of Security Research at companies such as Groupon, Return Path, and McAfee. He currently serves as Director-at-Large of The Coalition Against Unsolicited Commercial Email (CAUCE), National Advisory Board Member for SecureWorld, and is an Executive Board Member of Colorado Cyber. He has previously served as a member of the Board of Directors for the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), the Steering Committee of the Online Trust Alliance (OTA), and a member of the Anti-Phishing Working Group (APWG).
Ankit GuptaSr. Security Engineer, Exeter Finance LLCAnkit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.
Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.
Stephen SinghGlobal VP of M&A/Divestiture, Private Equity, and Cyber Risk, ZscalerStephen Singh serves as the Global Vice President of M&A/Divestiture, Private Equity, and Cyber Risk at Zscaler, bringing more than 25 years of expertise in management consulting, professional services, enterprise IT, and cybersecurity.
Stephen established Zscaler’s Transaction Advisory Services practice, which assists Enterprises and Private Equity, by improving value creation, capture and preservation during mergers, acquisitions and divestitures.
He’s also been a prominent contributor to the cyber insurance ecosystem, collaborating with brokers, carriers, reinsurers, and clients to integrate emerging best practices—such as Zero Trust adoption—to mitigate claims and reduce financial losses.
Previously, Stephen served as Vice President and CTO at DXC Technology, where he guided clients through digital transformations by leveraging emerging technologies and industry-leading methodologies. Prior to that, he established Fidelity Investments' Enterprise Technology and Cyber Advisory Practice, addressing the firm's most complex business challenges.
Stephen’s career also includes leadership roles in Enterprise IT at globally recognized organizations, including PwC, Travelers Insurance, Juniper Networks, Cosine Communications, and AT&T.
He holds B.S. degrees in Computer Science and Applied Mathematics from the University of Rochester and has completed executive education at MIT’s Sloan School of Management.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
