Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 17, 20179:00 amSecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program9 a.m. - 3 p.m. - Earn 12 CPEs!CISO, Uplight; Co-Host, Colorado = Security podcastRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: ElmManaging a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.
- Thursday, May 18, 20177:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 3:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:30 amSecurity During Acquisition or DivestitureIT ExecutiveRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: ElmBad actors are becoming more aware of mergers and acquisitions as targets. This session will focus on lessons learned from large real-world projects, including planning, governance and potential pitfalls.
8:30 amBluVector: Leveling the Cyber Battlefield: Using Machine Learning for a Moving DefenseThreat Researcher, BluVectorRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: Keynote (Magnolia)Some of the world’s best-known brands have invested millions in cybersecurity. So have their adversaries. But malicious actors count on the fact that your defenses tend to be the same across the board. This talk demonstrates how current defenses, including machine learning, are exploited and defeated and proposes a sensible solution.
8:30 amSymantec: Securing the Shift to Cloud Application UsageSr. Cloud Security Specialist, SymantecRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: Live Oak BAs security practitioners, we must walk the line between business enablement and data security. What if you can have both? Join Scott Gordon to discuss the security challenges faced with moving to the cloud, and what you can do to safely enable the use of Cloud applications in your environment.
8:30 amCyber or Insider Threat?Chief Digital Forensic Investigator, Swailes Computer ForensicsRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: PecanWhat’s the greater threat to businesses, cyber or insider? The reality is both as they are two sides of the same coin and related to one another.
9:30 amOPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private PartnershipCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote (Magnolia)Col. Cedric Leighton’s keynote presentation will cover the following:
– Overview of the Cyber Threat based on publicly available intelligence
– Why current Intelligence Community structure needs to be re-vamped for the Cyber Age
– How intelligence agencies should be working with private companies
– It’s about new legislation AND changing mindsets and cultures
– The new relationship between the US Intelligence Community and US companies in the Cyber Age – a vision for the future10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 amLocation / Room: Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council Roundtable: The Cost and Consequence of Insider Threats (VIP Only)Registration Level:VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: Live Oak A11:15 amRED TEAM: Active Hacker DrillsLearn how to safely simulate malicious activity to effectively measure cyber readiness & defense capabilities.Red Team Lead, Oil & Gas CompanyRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: ElmJoin us in a presentation that will demonstrate attack scenarios to effectively measure your cyber defense position. The presenter will demonstrate Red Team cyber readiness & defense capability testing techniques. The audience will discover new Red Team tools that are safe to use for your active simulations. Additionally, the presenter will share a unique approach to effectively producing metrics and measurements for active hacker drills.
11:15 amCisco: The Way We Work Has Changed. Has Your Security?Cyber Security Systems Engineer, CiscoRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Keynote (Magnolia)By 2018, Gartner estimates that 25% of corporate data traffic will bypass the perimeter. As organizations evolve their IT stack, traditional security approaches/architectures need to be reconsidered. This session will review some of the new risks introduced by SaaS/IaaS adoption and show how to effectively mitigate these risks using new approaches to security architecture.
11:15 amDrive Profitability While Supporting Safe and Secure Manufacturing OperationsSenior Security Architect, Booz Allen Hamilton, IncRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Live Oak BTechnology advancements increase “online” presence of operations in a business, they also create unintended cyber exposures which could potentially affect safety, quality and availability of production/manufacturing environments. Protecting business from adverse consequences requires collaboration between IT & OT to promote security awareness and unified protection efforts.
11:15 am[Trend Micro] Anatomy of a Ransomware Attack and Why It MattersSenior Security Engineer, Trend MicroRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: PecanCyber criminals can hijack your business by encrypting your data and holding your systems hostage until you pay up. Hackers use ransomware like CryptoLocker and CryptoWall to target a wide range of organizations like yours, demanding thousands of dollars. Find out how you can protect your business from ransomware security threats. Join Christian Fontaine, senior security engineer at Trend Micro, as he outlines the latest criminal underground threats and best practices to protect your data and systems.
12:00 pmAdvisory Council Lunch Round Table - The Threat of IoT to the Corporate Environment (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: Live Oak AThis session is for Advisory Council members only.
12:15 pmLUNCH KEYNOTE: Cisco - Emerging Threats - The State of CybersecurityThreat Researcher, Cisco Systems, Inc.Registration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote (Magnolia)People responsible for defending networks realize that the security threat landscape is constantly changing. Understanding how threats evolve is critical to building better defenses. In this presentation, I will analyze recent threats and see how Talos leverages large datasets to deliver product improvements and mitigation strategies to protect our customers.
1:15 pmPanel: You Got Burned, Now What? (Incident Response)Registration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: PecanWe’ve all heard the adage that it’s not if it happens but when you are inevitably breached… Do you have a plan? Even a framework to go off of? What do you include? Who do you include? How often should you be practicing this plan? Join our experts as they discuss incident response plans, who should be involved, best practices, and pitfalls.
Panelists:
Gregg Braunton, Catholic Health Initiatives
Duwayne Engelhardt, Wallisbank
Eric Botts, Swailes & Company
Manoj Tripathi, PROS
Pulse Secure
Paul Schofield, Ensilo
Ram Yarlagadda, Pulse Secure
Paul Schofield, enSilo
Moderator: Berris Bramble1:15 pmPanel: Building a Better Mouse Trap (Emerging Threats)Registration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote (Magnolia)To be successful, as an industry, we must strive to get ahead of the bad guys. Easy enough to say, but how? By taking a look at the capabilities of the threats we see today, we should be able to make some educated guesses on what threats of tomorrow will look like. We know the bad guys don’t follow the rules, take the path of least resistance, and don’t care who they hurt in the process. We need to start thinking like them so that we can figure out what their next step is instead of guessing and hoping.
PANELISTS:
Michael Gough, IMF Security
Loyd McBride, Keysight
Paul Brager, Baker Hughes GE
Eugene Kesselman, Tapjets
Paul Berryman, Deloitte
David O’Neil, Kudelski Security
Moderator: John Jorgensen, ABS Advanced Solutions1:15 pmIllumio: Stop Cyber Threats With Adaptive Micro-SegmentationDirector of Systems Engineering, US West, IllumioRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: ElmVirtualization, cloud, and the promise of containers have evolved data centers, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside data centers and clouds while speeding up application delivery.
2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
2:30 pmNetworking Break — Dash for Prizes and CyberHunt winners announcedRegistration Level:Open Sessions
2:30 pm - 2:45 pmLocation / Room: Exhibitor FloorBe sure to have your badge scanned with participating exhibitors throughout the day. Past prizes have included Kindles, Bose wireless headphones, gift cards, iPads, drones, and more! *Must be present to win.
3:00 pmSocial Engineering AutomationSecurity Engineer, AmazonTeleion ConsultingRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: PecanThe exponential security and privacy risks when social engineering is scaled via widely available APIs and automation frameworks.
3:00 pmMethods That Work: Security Awareness That Changes BehaviorCyber Risk Strategy Manager, DeloitteRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Live Oak B91% of cyber attacks start with a phishing email. Traditional security won’t protect you from users with poor security habits and criminals know it. Learn to be an educator, marketing guru, and entertainer to get users to adopt safe online behaviors.
3:00 pmStoryboarding Incident Response Methodology: Speed, Synergy and AccuracyBanking, Insider Threat OperationsRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: ElmIn the context of several real world IR events, participants will see, experience and participate in learning a new paradigm of “Storyboarding” Incident Response methodology.
- ACFE HoustonBooth: 430
We are the world’s largest anti-fraud organization and premier provider of anti-fraud training and education. The mission of the ACFE Foundation is to increase the body of anti-fraud knowledge by supporting future anti-fraud professionals worldwide through the funding of the Ritchie-Jennings Memorial Scholarship Program. The scholarship program provides an opportunity for men and women of all ages, races, religions and income levels to advance their education. Many of these outstanding and deserving students go on to become Certified Fraud Examiners.
- Binary DefenseBooth: 110
Binary Defense is a managed security services provider and software developer with leading cybersecurity solutions that include SOC-as-a-Service, Managed Detection & Response, Security Information & Event Management, Threat Hunting and Counterintelligence. Binary Defense believes its unique approach resolves infosec’s biggest challenges such as limited in-house security expertise, lack of innovative resources and the significant budgetary and time investment required to ensure protection from today’s threats.
- Blue CoatBooth: 230
Blue Coat is a leader in advanced enterprise security, protecting 15,000 organizations every day. Through the Blue Coat Security Platform, Blue Coat unites network, security and cloud, providing customers with maximum protection against advanced threats, while minimizing impact on network performance and enabling cloud applications and services.
- BluVector, Inc.Booth: 205
BluVector helps security teams respond to malicious threats up to 80% faster than current approaches. As a leader in Network Security Monitoring & Analytics, BluVector applies supervised machine learning and automation so security teams can detect and respond to advanced security threats at digital speed. For more information visit: www.bluvector.io
- CiscoBooth: 400
Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.
- Critical StartBooth: 540
Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.
- CybereasonBooth: 500
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- CyberTrendBooth: TBD
CyberTrend is a monthly business technology magazine for C-level executives, business owners, and affluent entrepreneurs. CyberTrend covers a broad range of technologies, companies, and solutions. Topics include mobility, security, data analytics, networking, communications, energy efficiency, and storage, among many others. Any technology that helps businesses become more efficient, improve ROI, and stay ahead of the competition is a fit for CyberTrend. CyberTrend helps readers understand the technologies that impact their organizations and make educated decisions when investing in new solutions.
- EC-CouncilBooth: TBD
International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.
- FortinetBooth: 100
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
- GemaltoBooth: 640
Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centers to devices and across networks. As the global leader in cloud and data protection, our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day.
- HTCIABooth: 350
Investigators on the Leading Edge of Technology
The High Technology Crime Investigation Association (HTCIA) was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes. As such, we are an organization that aspires to help all those in the high technology field by providing extensive information, education, collective partnerships, mutual member benefits, astute board leadership and professional management. Association Mission: Provide education and collaboration to our global members for the prevention and investigation of high tech crimes.
- IllumioBooth: 340
We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others. - InfraGardBooth: 240
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- ISACABooth: 620
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
- ISSA South TexasBooth: 410
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners. South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.
- Ixia, a Keysight BusinessBooth: 510
We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.
- JuniperBooth: CyberLounge, 130
Our customers don’t set out to build networks. They build on ideas that reinvent, reimagine, and improve the world around them. It makes sense that we should begin there, too.
Through our passion for creating high-performing networks, Juniper extends knowledge, collaboration, and human advancement in industries around the world—such as energy, healthcare, education, and many others.
While our innovative product and services portfolio evolves continuously, we need to reach farther to secure our customers’ long-term success. We’re looking beyond the horizons of today’s business challenges, and the technology future we see is built on real-time service integration. That means everything we develop must align with our vision.
- Kudelski SecurityBooth: 100
Kudelski Security is the premier cybersecurity innovator for Fortune 500 organizations. Our approach continuously evaluates customer’s security posture to reduce risk, maintain compliance and increase security effectiveness. Our partner, Wombat Security Technologies provides awareness and training to teach secure behavior. Wombat’s solutions reduce phishing attacks and malware infections up to 90%.
- LockpathBooth: 210
Lockpath is a software company bringing order to the chaos of managing risk. From SMB to enterprise, our risk management platforms flex and scale to existing processes enabling customers a straightforward approach to identify, understand, manage and report on risk.
- QBKEYBooth: 250
QBKEY is a pioneer in providing the most versatile and reliable data encryption solution for corporate clients and personal utilization as well. It allows users to manage their data, being at rest or in transit, in a truly BYOK fashion. Its next generation innovation provides a flexible, scalable and cost-effective TCO.
- SecureworksBooth: 200
Dell Secureworks is a global provider of intelligence-driven information security solutions exclusively focused on protecting its clients from cyberattacks. Dell SecureWorks’ solutions enable organizations to fortify their cyber defenses to prevent security breaches, detect malicious activity in real time, prioritize and respond rapidly to security breaches and predict emerging threats.
- Skybox SecurityBooth: 540
Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.
- SparkCognitionBooth: 220
SparkCognition is a global leader in cognitive computing analytics. A highly awarded company recognized for cutting-edge technology, SparkCognition is successfully deploying a cognitive, data-driven analytics platform for clouds, devices, and the Internet of Things industrial and security markets by applying patented algorithms that deliver out-of-band, symptom-sensitive analytics, insights, and security. For more information on the company, its technology and team, please visit http://www.sparkcognition.com.
- SymantecBooth: 230
Symantec is the world’s leading cyber security company. Organizations worldwide look to Symantec for strategic, integrated solutions to defend against sophisticated attacks, and more than 50 million people rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home. For more information, please visit www.symantec.com.
- TechTargetBooth: TBD
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThalesBooth: 520
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- Trend MicroBooth: 300
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- TrustedSecBooth: 110
TrustedSec is a leader in attack intelligence and security advisory services. Our team of highly talented, skilled, senior consultants sets us apart from other commodity-service security companies. We form partnerships with our number one goal to help you holistically improve your security program. You’ll find that working with us amounts to more than “just another engagement”—it’s establishing an understanding with your organization, and working to make you more secure, and better as a whole.
- ZscalerBooth: 320
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
- Alex WoodCISO, Uplight; Co-Host, Colorado = Security podcast
Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.
- Anita BatemanIT Executive
Anita is a 19-year technology veteran with experience at Fortune 500 and premier energy/utility firms. She has a demonstrated track record in management, delivery, architecture and cybersecurity. She holds a Master of Sciences in Computer Science from the University of Texas at Austin.
- Wes ConnellThreat Researcher, BluVector
As the Threat Researcher for BluVector, Wes Connell is especially motivated and passionate for dramatically improving data hunting tradecraft within the cyber security domain. Wes has a broad range of technical interests – particularly in the security dimension of hardware, software, systems, and networks.
- Scott GordonSr. Cloud Security Specialist, Symantec
Scott Gordon is a Senior Cloud Security Specialist at Symantec and has several years of experience with the industry leading CASB solution. Scott’s experience in International managed services product engineering and operations has given him fantastic insight into securing cloud-based applications and platforms.
- Ted SwailesChief Digital Forensic Investigator, Swailes Computer Forensics
As a digital forensic expert and licensed private investigator in the state of Texas, Ted Swailes has over twenty-four (24) years of investigative and technical security experience working with major corporations and law firms. He has brought expertise and support services to engagements in intellectual property theft investigations, non compete investigations, computer crimes and breaches, as well as civil and criminal investigations. This expertise has contributed to successful outcomes with live trial testimony, depositions, affidavits, and statements of fact.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Quincy JacksonRed Team Lead, Oil & Gas Company
Quincy Jackson (CISSP, C|EH, GCIA, GWAPT, GREM) currently works as a Red Team Lead with over 20 years experience. His primary responsibilities include programs to evaluate and measure the actual effectiveness of the Security Operations Center. His Cyber Readiness and Defense Capability Testing Programs were created to reduce uncertainty and give assurance regarding detection, analysis and cyber defense capabilities. Quincy also specializes in web application security, penetration testing, mobile device hacking, and cyber threat defense techniques.
- Nathan ChuCyber Security Systems Engineer, Cisco
Nathan Chu is a Systems Engineer who stands at the forefront of the Cyber Security Realm to help organizations prepare for inevitable intrusions. Prior to joining Cisco’s Cyber Security team, Nathan spent 4 years as a Generalist Systems Engineer, consulting design strategies with clients to construct best practice networks.
- Hien NguyenSenior Security Architect, Booz Allen Hamilton, Inc
Hien Nguyen brings more than 16 years of IT & OT experience in the public and commercial sectors which includes information security programs, network/system security architecture, and regulatory compliance.
Hien has also developed a growing professional service business inside a multinational management consulting firm with more than 5,000 security professionals on staff. He has worked with global enterprises to measure and mature their security capabilities across IT & OT functions. - Christian FontaineSenior Security Engineer, Trend Micro
Christian Fontaine serves as a Senior Security Engineer for the Southeast region. He sits on several security committees at Trend Micro that evaluate and architect solutions that meet current demands for virtual and cloud environments. He has served as CISO at Humber College / University of Guelph at Humber in Canada. He has also served as a private security consultant for police agencies in Canada.
- Alex ChiuThreat Researcher, Cisco Systems, Inc.
Alex is a Threat Researcher for the Talos Group at Cisco Systems, a group that specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. Much of his time is spent hunting for new and evolving threats and making sure customers are protected from them.
- Todd TruittDirector of Systems Engineering, US West, Illumio
- Alejandro VillegasSecurity Engineer, Amazon
Seasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001
- Julie VillegasTeleion Consulting
- Dr. Paul BerrymanCyber Risk Strategy Manager, Deloitte
Paul Berryman, EdD, CISSP, CISA, is a Cyber Risk Strategy Manager. He’s worked in IT security for almost 2 decades protecting against the usual suspects of hackers, criminals, and bored teenagers. After 6 years of swashbuckling adventures with the US Navy, he’s led several security operation teams. He’s a big fan of colleges, having attended 7 different ones, most recently at the University of Houston where he earned a doctorate specializing in learning and technology. Strong security starts with teaching how to behave online. It isn’t rocket science, but just in case he has a degree in that, too.
- Gregg BrauntonBanking, Insider Threat Operations
A strategic security partner blended with deep operational, architecture, and compliance expertise. Innovative, strategic, and tactical security leadership utilizing "business aligned" and "data-driven" cybersecurity models and frameworks. Gregg has 20+ years extensive cyber expertise leading and delivering cybersecurity operations, architecture, and security risk life-cycle management in highly compliant driven risk frameworks: HIPAA, FISMA, NIST, HiTrust. TOP SECRET CLEARANCE.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes