- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, May 29, 20249:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO, Cyber Risk Opportunities LLCRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: La BibliotecaHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, May 30, 20247:30 amRegistration openRegistration Level:
- Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amJoint Chapter Meeting of Cyversity, ISSA, and ISACA [Open to all attendees]United We Stand: Associations Align to Elevate the Cybersecurity ProfessionPresident, ISSA South Florida; Membership Director, ISACA South FloridaVP, Partnerships and Volunteering, Cyversity South Florida ChapterDirector of Membership, ISSA South Florida ChapterRegistration Level:- Open Sessions
8:00 am - 8:45 amLocation / Room: Castilla/CordovaGet an inside look as representatives from Cyversity, ISSA, and ISACA South Florida share insights on actively shaping the future of the profession and nurturing the diverse cybersecurity workforce. With an increasingly interconnected risk landscape, collaboration across organizational boundaries is more vital than ever. This session highlights how associations are combining efforts to rise above silos and fragmentation. From developing unified skills frameworks to strengthening ethical principles, hear about cooperative initiatives underway and planned for the future.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)VP & CISO, Hard RockDirector, Global Information Security, Royal Caribbean GroupRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amLocation / Room: GranadaModerated discussion for SecureWorld Advisory Council members. By invite only.
8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Cyber World on Fire: Global Digital War's Impact on Governments, SocietiesCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterIn this eye-opening keynote loaded with an insider’s perspective on the latest developments in the Global Cyber War, hear how the Ukraine-Russia and Israel-Hamas wars and continual attacks from nation-states on entities across the globe are impacting governments and societies around the world. Weaving together the latest cyber intelligence with current military, diplomatic, government, and corporate developments, Col. Leighton assesses current efforts to counter bad actors and charts a path forward as the good guys and gals rush headlong into a cyber world heavily influenced by the dawn of AI and other game-changing technologies.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amRunning Cybersecurity as a BusinessCISO & Chief Trust OfficerRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: BarcelonaThe old way of running security no longer works. Providing insights from a CISO’s perspective—and perhaps with some controversial takes—this keynote delves into the strategic shift from traditional IT security to “trust product development” measured in value outcomes. The session underlines how such a strategic pivot can meet rigorous cybersecurity standards while promoting growth and retention by aligning trust mechanisms to various customer stakeholders.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsCISO, YAGEO GroupDirector, Information Security & Compliance, Carnival Cruise LineCISO, RegScaleCo-Founder & Community Director, Mind Over CyberRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: Castilla/CordovaThis panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Four cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience. Moderated by Carlos Guerrero, Co-founder and Community Director for Mind Over Cyber.
10:15 amGenerative AI: The Double-Edged Sword in CybersecuritySr. Solutions Engineer, CloudflareRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: BahiaAre you ready to face the impending surge of Generative AI-powered cyber threats? Join us as we arm you with the essential knowledge and tools to fortify your defenses against this rapidly evolving threat landscape. Together, we will explore:
The Dark Side of Generative AI: How Hackers are Weaponizing this Technology
- Phishing Evolved: Witness how AI can generate highly convincing emails and social media posts that evade conventional detection techniques.
- Malware on Steroids: Uncover the alarming trend of AI-driven malware development, resulting in faster and more advanced threats.
- LLM Supply Chain Poisoning: Experience a LIVE demonstration of this groundbreaking attack method and grasp its far-reaching consequences.
Empowering Your Defenses & Harnessing the Potential of Generative AI Responsibly
- Fortifying Your Fortress: Implement crucial security strategies to shield your organization from the onslaught of Generative AI-based attacks.
- Staying Vigilant: Master the art of identifying and neutralizing these ever-evolving threats before they wreak havoc on your systems.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amThe Future of Encryption: Quantum Computing and AISr. Intelligence Analyst, Expedia GroupRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: Bahia“The Future of Encryption: Quantum Computing and AI” explores the impending impact of quantum computing on current encryption methodologies and how AI can offer solutions. This presentation highlights quantum-resistant encryption algorithms, preparing audiences for the significant changes quantum advancements will bring. Case studies from startups and tech firms developing quantum-safe encryption solutions will provide practical insights. The key takeaway will emphasize the urgency of adapting to quantum computing developments to ensure robust, future-proof encryption strategies. This topic is crucial for understanding the evolving landscape of cybersecurity in the quantum/AI era.11:10 amLessons Learned from a Lifetime as a CISOSVP & Global CSO, FoundeverRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: Barcelona11:10 am[Panel] Unveiling the Threat Landscape and Unmasking Digital VillainsPrincipal Solutions Architect, LaceworkSr. Solutions Engineer, OasisSales Specialist, Harmony Enterprise, Check PointVP, Cybersecurity, DAS HealthDeputy CISO, CarrierRegistration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: Castilla/CordovaIn the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.
Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.
Our panel provides a comprehensive overview of the current threat landscape.
12:00 pm[Lunch Keynote] Drag Racing & Cybersecurity: The CrossoverAssociate CISO, St. Luke's University Health NetworkRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterYou’d be amazed what you can learn from everyday hobbies or obstacles to help you become a better practitioner. Krista Arndt shares a very personal story of survival after a bad drag racing accident in 2015. It was a life-altering experience and provided perspective on her personal and professional life that drives her every day as a loving mom and wife, volunteer, and successful CISO.12:00 pmAdvisory Council Lunch Roundtable (VIP / Invite Only)How to Secure Your Organization from Internal and External Identity-Based ThreatsVice President of Technology & CISO, CSXVP, Cybersecurity, BlackstoneRegional CISO (Americas), DHL ExpressChief Executive Officer, GuruculRegistration Level:- VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: GranadaDo you know if a threat is an Insider Risk or a Compromised Identity? Securing your organization from identity-based threats is paramount to reducing cyber risk. Security operations teams need the tools to help them quickly determine if they are dealing with a true insider threat or a compromised account. It’s important to link identity, access and activity to achieve clarity about gaps and risks that insider or external threat actors can exploit. In this panel discussion, we will discuss ways to combat these threats, reduce the attack surface, manage risk, and protect your enterprise.
Advisory Council roundtable discussion moderated by:
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmRebooting Executive Engagement: Communicating Cybersecurity Risk to the Business and BoardGroup VP, Global Head of Cybersecurity, Techtronic IndustriesRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: BarcelonaThis conversation is about resetting executive engagement, putting a business context around security, and literally how we invest in security.
You should not assume that your board members have the right information to make business decisions about cybersecurity investment just because they are nodding and smiling as you speak to the business about the importance of cybersecurity.
Topics include:
- Some metrics
- Simplified risk assessment
- Many dialects within an organization
- Security is a business decision, not your decision
1:15 pmUsing People, Process, and Technology to Build a World-Class SOCCISO, State of North DakotaRegistration Level:- Conference Pass
1:15 pm - 2:00 pmLocation / Room: BahiaIn this session, Michael will discuss People, Process, and Technology and how he has used this methodology for process improvement to SOC operations. Michael will provide examples of the wins he has experienced and share that along with the metrics to measure your progress.
1:15 pm[Panel] The Secret Potential of AI and ML: Empowering Cyber Superheroes with Artificial IntelligencePrincipal Sales Engineer, BlackBerryCo-Founder & CEO, Reco.aiSr. Principal Product Manager, VeracodeAI Architect & Senior Technical Fellow, Arctic WolfDirector of Product, NetwrixCISO, JM Family EnterprisesRegistration Level:- Open Sessions
1:15 pm - 2:00 pmLocation / Room: Castilla/CordovaArtificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.
Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.
Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmFrom CISO to Jedi Master: How to Organize for Success and Build a High-Performance TeamCISO, Miami Dade CollegeRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: Castilla/CordovaThis presentation provides to participants a comprehensive understanding of building and maintaining cybersecurity high-performance teams, emphasizing operational excellence, effective management systems, and continuous improvement methodologies. The presentation elaborates on various critical aspects such as the importance of a supportive organizational culture, alignment of security objectives with business goals, and the necessity for continuous learning and adaptation to evolving security challenges. It incorporates frameworks like Lean Management, Four Disciplines of Execution (4DX), and Five-Dysfunctions of a Team (5DoT), illustrating how these frameworks can be applied to enhance team performance and cybersecurity practices. It is structured to transition from identifying obstacles to implementing strategic tactical solutions, culminating in a call to action for cybersecurity leaders to adopt these frameworks and strategies to foster a culture of high-performance and operational excellence.
Summary:
This presentation explores the formation and management of high-performance teams within the information security realm. It delves into operational excellence, daily management, policy deployment, and the frameworks essential for building effective teams. Participants will gain insights into high-performance teams’ characteristics, success factors, and challenges, aiming for a comprehensive understanding of strategies to achieve and sustain organizational excellence.
Key Take-Aways:
- Attendees will learn how to align organizational efforts toward achieving strategic objectives, emphasizing the importance of a corporate culture dedicated to continuous improvement and performance enhancement. This knowledge empowers them to foster operational excellence within their teams or organizations.
- Participants will gain insights into forming high-performance teams characterized by a shared mission, clear goals, and strong interpersonal trust. They’ll leave with strategies for enhancing team interaction, flexibility, and conflict resolution, vital for achieving superior results and fostering a committed, passionate team environment.
- Demonstrate understanding of different frameworks for implementing effective daily management and policy deployment practices. This includes understanding the significance of standardized work, visual metrics, and accountability dashboards. Attendees will be equipped with actionable strategies for increasing competitive advantage through improved business planning and strategy execution.
2:10 pmHarnessing Nature's Wisdom: Growing a Security Champion Program into a Security PowerhousePrinciple Technical Security Engineer, YahooRegistration Level:- Conference Pass
2:10 pm - 2:55 pmLocation / Room: BahiaGet ready to discover the transformative power of a security champion program called “Deputy Paranoids,” adopted by Yahoo to safeguard its sensitive information. Initially started by a small group of passionate security engineers, this program has evolved into a company-wide powerhouse that uses sound methodology and empirical science to produce data-driven results.
The program’s success has been nothing short of remarkable. Engineers who participate in it have become known as security influencers, deeply embedded within their teams and aligned with Yahoo’s collaborative culture. These influencers have fostered trust and ownership across the organization by engaging the security team early in the development stage, using security tools, and remitting issues.
But the program’s real strength lies in its ability to adapt, evolve, and weather the storms of change, much like a giant redwood tree. The data-driven results of the “Deputy Paranoids” program serve as a testament to the power of aligning with nature’s wisdom, positively impacting the organization’s security landscape.
2:10 pmBlackGirlsHack Meeting [Open to all attendees]Offensive AI: The Future of Red TeamingFounder & Executive Director, BlackGirlsHackRegistration Level:- Open Sessions
2:10 pm - 2:55 pmLocation / Room: BarcelonaIn today’s evolving threat landscape security professionals must stay ahead by adopting innovative tools and methodologies. This talk, given by the founder of the international cybersecurity nonprofit BlackGirlsHack, delves into the intersection of Python, artificial intelligence, and network security by demonstrating a customized security tool for exploring reconnaissance and resource development vulnerabilities within the MITRE ATT&CK framework.
During the session, we will examine how the tool leverages Python and ChatGPT’s capabilities to streamline reconnaissance and resource development tactics, enhancing the effectiveness of penetration testing exercises. The talk will provide insights into integrating artificial intelligence, particularly ChatGPT, to augment the tool’s capabilities, enabling testers to focus their efforts more efficiently.
Attendees will witness a live demonstration showcasing the practical application of HackingBudy in conducting external network penetration tests, leveraging the MITRE ATT&CK framework. We will also discuss scenarios where artificial intelligence can be leveraged to optimize testing strategies, ultimately bolstering cybersecurity defenses.
By the end of the talk, participants will understand how artificial intelligence can be harnessed to enhance penetration testing efforts, thereby fortifying their organizations against emerging cyber threats.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:- Open Sessions
3:00 pm - 3:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Uses and Limits of AI in SecurityGlobal CISO, Carnival CorporationCISO, Advisory Board MemberRegistration Level:- Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterSession description coming soon.
- Arctic Wolf NetworksBooth: 320
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- AxoniusBooth: 330
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.
- BlackBerry CybersecurityBooth: 180
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
- BlackGirlsHackBooth: 130
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- Check Point Software TechnologiesBooth: 210
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- CloudflareBooth: 310
Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications, and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.
Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations—from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.
Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest internet trends and insights at radar.cloudflare.com.
- CriblBooth: 325
Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.
Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.
- CyeraBooth: 160
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.
- Cyversity South FloridaBooth: 140
Cyversity South Florida is here! We are very much looking forward to engaging with you! We have lots of plans in-the-works, and hope you’ll join us in furthering our MISSION: “Achieving the consistent representation of women, underrepresented minorities, and all veterans in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.”
- EntrustBooth: 300
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.
- GuruculBooth: 270
Gurucul is a global cybersecurity company that is changing the way organizations protect their most valuable assets, data and information from insider threats and external cyberattacks, both on-premises and in the cloud. Gurucul’s real-time Cloud-native Next-Gen Security Analytics and Operations Platform provides customers with Next Generation SIEM, UEBA, Open XDR, and Identity & Access Analytics. It leverages machine learning behavior profiling with predictive risk-scoring algorithms to predict, detect and prevent data breaches, fraud and insider threats. It also reduces the attack surface for accounts and eliminates unnecessary access rights and privileges to increase data protection.
Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world-renowned experts in government intelligence and cybersecurity. The company was founded in 2010 by seasoned entrepreneurs with a proven track record of introducing industry-changing enterprise security solutions. Gurucul’s mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.
Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise. It is also used for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response. Gurucul is headquartered in Los Angeles, CA.
- InfraGard South Florida Members AllianceBooth: 120
The mission of the InfraGard South Florida Members Alliance is to assist in protecting our region’s critical infrastructure from threats and attack, either physical or cyber. This mission is accomplished through the following:
- Secure facilitation of information sharing
- Collaboration with public/private industry professionals and government agencies at all levels (local, state, and federal)
- Training and education of our membership, and community outreach
- ISACA South FloridaBooth: 110
Our Chapter was chartered as the 33rd chapter of the Information Systems Audit and Control Association® (ISACA®) on December 2nd, 1978. The South Florida chapter includes approximately 1,400 members in the South Florida region, which spans a large geographic territory, including Miami, Fort Lauderdale, West Palm Beach, Naples, Fort Myers, and Port St. Lucie.
Mission Statement: “To help South Florida realize the positive potential of technology.”
Vision Statement: “We are a diverse group of innovative thought leaders partnering with the community to serve as the first choice for professional development and a global role model for ISACA Chapters by 2024.”
- ISC2 South Florida ChapterBooth: 200
We are the South Florida chapter of ISC2, a local non-for-profit association for information security leaders and practitioners.
Our chapter’s program is founded on the exchange of ideas and knowledge and focused on the development of leadership and professional skills aimed at advancing the profession of information security practitioners.
We invite all information technology and security professionals in our community to join our local chapter and make a positive impact in your community.
- LaceworkBooth: 260
Lacework automates security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), providing a comprehensive view of risks across cloud workloads and containers. Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance.
- Mission Critical SystemsBooth: 190
Mission Critical Systems is an information technology security reseller and integrator, providing information, network, and data security solutions since 1997 throughout the Southeast United States and Caribbean. Because information security is our only business, we can fully focus on helping your organization find effective solutions to the unique security challenges businesses confront in today’s ever changing cybersphere.
We offer a wide range of products from the world’s leading manufacturers including firewalls, email security services, network access control, auditing tools, strong authentication, endpoint security, database security, malware protection and secure wireless solutions.
Our knowledgeable, experienced sales consultants and highly trained engineers maintain the latest manufacturer certifications to ensure that our clients get the most accurate and up-to-date information available today. From assessment and implementation services through installation, maintenance and upgrades, our skilled engineers can save you time and maximize the value of your technology. We have the resources to provide unparalleled support on the products we provide. Allow us to become your trusted security advisors.
- NetwrixBooth: 340
Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact.
More than 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure. - OasisBooth: 240
Oasis Security is the leading provider of Non-Human Identity Management (NHIM) solutions. NHI Management is a huge and unresolved security weakness that is constantly exploited by malicious cyber attackers. By enabling control over Non-Human Identities, we bridge the gap between devops/R&D and security ensuring our customers elevate their security posture while maintaining highly efficient operations.
- Palo Alto NetworksBooth: 170
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
- Perception PointBooth: 220
Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation detection, investigation, and remediation of all threats across an organization’s main attack vectors – email, web browsers, and cloud collaboration apps. The solution’s natively integrated and fully managed incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights; providing proven best protection for all organizations.
Deployed in minutes, with no change to the enterprise’s infrastructure, the patented, cloud-native and easy-to-use service replaces cumbersome legacy systems to prevent phishing, BEC, spam, malware, zero-days, ATO, and other advanced attacks well before they reach end-users. Fortune 500 enterprises and organizations across the globe are preventing attacks across their email, web browsers and cloud collaboration channels with Perception Point.
Our unique technology which uses 7 advanced detection layers to provide a single verdict in just seconds, has been recognized by Gartner and has proven time and time again to deliver the most effective ROI when compared to leading cyber solutions. As a result, the company now serves hundreds of global enterprises from all sizes and across all verticals, including Telecom, Food & Beverage, Tech, Healthcare, Finance, Insurance and more.
- Reco AIBooth: 350
An identity-centric SaaS security platform that empowers organizations to understand their entire SaaS environment, control access, and protect from exposure.
- RubrikBooth: 360
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.
- SIM South FloridaBooth: n/a
The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:
- Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
- Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
- Challenging our comfort levels by exchanging ideas with peers and business counterparts.
- Being a resource for each other, and personal networking.
- South Florida ISSA ChapterBooth: 150
The South Florida chapter of the Information System Security Association (ISSA) stands as a cornerstone within the global ISSA community, celebrated for its prominence and esteemed reputation.
Since its inception in 1998, the South Florida ISSA has consistently organized Security Conferences every two years. These events have featured keynote speeches from illustrious figures such as Orson Swindle, former head of the FTC, alongside other notable experts from leading corporations and academic institutions.
With a dynamic involvement in the InfoSec realm, South Florida ISSA engages a diverse audience ranging from managers to technical specialists, addressing a wide spectrum of InfoSec subjects. This engagement extends through their monthly meetings and various specialized events.
A highlight of our calendar is the Hack the Flag Challenge, which takes place annually in September. This event is acclaimed throughout Florida as a top-tier collaborative learning opportunity within the industry.
Furthermore, South Florida ISSA takes pride in being the professional sanctuary for numerous ISSA Senior Members, including the distinguished ISSA Fellow William A. Cellich, underscoring its significant contribution to the community and the field at large.
- TeamOne.SupportBooth: 100
TeamOne.Support, founded in 2022, blends technological innovation with a commitment to U.S. veterans, offering IT and cybersecurity training aimed at empowering and providing them with sustainable career paths in the tech industry. This initiative, driven by a deep sense of social responsibility, has evolved into a full-service IT provider with a focus on high-security standards and flexible veteran employment.
TeamOne.Support’s story is rooted in a unique confluence of technological expertise and a deep sense of social responsibility towards U.S. veterans. It began in 2022 with a commitment to provide veterans with IT and cybersecurity skills as a way to address veteran suicides. This project expanded rapidly, evolving from training programs into a full-fledged IT service provider by late 2023. As the organization grew, it maintained its focus on empowering veterans in the tech industry, ensuring high security standards in their services and creating flexible, meaningful job opportunities for veterans, reflecting a successful merger of professional skill development and impactful social contribution.
- ThreatLockerBooth: 250
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- TorqBooth: 230
Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.
- VeracodeBooth: 195
Veracode is intelligent software security. The Veracode Software Security Platform continuously finds flaws and vulnerabilities at every stage of the modern software development lifecycle. Using powerful AI trained on a carefully curated, trusted dataset from experience analyzing trillions of lines of code, Veracode customers fix flaws faster with high accuracy. Trusted by security teams, developers, and business leaders from thousands of the world’s leading organizations, Veracode is the pioneer, continuing to redefine what intelligent software security means.
- WiCyS Florida AffiliateBooth: n/a
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Yosi AttiasPresident, ISSA South Florida; Membership Director, ISACA South Florida
Yosi has an extensive career that spans leading SaaS firms and the development of cutting-edge cloud technology companies. His contributions to national initiatives have fortified the digital landscape and enhanced corporate security measures. As the President of ISSA South Florida and Membership Director of ISACA South Florida, Yosi continues to inspire and lead the information security community with his extensive expertise in Electronic Identity, Operational Technology, Network and Application Security and Risk Management.
- John MasseriniVP, Partnerships and Volunteering, Cyversity South Florida Chapter
- Brent PutnamDirector of Membership, ISSA South Florida Chapter
Brent Putnam is a Certified Information Systems Security Professional with more than two decades experience in IT and IT security operations, management, and compliance in companies such as Ernst & Young, Novell, and The TJX Companies. More recently, Brent led the implementation of a NIST-based information security program at the Broward County Clerk of Courts, and managed IT security operations at West Marine, including vulnerability scanning, cybersecurity awareness & training, and PCI assessment. Brent is currently managing director of Cyber Security Assurance LLC, a south-Florida based consultancy, and serves the information security community as Membership Director for the South Florida chapter of the Information Systems Security Association (ISSA), and Communications Director of the ISSA Education Foundation.
- Johann Balaguer, ModeratorVP & CISO, Hard Rock
- Jason StockingerDirector, Global Information Security, Royal Caribbean Group
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Sabino MarquezCISO & Chief Trust Officer
Sabino Marquez' approach to leading cybersecurity as a ‘Trust Product Practice’ has led to substantial returns on security investments, higher value-generation velocity, and enhanced equity valuations. Sabino leads the Trust Product organization as a go-to-market leader, working alongside the productive business to enable and defend value, and transforming stakeholder Trust into a powerful tool for competitive differentiation. Within his key areas of focus, Sabino ensures robust protection mechanisms are in place for stakeholder interests while also leveraging organizational Trust as a distinct advantage in a competitive market landscape. His work has not only brought him recognition as ‘2023 C100 Winner’, but he is also an esteemed thought leader who frequently shares insights in Security Magazine, The Wall Street Journal, and Cyber Security Tribe.
- Michael CalderinCISO, YAGEO Group
Michael Calderin is a seasoned executive with 30 years of information technology, security, and risk mitigation experience for major global companies. Recognized for demonstrating a natural aptitude for process improvement, as well as for driving efficiency while containing costs, he has a verifiable history of contributing directly to company growth and expansion throughout his career. As such, Michael consistently exceeds budgetary and performance goals and is adept at achieving maximum operational output with minimal resource expenditure. Professional focal points include disaster recovery, incident response, security awareness, and process improvement. Delivering superior results on the latter areas of expertise requires utilization of effective communication skills, troubleshooting skills, as well as technical acumen, systems analysis, project management, and resource management to support efficiency and maximum returns.
Currently, Michael is the Chief Information Security Officer with the YAGEO Group, the global leader in chip resistors and tantalum capacitors. He leads a high-performing security team supporting 40,000 employees across 20+ countries. Michael regularly liaises with senior leadership, stakeholders, and cross-functional teams to ensure the company’s security practices are driving the business forward.
Colleagues describe Michael as a progressive, driven, down-to-earth, technical and security expert who can be relied on to offer superior solutions that deliver profitable results on time and under budget.
A native to South Florida, Michael has served in leadership roles in various community organizations, is a founding member of the South Florida CISO Forum, serves on the Evanta’s Florida CISO Governing Body, and dedicates time advising security startups and building new capabilities for the industry.
- Michelle GarciaDirector, Information Security & Compliance, Carnival Cruise Line
Michelle is recognized as a leader in the fields of IT and OT Cyber Security with an extensive foundation of knowledge in ecommerce, security operations, technology globalization and pioneering where cybersecurity and vessel safety converge. In Michelle’s 30-year career, she has extensive experience leading diverse teams across multiple technologies and platforms.
Michelle has deep knowledge in the areas of SOX and PCI-DSS compliance as well as international regulations specific to IMO and SOLAS. Her security expertise includes security management, attack surface management, application security, incident response, vulnerability management, and project management. She is a master at building and leading high-performance teams.
Michelle holds a bachelor’s degree in Business Management with a concentration in Marketing and a master’s degree in Cyber Security Management and Policy as well as professional certifications from the Project Management Institute and SANS Institute.
She is currently a director at Carnival Cruise Line where she is the head of IT Security and Compliance.
- Larry Whiteside Jr.CISO, RegScale
- Carlos Guerrero, ModeratorCo-Founder & Community Director, Mind Over Cyber
Given that his roots are in fine arts, Carlos Guerrero's journey into the world of cybersecurity and compliance might seem unconventional. However, it is precisely this artistic background that has shaped his distinctive approach and allowed him to thrive as a Senior Account Executive at 360 Advanced, a leading cybersecurity audit and compliance firm.
With a decade of experience in IT, cybersecurity, and GRC, Carlos has established himself as a trusted advisor to cybersecurity leaders navigating the complexities of the modern business landscape. His art training has cultivated a rare blend of creative thinking, visual communication skills, and attention to detail – traits that have proven invaluable in an industry that demands innovative solutions.
Moreover, Carlos' artistic background has fostered a deep sense of empathy and emotional intelligence, which he leverages to build strong interpersonal relationships and understand clients' unique needs. This human-centric approach, combined with his adaptability and willingness to iterate, has been instrumental in his ability to guide organizations toward secure and compliant operations.
With his diverse skill set and commitment to fostering trust through active listening and following through on commitments, Carlos continues to make a significant impact in the cybersecurity realm, redefining what it means to be a successful business leader in this dynamic field.
- Ryan BensonSr. Solutions Engineer, Cloudflare
Ryan Benson is a seasoned networking & security engineer, technologist, and industry thought-leader with more than 20 years of experience in the field. He is an Electrical Engineer originally from Louisiana, with experience guiding clients in the energy, defense, government, and mostly large commercial enterprise space in the Southeast U.S.
Currently, Ryan is serving as the Enterprise Solutions Engineer for Cloudflare in the Southeast Enterprise segment, delivering connectivity-cloud designs. In this role, he is responsible for working with Cloudflare's largest commercial customers to help them design and implement effective security, performance, and next-generation networking solutions.
Prior to his current role, Ryan designed several large global enterprise networks, aiding cloud transformation projects. He is recognized as an expert in Zero Trust Security Architecture and is an evangelist for the importance of adopting an identity and data-centric approach to security in modern organizations. Ryan has delivered talks on cybersecurity at several industry events and conferences. His expertise and experience in the field make him a valuable asset to any organization looking to improve their cybersecurity posture.
- Bidemi OlogundeSr. Intelligence Analyst, Expedia Group
Bid is a seasoned intelligence analyst with years of experience and industry certifications in security operations, threat intelligence, cybercrime investigations, inter-agency collaboration, and lots more. He's currently a Senior Intelligence Analyst at Expedia.
- Chris KnauerSVP & Global CSO, Foundever
As Chief Security Officer at Foundever, Chris Knauer is responsible for defining the company’s overall security strategy and improving the effectiveness of global security for the organization. In this role, Chris drives initiatives that enhance the group’s people-driven culture with security programs that align with the group’s core values and build trust with its clients. He has more than 25 years of experience in progressive security and technology roles with global brands.
- Carlos BacquetPrincipal Solutions Architect, Lacework
Carlos Bacquet is a Principal Solutions Architect at Lacework where he solves Cloud Security problems for enterprise customers in the Toronto region. Before joining Lacework Carlos spent the last 15 years working on network management and security applications in the Telecommunications, Cable and Streaming Media industries. Carlos holds a Bachelor of Computer Science and a Master in Computer Science with focus on machine Learning applied to Security applications. His areas of expertise include Kubernetes security and machine learning security applications applied to cloud infrastructure.
- Alex DavidovSr. Solutions Engineer, Oasis
Alex Davidov is a Senior Sales Engineer at Oasis where he helps customers with a new era of Non Human Identity management. He has over 15 years’ of experience with Cyber Security including Application Security Posture Management at Apiiro, Privilege Access Management at Cyberark and Web Application Security at Akamai.
- Daniel PollackSales Specialist, Harmony Enterprise, Check Point
Daniel is a 25-year veteran within the Security, Mobile Services, and Networking industry. Daniel helps businesses understand the risk and impact of cyberthreats that enterprises face in today’s always changing environment. As security risks continue to evolve from signature-based attacks to behavioral attacks, it is imperative that organizations have layers of security to detect these anomalies. It is just as important to have organizational processes and expertise in place to assess data from multiple sources and the ability to take action.
- Mike SpurrVP, Cybersecurity, DAS Health
- Thuy Tran-Korns, ModeratorDeputy CISO, Carrier
- Krista ArndtAssociate CISO, St. Luke's University Health Network
Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.
Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.
When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.
- Gary EppingerVice President of Technology & CISO, CSX
- Lena LicataVP, Cybersecurity, Blackstone
- Frankie RamosRegional CISO (Americas), DHL Express
- Saryu Nayyar, ModeratorChief Executive Officer, Gurucul
Saryu Nayyar is an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council. She has more than 15 years of experience in the information security, identity and access management, IT risk and compliance, and security risk management sectors. She was named EY Entrepreneurial Winning Women in 2017. She has held leadership roles in security products and services strategy at Oracle, Simeio, Sun Microsystems, Vaau (acquired by Sun) and Disney. Saryu also spent several years in senior positions at the technology security and risk management practice of Ernst & Young. She is passionate about building disruptive technologies and has several patents pending for behavior analytics, anomaly detection and dynamic risk scoring inventions.
- Eduardo Ortiz-RomeuGroup VP, Global Head of Cybersecurity, Techtronic Industries
A change leader, Eduardo Ortiz is considered one of the leading corporate authorities in building effective cybersecurity programs for global operations.
He has spent his career guiding the design, build, evolution, and strength of Information Systems (IS) and Cybersecurity programs for global and domestic companies across diverse industries. Eduardo has fostered corporate transformations across multibillion-dollar operations by connecting Cybersecurity to brand reputation and revenue growth. He has cultivated and influenced the corporate adoption of a security-conscious mindset through awareness training, risk quantification, easy-to-embrace policies, and system support. He has successfully turned IT cost centers into profit centers.
Protecting data, assets, and intellectual property, Eduardo’s tenacity and innovation in security systems strategy have benefitted operations and brand reputations across APAC, EMEA, Australia, and New Zealand, within myriad industries, including technology innovation, industrial, government agencies, manufacturing, and various private and public sector companies worldwide.
A trusted advisor and solutions partner to the C-suite, executive boards, investors, private equity groups, and leaders across every function of an organization, Eduardo has been responsible for designing innovative security solutions and architecture development to protect data integrity, availability, and confidentiality across digital assets, products, people, and brand reputation.
As Global Head of Cybersecurity for Techtronic Industries, Inc., a $13B global operation, Eduardo oversees a 28-member global team of direct-level IT engineers and analyst staff, and multiple CIOs representing divisions worldwide. Eduardo architected, deployed, and supervised the first full-scale global Managed Detection and Response program for Techtronic Industries. He helps companies prioritize risk to return with their IT and cybersecurity programs, and has played a vital role in reducing vulnerability, improving alignment between globally dispersed locations, and addressing global cybersecurity resiliency.
In his previous role as CISO and Director of Information Security for one of the world’s leading providers of correctional detention services, Eduardo rebuilt the Cybersecurity and IS function for The GEO Group, evolving and aligning the company’s systems, governance, and overall operations implementation. While with GEO, Eduardo was also tapped to travel to Australia to turn around a stalled $800M facility construction project facing challenges with the Australian government on security certifications. His communication, leadership, and negotiation skills swiftly turned the project and certification around, enabling the facility to open early and within budget. Eduardo eventually served as CISO for the new facility.
A committed corporate leader with a coaching mindset, Eduardo thrives on building high-performance, engaged, and accountable global teams that can swiftly deliver on aggressive goals. A frequently requested public speaker and a thought leadership guest on industry-related talk shows and podcasts, Eduardo holds an MS in Industrial Technology and a BS from Purdue University. He has earned multiple certifications, including QTE, CISM, and GSLC and is a valuable executive advisory board member on multiple corporate and nonprofit boards. Eduardo resides in South Florida with his wife and daughters.
- Michael GreggCISO, State of North Dakota
Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.
With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.
- Mark HamelPrincipal Sales Engineer, BlackBerry
Mark Hamel has worked in technology for more than 30 years, with experience in Mobility, Mobile Security, and Cybersecurity. As a Principal Sales Engineer at BlackBerry Cybersecurity, he provides technical and security guidance to global enterprises interested in implementing AI-based endpoint security solutions. He holds a degree in Computer Science from the University of Pittsburgh.
- Kyle MetivierSr. Principal Product Manager, Veracode
Kyle is a Principal Technical Product Manager helping Veracode apply bleeding edge technologies to practical applications in the interest of a cybersecure future. Kyle has worked for over 10 years across private industry and the DoD empowering software teams to develop secure code at scale.
- Ryan OistacherDirector of Product, Netwrix
Ryan Oistacher is an accomplished product marketing leader and business technologist with extensive experience in the Microsoft ISV partner ecosystem. His expertise in market research, operations, and enterprise technologies has allowed him to successfully connect the worlds of IT and business, enabling organizations realize greater value from their information technology investments. Ryan has held crucial product marketing positions at notable companies such as Netwrix Corporation, Dell, Quest Software, and Kore.AI. He excels at collaborating with engineering and product management teams to bring innovative technologies to market, ensuring their successful adoption and implementation. He holds a BA from the University of Florida.
- Victor Campos, ModeratorCISO, JM Family Enterprises
- Dr. Domingo CastilloCISO, Miami Dade College
Dr. Castillo is the Chief Information Security Officer of the Miami Dade College (MDC) since 2020. Founded in 1959, MDC is the second-largest college or university in the United States, and it is the #1 in associated degrees awarded in Liberal Arts and Sciences, General Studies, and Humanities. Mr. Castillo’s prior roles include Chief Information Security Officer at the University of Arkansas (UofA), Fayetteville. The Carnegie Foundation classifies the University of Arkansas among only 3 percent of universities in America that have the highest level of research activity. Before joining UofA, Mr. Castillo was the Regional Information Security and Compliance Officer at Chubb where he was responsible for implementing and managing cost-effective solutions to successfully protect the information assets for the Company’s Latin America division.
In 2018, Mr. Castillo was awarded the (ISC)² Best Information Security Practitioner Award during the 2018 Information Security Leadership Awards (ISLA®) Americas ceremony at the eighth annual (ISC)² Security Congress in New Orleans, LA. The ISLA Awards Program celebrates the accomplishments of individuals in the private and public sectors throughout the Americas, outside of the U.S. federal government, who are inspiring change within the field of cybersecurity. (ISC)² is the world’s largest nonprofit association of certified cybersecurity professionals.
Mr. Castillo holds a Bachelor’s degree in computer science from APEC university. He holds a Master’s degree in Business Administration (MBA) from H. Wayne Huizenga School of Business, Nova Southeastern University. He also has a Master’s degree in Project Management (MPM) and a Master’s degree in Public Administration (MPA) from Keller Graduate School of Management, DeVry University. In addition, Mr. Castillo has a Juris Master's Cybersecurity and Privacy at Florida State University, and an Executive Doctorate of Business Administration Field of Study Information Security at St. Thomas University. Mr. Castillo holds several certifications, such as Certified Information System Security Professional (CISSP), Project Manager Professional (PMP), and CompTIA Security+.
- Bonnie ViteriPrinciple Technical Security Engineer, Yahoo
Building security programs and devising simple solutions to complex problems is what I do. I didn't travel the traditional path into cyber, and I don't plan to conform now.
A behavioral psychologist at heart who is always watching and actively listening when everyone else is waiting to respond, paired with an M.S. in Criminology, makes me the ideal social engineer.
My first success was merging Yahoo and AOL security programs into a thriving, single-security culture through global psychological and behavioral change management techniques, specializing in human risk and designing programs to address it. Understanding what motivates developers and building solid relationships one conversation at a time, focusing on people, programs and processes lended to 98% global security adoption at Yahoo. Bridging the gap between developers and non-technical colleagues made me invaluable.
- Tennisha MartinFounder & Executive Director, BlackGirlsHack
Tennisha Martin is the Founder and Executive Director of BlackGirlsHack (BGH Foundation), a national cybersecurity nonprofit organization dedicated to providing education and resources to underserved communities and increasing the diversity in cyber. She has worked in a consulting capacity for more than 15 years and in her spare time is a CEO, best-selling author, award-winning hacker, mentor, penetration tester, and advocate for diversity.
- Happy Hour
- Devon BryanGlobal CISO, Carnival Corporation
Devon Bryan joined Carnival Corporation in October 2021 as the Global CISO with responsibilities for conceiving, implementing and leading technology solutions that assure compliance, protect personal data and corporate assets, increase organizational capability and advance productivity within Carnival Corporation and our world-leading cruise line brands.
Prior to Carnival Corporation, Devon has held CISO roles a the following organizations: MUFG Union Bank N.A., KPMG US & Americas Ltd, US Federal Reserve, ADP LLC
His information security career began in the U.S. Air Force, where he served as a Captain and lead network security engineer working on systems and programs to protect the critical network and communications networks of the Air Force’s Air Combat Command.
Devon is Co-founder of Cyversity, now ICMCP (International Consortium of Minority Cybersecurity Professionals), a 501c3 non-profit which he launched in 2014 and geared toward improving the underrepresentation of women and minorities in the field of cybersecurity through academic scholarships, certifications, mentoring and networking opportunities.
Devon received a Bachelor of Science, Applied Mathematics from South Dakota Technological University and a Master of Science, Computer Science from Colorado Technological University, graduating Summa Cum Laude. He holds multiple cybersecurity certifications to include: CISSP, CIPP/US and CIPP/EU, serves on several non-profit boards, academic advisory boards and participates in select industry forums as a sought-after speaker and writer on emerging cyber security trends and issues.
- Merritt BaerCISO, Advisory Board Member
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes