Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, May 10, 20179:00 amSecureWorld Plus - May 10th - Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)President, CISSP, O'Leary Management EducationRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: Elm - Wednesday, May 11, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration Desk7:30 amExecutive Round Table Breakfast: Insider Threats-The Dangers From Within - VIP/Invite OnlyRegistration Level:VIP / Exclusive
7:30 am - 8:30 am8:30 amCyberwarfare and SecurityDirector, Center of Excellence in Digital ForensicsRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Pecan8:30 amCylance: Slipping Malware Past the AV Industry with EaseCISSP, Sr. Sales Engineer, CylanceRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: Elm8:30 amFast Track Your Security Program – A Security Architect’s Insights in Security Program Management to Quickly Achieve ResultsVP, Global Information & Product Security, PindropRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Live Oak A8:30 amPrivacy & Security Issues in Cloud ContractsManaging Partner, Scott & Scott, LLPRegistration Level:Conference Pass
8:30 am - 9:30 pmLocation / Room: Magnolia9:00 amExhibit Floor OpenRegistration Level:Open Sessions
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Cybersecurity & Risk to Corporate ReputatioDirector, Brunswick Group, Former Wall Street Journal ReporterRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 am11:15 amAnalyzing Digital EvidenceComputer Scientist, Northcentral UniversityRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Pecan11:15 amCisco: Strategies for Defending Against a New Breed of AttacksSr. Information Security ConsultantRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Live Oak A11:15 amProtecting Payments with PCIChief Technology Officer, PCI Security Standards CouncilRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Magnolia11:15 amRadware: Cyber War Chronicles - Stories From the Virtual TrenchesSystems Engineer, RadwareRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Elm12:00 pmAdvisory Council Roundtable Lunch - (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: Live Oak B12:15 pmLUNCH KEYNOTE: Radware The Current Economics of Cyber AttacksSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote Theater1:15 pmPanel: Locking Down the EndpointsRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Elm1:15 pmPanel: The Current ThreatscapeRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Magnolia2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pm2:30 pmDash for Prizes and CyberHunt Winners AnnouncedRegistration Level:2:30 pm - 2:45 pm3:00 pmCheck Point Software Technologies: Debunking Mobile Security MythsHead of Strategic Partnerships, Mobile, Check Point Software TechnologiesRegistration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Live Oak A3:00 pmConvincing Your Management, Your Peers and Yourself that Risk Management Doesn't SuckRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Elm3:00 pmData Breaches, Big Data, and FTC OversightAttorney, Haynes and Boone, LLPRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Pecan3:00 pmThe Insider ThreatChief Digital Forensic Investigator, Swailes Computer ForensicsRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Magnolia
- <Houston, TX 2016Booth: 400
- <Houston, TX 2016Booth: 520
- <Houston, TX 2016Booth: 340
- <Houston, TX 2016Booth: 600
- <Houston, TX 2016Booth: 510
- <Houston, TX 2016Booth: 345
- <Houston, TX 2016Booth: 540
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Andy BennettDirector, Center of Excellence in Digital Forensics
Andy is a native Texan with nearly 20 years of experience in IT, DF, and Cyber Security Issues. He is passionate about security works every day as the Director of the Center of Excellence in Digital Forensics to share that passion with others.
- Carlos KrystofCISSP, Sr. Sales Engineer, Cylance
Carlos has over 15 years of experience in IT security, with extensive knowledge in network, server, and endpoint security. He advises clients on malware prevention, endpoint visibility, host and network intrusion prevention, vulnerability and configuration management, firewalls\perimeter protection, and SIEM. He is an authority on Cylance, a next generation security product that uses artificial intelligence, predictive modeling, and machine-learning, to prevent malware from executing on endpoints. Mr. Krystof has an MBA with an MIS focus
- Manoj TripathiVP, Global Information & Product Security, Pindrop
Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C|CISO and the CISSP certifications.
- Robert ScottManaging Partner, Scott & Scott, LLP
Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s largest corporations, such as Schlumberger, PepsiCo, Iron Mountain and American Express, on information technology matters including intellectual property licensing, risk management, data privacy, and outsourcing.
- Siobhan GormanDirector, Brunswick Group, Former Wall Street Journal Reporter
Siobhan Gorman is a Director in Brunswick’s Washington, DC, office, where she co-leads the Cybersecurity & Privacy practice. Prior to joining Brunswick, Siobhan had a successful 17-year career as a reporter, most recently at The Wall Street Journal. There she covered hot and critical topics including cybersecurity, data and privacy issues, and terrorism. Before joining The Wall Street Journal in 2007, Siobhan covered intelligence and national security issues for The Baltimore Sun and National Journal.
- Chuck EasttomComputer Scientist, Northcentral University
Dr. Easttom is the author of 26 computer science books and over 40 research papers, as well as an inventor with 14 patents. He is a frequent speaker at computer science and security conferences, and is a Distinguished Speaker of the ACM (Association of Computing Machinery). He holds a Doctor of Science in cyber security and three masters degrees.
- John E. OdeSr. Information Security Consultant
John Ode has been involved in forensic computer analysis for over ten years. Well-versed in data recovery and analysis, Ode's broad experience includes computer forensics analysis, advanced data recovery and analysis, networking and telecommunications, computer security, client/server applications and implementations, and Internet Information Servers. As an Information Security Consultant for a large utility company, Ode provides internal consulting and technical advice on a wide variety of information including security issues, concerns, and problems. He is responsible for incident response for computer events, provides computer forensic support to the company's legal team, and offers direction, advocacy and awareness in line with the information security policies and architecture for the company as a whole.
In previous job roles, Ode held the position of senior IT systems security analyst for the Idaho State Police Cyber Crime Unit. Mr. Ode joined the Idaho State Police from Adecco, where he provided multi-platform server and security support for MPE, UNIX, NT, and SAP systems on a 24x7 basis to clients worldwide. Prior to Adecco, he began his career as a Unix Systems Security Officer and Systems Administrator for the US Air Force at Elmendorf Air Force in Anchorage, Alaska. Ode holds a BS in Information Technology from the University of Phoenix, Idaho campus and an Associate of Applied Science degree from Maxwell Air Force Base, Alabama.
- Troy LeachChief Technology Officer, PCI Security Standards Council
: Troy Leach is the Chief Technology Officer for the PCI Security Standards Council. In his role, Mr. Leach partners with Council representatives, Participating Organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject matter expert on payment security and holds advanced degrees from Syracuse University in network management and information security.
- Jing NghikSystems Engineer, Radware
Jing is a systems engineer at Radware, a leader in application delivery and security solutions that assures the availability, performance, and resilience of business-critical applications for over 10,000 enterprises and carriers worldwide. Jing is a seasoned security professional with over a decade of networking/security experience covering a wide array of related technologies including DDoS, WAF, DLP, IDS/IPS, cyber warfare, compliance, managed services, disaster recovery, and high availability.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Jae ShinHead of Strategic Partnerships, Mobile, Check Point Software Technologies
Jae Shin is the current Global Head of Mobile Strategic Partnership for Check Point Software Technologies based in San Carlos, California. Jae is responsible for creating and managing all mobile security ISV partners, carriers, and device OEM relationships. Jae is focused on integrating Check Point’s Mobile Threat Prevention into the enterprise mobile and connected ecosystem. Prior to Check Point, Jae served as the Global Vice President for Samsung Electronics Mobile Division responsible for commercializing the KNOX platform globally. Jae has over 24 years of enterprise telecommunication and mobile experiences.
- Pierre GrosdidierAttorney, Haynes and Boone, LLP
Pierre Grosdidier’s litigation practice focuses on complex commercial litigation, especially lawsuits and arbitrations with strong technical elements. He has litigated cases involving unauthorized computer access, trade secret theft, construction, oil and gas, and software copyright claims. Pierre also advises on data security, data breach and big data issues.
- Ted SwailesChief Digital Forensic Investigator, Swailes Computer Forensics
As a digital forensic expert and licensed private investigator in the state of Texas, Ted Swailes has over twenty-four (24) years of investigative and technical security experience working with major corporations and law firms. He has brought expertise and support services to engagements in intellectual property theft investigations, non compete investigations, computer crimes and breaches, as well as civil and criminal investigations. This expertise has contributed to successful outcomes with live trial testimony, depositions, affidavits, and statements of fact.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes