googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Tuesday, May 10, 2017
    9:00 am
    SecureWorld Plus - May 10th - Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)
    • session level icon
    speaker photo
    President, CISSP, O'Leary Management Education
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Elm
  • Wednesday, May 11, 2016
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Executive Round Table Breakfast: Insider Threats-The Dangers From Within - VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    8:30 am
    Cyberwarfare and Security
    • session level icon
    speaker photo
    Director, Center of Excellence in Digital Forensics
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Pecan
    8:30 am
    Cylance: Slipping Malware Past the AV Industry with Ease
    • session level icon
    speaker photo
    CISSP, Sr. Sales Engineer, Cylance
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Elm
    8:30 am
    Fast Track Your Security Program – A Security Architect’s Insights in Security Program Management to Quickly Achieve Results
    • session level icon
    speaker photo
    VP, Global Information & Product Security, Pindrop
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    Location / Room: Live Oak A
    8:30 am
    Privacy & Security Issues in Cloud Contracts
    • session level icon
    speaker photo
    Managing Partner, Scott & Scott, LLP
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:30 pm
    Location / Room: Magnolia
    9:00 am
    Exhibit Floor Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 3:00 pm
    9:30 am
    OPENING KEYNOTE: Cybersecurity & Risk to Corporate Reputatio
    • session level icon
    speaker photo
    Director, Brunswick Group, Former Wall Street Journal Reporter
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    Location / Room: Keynote Theater
    10:15 am
    Conference Break / Exhibitor Product Demonstration
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:15 am
    11:15 am
    Analyzing Digital Evidence
    • session level icon
    speaker photo
    Computer Scientist, Northcentral University
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Pecan
    11:15 am
    Cisco: Strategies for Defending Against a New Breed of Attacks
    • session level icon
    speaker photo
    Sr. Information Security Consultant
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Live Oak A
    11:15 am
    Protecting Payments with PCI
    • session level icon
    speaker photo
    Chief Technology Officer, PCI Security Standards Council
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Magnolia
    11:15 am
    Radware: Cyber War Chronicles - Stories From the Virtual Trenches
    • session level icon
    speaker photo
    Systems Engineer, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Elm
    12:00 pm
    Advisory Council Roundtable Lunch - (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Live Oak B
    12:15 pm
    LUNCH KEYNOTE: Radware The Current Economics of Cyber Attacks
    • session level icon
    speaker photo
    Security Evangelist, North America, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    Location / Room: Keynote Theater
    1:15 pm
    Panel: Locking Down the Endpoints
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Elm
    1:15 pm
    Panel: The Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Magnolia
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:30 pm
    Dash for Prizes and CyberHunt Winners Announced
    Registration Level:
    2:30 pm - 2:45 pm
    3:00 pm
    Check Point Software Technologies: Debunking Mobile Security Myths
    • session level icon
    speaker photo
    Head of Strategic Partnerships, Mobile, Check Point Software Technologies
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Live Oak A
    3:00 pm
    Convincing Your Management, Your Peers and Yourself that Risk Management Doesn't Suck
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Elm
    3:00 pm
    Data Breaches, Big Data, and FTC Oversight
    • session level icon
    speaker photo
    Attorney, Haynes and Boone, LLP
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Pecan
    3:00 pm
    The Insider Threat
    • session level icon
    speaker photo
    Chief Digital Forensic Investigator, Swailes Computer Forensics
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Magnolia
Exhibitors
  • Houston, TX 2016
    Booth: 400
  • Houston, TX 2016
    Booth: 520
  • Houston, TX 2016
    Booth: 340
  • Houston, TX 2016
    Booth: 600
  • Houston, TX 2016
    Booth: 510
  • Houston, TX 2016
    Booth: 345
  • Houston, TX 2016
    Booth: 540
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.

  • speaker photo
    Andy Bennett
    Director, Center of Excellence in Digital Forensics

    Andy is a native Texan with nearly 20 years of experience in IT, DF, and Cyber Security Issues. He is passionate about security works every day as the Director of the Center of Excellence in Digital Forensics to share that passion with others.

  • speaker photo
    Carlos Krystof
    CISSP, Sr. Sales Engineer, Cylance

    Carlos has over 15 years of experience in IT security, with extensive knowledge in network, server, and endpoint security. He advises clients on malware prevention, endpoint visibility, host and network intrusion prevention, vulnerability and configuration management, firewalls\perimeter protection, and SIEM. He is an authority on Cylance, a next generation security product that uses artificial intelligence, predictive modeling, and machine-learning, to prevent malware from executing on endpoints. Mr. Krystof has an MBA with an MIS focus

  • speaker photo
    Manoj Tripathi
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.

  • speaker photo
    Robert Scott
    Managing Partner, Scott & Scott, LLP

    Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s largest corporations, such as Schlumberger, PepsiCo, Iron Mountain and American Express, on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing.

  • speaker photo
    Siobhan Gorman
    Director, Brunswick Group, Former Wall Street Journal Reporter

    Siobhan Gorman is a Director in Brunswick’s Washington, DC, office, where she co-leads the Cybersecurity & Privacy practice. Prior to joining Brunswick, Siobhan had a successful 17-year career as a reporter, most recently at The Wall Street Journal. There she covered hot and critical topics including cybersecurity, data and privacy issues, and terrorism. Before joining The Wall Street Journal in 2007, Siobhan covered intelligence and national security issues for The Baltimore Sun and National Journal.

  • speaker photo
    Chuck Easttom
    Computer Scientist, Northcentral University

    Dr. Easttom is the author of 26 computer science books and over 40 research papers, as well as an inventor with 14 patents. He is a frequent speaker at computer science and security conferences, and is a Distinguished Speaker of the ACM (Association of Computing Machinery). He holds a Doctor of Science in cyber security and three masters degrees.

  • speaker photo
    John E. Ode
    Sr. Information Security Consultant

    John Ode has been involved in forensic computer analysis for over ten years. Well-versed in data recovery and analysis, Ode's broad experience includes computer forensics analysis, advanced data recovery and analysis, networking and telecommunications, computer security, client/server applications and implementations, and Internet Information Servers. As an Information Security Consultant for a large utility company, Ode provides internal consulting and technical advice on a wide variety of information including security issues, concerns, and problems. He is responsible for incident response for computer events, provides computer forensic support to the company's legal team, and offers direction, advocacy and awareness in line with the information security policies and architecture for the company as a whole.

    In previous job roles, Ode held the position of senior IT systems security analyst for the Idaho State Police Cyber Crime Unit. Mr. Ode joined the Idaho State Police from Adecco, where he provided multi-platform server and security support for MPE, UNIX, NT, and SAP systems on a 24x7 basis to clients worldwide. Prior to Adecco, he began his career as a Unix Systems Security Officer and Systems Administrator for the US Air Force at Elmendorf Air Force in Anchorage, Alaska. Ode holds a BS in Information Technology from the University of Phoenix, Idaho campus and an Associate of Applied Science degree from Maxwell Air Force Base, Alabama.

  • speaker photo
    Troy Leach
    Chief Technology Officer, PCI Security Standards Council

    : Troy Leach is the Chief Technology Officer for the PCI Security Standards Council. In his role, Mr. Leach partners with Council representatives, Participating Organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject matter expert on payment security and holds advanced degrees from Syracuse University in network management and information security.

  • speaker photo
    Jing Nghik
    Systems Engineer, Radware

    Jing is a systems engineer at Radware, a leader in application delivery and security solutions that assures the availability, performance, and resilience of business-critical applications for over 10,000 enterprises and carriers worldwide. Jing is a seasoned security professional with over a decade of networking/security experience covering a wide array of related technologies including DDoS, WAF, DLP, IDS/IPS, cyber warfare, compliance, managed services, disaster recovery, and high availability.

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
    Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
    Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
    Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation.

  • speaker photo
    Jae Shin
    Head of Strategic Partnerships, Mobile, Check Point Software Technologies

    Jae Shin is the current Global Head of Mobile Strategic Partnership for Check Point Software Technologies based in San Carlos, California. Jae is responsible for creating and managing all mobile security ISV partners, carriers, and device OEM relationships. Jae is focused on integrating Check Point’s Mobile Threat Prevention into the enterprise mobile and connected ecosystem. Prior to Check Point, Jae served as the Global Vice President for Samsung Electronics Mobile Division responsible for commercializing the KNOX platform globally. Jae has over 24 years of enterprise telecommunication and mobile experiences.

  • speaker photo
    Pierre Grosdidier
    Attorney, Haynes and Boone, LLP

    Pierre Grosdidier’s litigation practice focuses on complex commercial litigation, especially lawsuits and arbitrations with strong technical elements. He has litigated cases involving unauthorized computer access, trade secret theft, construction, oil and gas, and software copyright claims. Pierre also advises on data security, data breach and big data issues.

  • speaker photo
    Ted Swailes
    Chief Digital Forensic Investigator, Swailes Computer Forensics

    As a digital forensic expert and licensed private investigator in the state of Texas, Ted Swailes has over twenty-four (24) years of investigative and technical security experience working with major corporations and law firms. He has brought expertise and support services to engagements in intellectual property theft investigations, non compete investigations, computer crimes and breaches, as well as civil and criminal investigations. This expertise has contributed to successful outcomes with live trial testimony, depositions, affidavits, and statements of fact.

secure world app
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes