Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, May 2, 20179:00 amSecureWorld PLUS Course – Big Data and IoT: Wonderful, Terrible, Inevitable9 a.m. - 3 p.m. - Earn 12 CPEs!President, CISSP, O'Leary Management EducationRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: Court Yard 2Join us the day before the conference for 6 additional CPE credits (12 total when attending the PLUS course and the conference).
Big Data and the Internet of Things are revolutionizing virtually every industry. We’re told of pinpoint accurate medical records and diagnostics, all-encompassing analytics, mastery of industrial processes, effortless control of our static and moving environments and complete connectivity and communication with anything and everything we might ever imagine being useful. Wonderful!
But SecureWorld attendees and others who’ve been in IT Security for any appreciable time have an internal red flag that goes up upon hearing “It’s gonna be great!” Then those euphoria-deflating security questions start multiplying and running through our somewhat addled brains. Where is all this Big Data coming from? Where will it reside? Who controls it? Who grants access? On what basis? How do we know it’s accurate, relevant? Is it complete enough for life and death medical decisions? What about analytics system administration; data monitoring and correction procedures; incompatible security architectures? Oh yeah, and privacy?
What kind of security is built into all these Internet-connected devices? How easy is it to control access? Is the data they trade and store encrypted? Who’s liable if they fail or give erroneous signals?
Big Data and IoT are neither fads nor merely trends, they constitute a revolution. There’s no going back. Join us as we look from a security perspective at both the bright and dark sides.
- Wednesday, May 3, 20177:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amAdvisory Council Round Table: The Costs and Consequences of Insider Threat (VIP / Invite Only)Coffee / Breakfast ServedChairman and Founder, Ponemon InstituteRegistration Level:VIP / Exclusive
7:30 am - 8:30 amLocation / Room: Court Yard 78:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 3:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:30 amDefenders Want to Score Goals Too!InfraGard Session - Open to All AttendeesCOO, Tenfold Security, Board of Trustees, University of Saint MaryRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: Keynote TheaterFile hashes, signatures and IP addresses provide us the ability to defend our organizations, yet breaches still occur. Rather than always playing defense, we will provide you with activities and examples of how to get ahead of the attackers and score goals.
8:30 amIoT Defense: A Holistic ApproachCIO / CTO, Summit Carbon SolutionsRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Court Yard 3Reviewing the current state of IoT devices, their cloud endpoints and the connection between them to understand the threat landscape and where our focus needs to be in the years ahead.
8:30 amAligning Functional Roles to Support Governance and Leadership in CybersecurityISACA Session - Open to all AttendeesSr. Manager, Internal Audit, Spirit AeroSystemsRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Court Yard 4With cybersecurity gaining more visibility and importance in the corporate boardroom, how does one effectively use their role to help support the governance function in this critical area of any organization? Come and explore how to be a key part of your team, no matter your level.
8:30 amThe State of the StateGain a better understanding of what the state of Missouri is doing to protect its citizens information.Network Security Analyst CIT III, Office of Cyber Security, State of MissouriRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Court Yard 5This presentation will be discussing the state of Missouri’s security posture and what we have seen in the last year.
9:30 amOPENING KEYNOTE: The Cost and Consequences of Complexity in IT SecurityChairman and Founder, Ponemon InstituteRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote TheaterThe actions of Imposters, negligent and malicious insiders can have significant financial and reputational consequences for companies. Most companies, according to recent Ponemon Institute research, admit they have failed to detect a data breach involving the loss or theft of business-critical information. They also believe it is highly likely that one or more pieces of information critical to the success and competitiveness of their companies is now in the hands of a competitor. In this session, Dr. Larry Ponemon will quantify the cost of the insider risk, why the threat is serious and how to secure business-critical information in the workplace.
10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 amLocation / Room: Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:15 amReady Is the New Black: Data Theft, Breach Response, and Liability UpdatesPartner and Co-Chair of the Data Security and Privacy Practice, Armstrong TeasdaleRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Court Yard 5When it comes to data security, knowing a little goes a long way. Jeff Schultz, Armstrong Teasdale partner and co-chair of the firm’s Data Security and Privacy practice, will cover common and even some unexpected threats, how to prepare for and how to respond following a breach, and potential liability.
11:15 amContainers: Burden or Benefit for InfoSec?Container Fundamentals, Security Concerns and Best PracticesCISO, QTS DatacentersRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Court Yard 3Application containers provide abstraction and isolation between applications and the operating system, enabling portability. But what about security? Infosec professionals need to understand how application containers impact an organization’s security posture. Come learn the fundamentals of application containers, the security challenges and opportunities they introduce, and best practices / strategies.
11:15 am[Radware] Cybersecurity Pushed to the LimitSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Court Yard 4Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the U.S. presidential election, worldwide malware outbreaks and the Equifax data breach. These and other high-profile events spurred greater cyber-defense investment by everyone from nation states and global corporations to individuals purchasing anti-malware solutions for personal devices. Yet even as investments increase so do threats, hacks and vulnerabilities. This session will help you understand these complex and challenging dynamics. Based on findings from Radware’s research and a global industry survey, the session will show real attack data and customer stories to paint a picture of where we are and what security professionals can do.
Join the session to learn more about:
• The threat landscape deep dive—the who, what and why of attacks
• Potential impact on your business, including associated costs of different cyber-attacks
• Critical attacks in the midst: DNS, IoT and risks lurking in the cloud
• Emerging threats and how to protect against them
• A look ahead – predictions and what to prepare for11:15 amInfosec Heresies: What We’re Doing Isn’t WorkingIt’s time to question your own authority.Information Security and Infrastructure Manager, Educational Testing ServiceRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Court Yard 6Stop writing policies that no one reads or enforces. Stop paying for security tools that don’t demonstrably reduce risk. Stop saying “no” to everyone. Maybe a bit of information security heresy is just what we need to reverse the trend of information security failures in our organizations.
12:00 pmAdvisory Council Round Table: Riding the IoT Cloud: Marketing Genius or Privacy Nightmare? (VIP / Invite Only)Lunch ServedRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: Court Yard 712:15 pmLUNCH KEYNOTE: Surviving the Siege – Medieval Lessons in Modern SecurityPresident, CISSP, O'Leary Management EducationRegistration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote TheaterWarfare and the arts of intrusion have advanced considerably since the Middle Ages, but in many ways the principles of fortification we use today remain the same. The great castles of antiquity were ingeniously designed with multiple layers of physical security to protect their inhabitants from persistent, even advanced enemy threats. Their carefully planned and creative defensive measures provide rich metaphors, both positive and negative, for today’s cyber guardians. On the other hand, clever, daring, sometimes brilliant offensive strategies and tactics have historically breached battlements thought to be unassailable. Come join us as we examine lessons that can be applied to securing our own sophisticated digital fortresses.
1:15 pmPanel: Cloudy with a Chance of BreachRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Court Yard 3Everything old is new again. Migrating to the cloud certainly is not a new thing. It is for some smaller companies that are just now able to afford making the move to the cloud. Cloud boasts a secure, disaster proof option for companies to store their data offsite with access to that data from practically anywhere. So, who’s fault is it when the data is compromised? What if your information is stolen from the cloud because another user’s data was at fault? At the end of the day, isn’t the cloud just someone else’s computer? Join this panel discussion as they guide you through the pros and cons in migrating to the cloud.
Panelists
Ronald Pipkins, Alert Logic
Brandon Bradshaw, Trend Micro
Ron Shuck, CURO Financial Technologies Corp.
Kevin Augspurger, Unite Private Networks
Moderator: Florian Yanez, Helzberg Diamonds1:15 pmPanel: Building a Better Mouse Trap (Emerging Threats)Registration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterTo be successful, as an industry, we must strive to get ahead of the bad guys. Easy enough to say but how? By taking a look at the capabilities of the threats we see today we should be able to make some educated guesses on what threats of tomorrow will look like. We know the bad guys don’t follow the rules, take the path of least resistance, and don’t care who they hurt in the process. We need to start thinking like them so that we can figure out what their next step is instead of guessing/hoping.
Panelists
Sean Griesheimer, RSA
Scott Hamann, One Identity
Heeyoung Sim, Darktrace
Justin Sharples,Core First Bank & Trust
Rich Keith, SailPoint
Moderator: John Godfrey, CISO, University of Kansas Medical Center2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
2:30 pmNetworking Break — Dash for Prizes and CyberHunt winners announcedRegistration Level:2:30 pm - 2:45 pmLocation / Room: Exhibitor FloorBe sure to have your badge scanned with participating exhibitors throughout the day. Past prizes have included Kindles, Bose wireless headphones, gift cards, iPads, drones, and more! *Must be present to win.
3:00 pmHow Mature is Your Security Program?CISO, Veterans United Home LoansRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Court Yard 3We will look at a couple of tools that quickly and easily help any organization assess the maturity level of their security program. We will also show how to use the results to help communicate risk and drive spending in the right areas to show demonstrable improvement in a short time.
3:00 pmFor The Record: SPF, DKIM, and DMARC RecordsSecKC SessionDirector of Technical Operations - Cino Ltd | Director of IT, Challenger SportsRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Court Yard 5Discover SecKC, and learn how to use SPF, DKIM, and DMARC records to define who can and can’t send email AS YOUR COMPANY to the world, as well as specify what to do with messages that don’t align with your policies. See real-world examples of how the speaker blocks approximately half a million fraudulent messages per week using these simple tools.
3:00 pmRSA: Top 5 Challenges & Mistakes in Breach Detection and ResponseRecognize and avoid common breach challenges, and understand the importance of comprehensive visibility.Field CTO (US) & Principal Sales Engineer, RSARegistration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Court Yard 4Organizations of all sizes are under attack today, and one common challenge is how ill–prepared we all tend to be while responding. Join RSA as we talk about lessons learned and how to most effectively combine people, processes, and technologies in the midst of a breach response.
3:00 pmWhat I Learned from Building an ISO 27001 Compliant Security ProgramDirector of Information Security & Privacy Officer, Children InternationalRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Court Yard 6ISO Certification is globally recognized. If you or your company are considering certification, discover what you will encounter
along the way from someone who has gone through the process.
- BeyondTrustBooth: 108
BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Our integrated products and platform offer the industry’s most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.
The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. We are trusted by 20,000 customers, including 78 of the Fortune 100, and a global partner network.
- Black DuckBooth: 101
Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.
- DataLockerBooth: 120
DataLocker is the leading provider of advanced encryption solutions. With a complete suite of hardware encrypted products, cloud encryption gateway and central management platforms, DataLocker protects sensitive data and intellectual property for thousands of government, military and enterprise clients worldwide.
- EC-CouncilBooth: TBD
International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.
- FireEyeBooth: 209
FireEye (https://www.fireeye.com/) is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,100 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.
- GemaltoBooth: 133
Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centers to devices and across networks. As the global leader in cloud and data protection, our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day.
- GuidePoint Security LLCBooth: 108
GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com
- HexaditeBooth: 108
Hexadite AIRS connects to existing security detection systems to investigate every threat, leveraging artificial intelligence to apply targeted mitigation to stop security breaches in their tracks.
- InfraGardBooth: 200
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- Integration PartnersBooth: 221
We know and understand you have options when choosing the right partner. Networking technology alone isn’t a differentiator, it’s how we do business with you. We’ve curated the best solutions not just to support IT needs, but to support your business strategy. Our culture is one that influences the customer experience. We never stop improving, and so we will never let you fall behind. From this simple and often overlooked practice, we believe the greatest customer relationships come from our mutual and shared strategies. Now just think… WHAT’S POSSIBLE.
- ISACA Kansas CityBooth: 232
Welcome to the local Kansas City Chapter of ISACA® (ISACA KC Chapter). The ISACA KC Chapter was founded in 1984 and continues to promote the education of individuals relating to the auditing of, management consulting in, or direct management of the fields of IT governance, IS audit, security, control and assurance.
- ISC2Booth: 132
ISC2 is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, ISC2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. Our membership, over 123,000 strong, is made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. Our vision is supported by our commitment to educate and reach the general public through our charitable foundation, The Center for Cyber Safety and Education™.
- ISSA Kansas CityBooth: 213
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. Through its membership, ISSA – Kansas City helps security professionals in the Kansas City area learn of information security issues and trends, which promote education, collaboration, and leadership, and further the information security profession.
- Kansas City ECTFBooth: 228
The USSS ECTF aims to increase the resources, skills and vision by which state, local, and federal law enforcement agencies team with prosecutors, private industry and academia to fully maximize what each has to offer in an effort to combat criminal activity. The common purpose is the prevention, detection, mitigation, and aggressive investigation of attacks on the nation’s financial and critical infrastructures.
- KU – Edwards CampusBooth: 233
The University of Kansas holds a tradition of excellence over a century old. In the 1970s, it shared that tradition with Greater Kansas City by providing courses to working professionals. In 1993 the university opened another location, the KU Edwards Campus, to provide permanent growth and education in the Kansas City community. In the past two decades, it has contributed more than $400 million to the Johnson County economy. In 2008, the Edwards Campus became proud partners in the Johnson County Education Research Triangle.
- MalwarebytesBooth: 100
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations, simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives. Visit us at www.malwarebytes.com/business.
- OktaBooth: 108
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- ProofpointBooth: 113
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- RadwareBooth: 208
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- Rapid7Booth: 201
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- RSA a Dell Technologies CompanyBooth: 128
RSA Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change.
- SecKCBooth: 240
For those of you in Kansas City who find yourselves doing information security work as part of the day-to-day (be it consulting, penetration testing, internal compliance or just being the netadmin or sysadmin that has to mind the patches, firewalls and whatnot), I suggest trying to make it to SecKC.
- SentinelOneBooth: 108
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- TechTargetBooth: TBD
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- TenableBooth: 108
Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
- VenafiBooth: 108
Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.
With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms; four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.
For more information, visit: www.venafi.com.
- ZscalerBooth: 129
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Dr. Larry PonemonChairman and Founder, Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.
Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
- Aaron WeissenfluhCOO, Tenfold Security, Board of Trustees, University of Saint Mary
Aaron cofounded Tenfold Security after serving thirteen years as the Chief Information Security Officer of American Century Investments and Cboe Global Markets (previously Bats Global Markets). He joined Bats Global Markets in 2008 and built the information security program from the ground up. Following the acquisition of Bats Global Markets by the Chicago Board Options Exchange (CBOE), he became the Global Chief Information Security Officer of the combined entity. In his role, he oversaw all information and physical security along with environmental, security compliance, personnel security, monitoring and policy/procedure.
Aaron holds an MBA and bachelor’s in education from the University of Saint Mary and a Bachelor’s in Telecommunications Management from DeVry University. He currently serves as a board member of the University of Saint Mary Board of Trustees and maintains a CISSP certification.
- Jason CraditCIO / CTO, Summit Carbon Solutions
Jason Cradit is a highly-skilled technology executive with a passion for creating innovative solutions in the energy and utilities industry. For two decades, Jason has helped companies use technology to streamline their processes, reduce costs, and increase efficiencies by challenging the status quo and leading teams to set higher bars with modern technologies. He is a versatile executive with experience as a software solutions leader, consultant, and operator. Jason's academic journey includes a bachelor's degree in business management from Baker University, a master's in computer science from the University of Kansas, and a master’s in business administration from Rockhurst University. Additionally, he holds many industry certifications such as CISSP, CCSP, AWS Architect, Azure Architect, and many more.
- Brian HowellSr. Manager, Internal Audit, Spirit AeroSystems
Brian is a business and technology risk advisor with nearly 25 years of experience in various risk management, audit and business process functions. In his current role at Spirit, he serves as a Senior Manager within the Internal Audit group focused on operational and IT audits.
He is a member of both the IIA and ISACA and is a Certified Information Systems Auditor certification.
- Aaron RileyNetwork Security Analyst CIT III, Office of Cyber Security, State of Missouri
Born and raised in Kansas City, I'm a proud Missourian. I have received two degrees from Moberly Area Community College in computer science and working on a third. I have been with the state for 3 years and am currently with the SOC team in the Office of Cyber Security.
- Dr. Larry PonemonChairman and Founder, Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.
Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
- Jeff SchultzPartner and Co-Chair of the Data Security and Privacy Practice, Armstrong Teasdale
Jeff Schultz is an experienced business litigator with extensive knowledge about the field of data security and privacy. He is co-chair of Armstrong Teasdale’s Data Security and Privacy practice group and a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals.
- Andrew WildCISO, QTS Datacenters
Andrew Wild is the chief information security officer at QTS Data Centers, the only fully integrated data center, managed hosting and cloud services provider. Wild has spent more than 25 years developing effective, customer-driven information security, incident response, compliance and secure networking programs for technology and telecommunications organizations.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Robert DewhirstInformation Security and Infrastructure Manager, Educational Testing Service
Mr. Dewhirst is a senior information security professional with 24 years of experience in software development and IT systems management. He currently manages information security, infrastructure and system administration for the K-12 testing systems of the world's largest private nonprofit educational testing and assessment organization.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Caleb ChristopherDirector of Technical Operations - Cino Ltd | Director of IT, Challenger Sports
Caleb Christopher is the Director of Technical Operations at Cino Ltd - a national cybersecurity and risk
management firm; and the Director of IT at Challenger Sports - a global soccer camp organization. He has 9+ years experience in security. - Ben SmithField CTO (US) & Principal Sales Engineer, RSA
Ben Smith is Field CTO (US East) with RSA, and a technically-focused risk management executive with over 25 years’ experience. He holds the CISSP and CRISC certifications and has presented on RSA's behalf at cybersecurity events sponsored by Gartner, FS-ISAC, ISSA, BSides, ICI, (ISC)2, ISACA, InfraGard, HTCIA and other organizations.
- Rob Arnold, ModeratorDirector of Information Security & Privacy Officer, Children International
Rob Arnold is Director of Information Security at Children International, where his job is protecting the data and systems we use to fight to end global poverty. Twenty-eight years of working in Information Technology in the public and private sector has given Rob the conviction that successful outcomes happen when you don’t let the technology overshadow the people and the process.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes