googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, December 13, 2023
    8:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:00 am
    [Opening Keynote] Privacy Update: Sorting Surveillance Benefits from Harms in an IoT World
    • session level icon
    speaker photo
    CEO, The Privacy Professor; CEO, Privacy & Security Brainiacs
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am

    Tracking technologies are proliferating at an increasingly high rate in apps, IoT devices, websites, and in a wide range of files. They are not only impacting privacy in wider and more harmful ways, but they have also extended far beyond the digital world and are also impacting physical safety. Such tools can certainly be very beneficial, when used responsibly and with informed awareness of the cybersecurity and privacy risks. However, when they are used without establishing technical and non-technical boundaries, and without taking risk mitigation actions, the associated surveillance activities can, and have, brought physical harms. I was an expert witness for a case a couple of years ago involving a stalker’s use of his victim’s smart car to find and almost fatally assault her. I’m currently an expert witness for two separate cases involving the use of Meta Pixels, Conversion APIs, cookies, and other types of tracking tech for surveillance of online activities. Virtually daily there are news articles reporting privacy invasions by digital trackers, drones, security cameras, and more. I will provide several real-life use cases, and provide discussion for the technical and non-technical capabilities that possibly could have been identified through risk assessment activities prior to making such products publicly available and informed the needed associated security and privacy capabilities, that would have supported privacy and cybersecurity protections and physical safety.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:00 am
    Threat Intelligence: Industrialization of Cyber Fraud and AI
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    The presentation will cover the Secret Service’s view on current cybercrime trends to include the emergence of AI/ML in the cybercrime world. Investigator Dougherty will frame it in the lens of BEC (Business Email Compromise) and discuss the new and emerging advancements cybercriminals are using to victimize businesses in 2023 and beyond. Investigator Dougherty may even share a a deepfake of himself.

    10:00 am
    PAM Back to Basics
    • session level icon
    speaker photo
    Chief Security Scientist & Advisory CISO, Delinea
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    With so many high-profile breaches accomplished through compromising passwords on privileged accounts, PAM is a top priority for organizations of all sizes. Join Delinea’s Chief Security Scientist Joseph Carson, as he takes you on a brief journey through the PAM lifecycle to get you quickly up to speed and understand the PAM matrix of all the different types of privileged accounts that exist across all your different IT domains, often referred to as your privileged account attack surface.

    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:00 am

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:00 am
    Insider Threat: Clever Tactics Your Adversaries Use to Infiltrate Your Organization
    • session level icon
    speaker photo
    CEO & Founder, Center for Threat Intelligence
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    The insider threat landscape continues to evolve and change. Organizations can expect to see increases in volume and severity. To achieve their goals, threat actors will use complex activities and recruitment strategies to achieve their goals. In order to anticipate and prevent insider threat, you need to know their activities and recruitment strategies!

    11:00 am
    Secure by Default: Evolving Security Expectations
    • session level icon
    speaker photo
    CISO, Automox
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    CISA recently released their paper on “Secure by Design, Secure by Default” software that has support from seven major governments. It is meant to make significant, achievable improvements in software security. We will discuss the Secure by Default concept, why it is important, and what customers and vendors can do about it today.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Safeguarding Ethical Development in AI and Other LLMs
    • session level icon
    A Comprehensive Approach to Integrating Security, Psychological Considerations, and Governance
    speaker photo
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description coming soon.

    12:00 pm
    [Panel] Security on the Horizon: Current Threats and Future Projections
    • session level icon
    speaker photo
    Director, Solutions Engineering and Alliances, Automox
    speaker photo
    Regional Vice President of Sales, ForgeRock
    speaker photo
    RVP, Sales Engineering Strategy, Rubrik
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    With the rapid advancement of technology, the ever-expanding digital footprint, and the sophistication of cyber adversaries, understanding current threats is crucial for developing proactive defense strategies. This panel will bring together experts and thought leaders to discuss the state of cybersecurity, analyze prevalent threats, and forecast potential cyber threats and trends for the coming year. By examining the latest tactics, techniques, and procedures used by threat actors, and leveraging collective expertise, the panel endeavors to provide actionable insights to bolster cyber resilience and safeguard critical digital assets in the face of evolving cyber threats. Join our panel and get actionable items that you can start doing now!

    12:00 pm
    Debate: Does the Profit Motive of Vendors Make Security Harder for CISOs?
    • session level icon
    speaker photo
    Co-Founder & Podcast Host, Colorado = Security
    speaker photo
    CISO, Uplight; Co-Host, Colorado = Security podcast
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In the intricate landscape of cybersecurity, the role of vendors cannot be overstated. Undoubtedly, they play a crucial role in advancing technology to fortify our digital defenses. However, the looming question persists: are these advancements driven solely by the pursuit of security, or is there an ulterior motive at play?

    Delve into the complexities as our esteemed panelists share their candid opinions on whether the profit motive may compromise cybersecurity’s very essence. Does the industry’s financial agenda hinder those who should be at the forefront of safeguarding our digital realms?

    Don’t miss this insightful dialogue that promises to unravel the dynamics between profit motives and the challenges CISOs face in their mission to ensure robust cybersecurity.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Mitigating AI Risks: New Solutions to Address AI/ML Liability
    • session level icon
    speaker photo
    Member, Data Privacy & Cybersecurity, Clark Hill Law
    speaker photo
    Head of AI Policy and Assurance, Armilla Assurance
    speaker photo
    Global Privacy and InfoSec Attorney, eBay
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    2023 has seen the emergence of class action lawsuits filed against businesses for their use of AI/ML technologies.  Other actions are sure to follow as plaintiffs firms find novel ways to fit the use of AI tools into existing legal regimes prohibiting discrimination and requiring product safety, transparency and fairness.  This presentation will give an overview of some of the litigations and enforcement actions seen in the AI/ML space to date, with legal strategies for how businesses can work to develop a legally defensible compliance program, including AI assessments, in line with emerging AI regulatory and risk management frameworks.  The presentation will feature Philip Dawson from Armilla Assurance, the first company to offer a warranty product backed by major insurers that seeks to verify and warrant certain features of an AI tool.

    1:00 pm
    Emerging Human Risk Trends of 2023
    • session level icon
    speaker photo
    Threat Operations Lead, Hoxhunt
    speaker photo
    Content Marketing Lead, Hoxhunt
    speaker photo
    Product Marketing, Hoxhunt
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Keeping up to date on real-world cyber threats is an important part of understanding the evolving landscape of cyber-attacks and preventing your next big breach. In this webinar, the Hoxhunt Threat team recaps some of the biggest threats they’ve seen so far in 2023 and showcases the results of a recent QR phishing experiment. Then, experts explain how to shape your cybersecurity agenda based on threat insights.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn Soles
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    In a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.

    2:00 pm
    A Whole Lotta BS (Behavioral Science) About Cybersecurity
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Let’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security.  We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.

     

    2:00 pm
     Triad of Trust: Executive, Vendor, and Team Dialogue in Risk Management
    • session level icon
    speaker photo
    Technical Sales Engineer, Trend Micro
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Explore the intricacies of what it takes to achieve risk-resilient communication within your organization’s framework. Learn how a collaborative dialogue between executive leadership, cybersecurity teams, and vendors fosters a unified front against emergent security risks. Expand your knowledge towards attack surfaces and the pivotal role of XDR technologies and Zero Trust Architecture in managing and mitigating risks.

    2:45 am
    Networking Break
    Registration Level:
    2:45 am - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    [Closing Keynote] Cyber Intel Briefing
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description to come.

Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • CREST
    Booth:

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • Delinea
    Booth:

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • ForgeRock / Ping Identity
    Booth:

    ForgeRock is a global leader in digital identity that delivers modern and comprehensive identity and access management solutions for consumers, employees, and things to simply and safely access the connected world. Using ForgeRock, more than 1,300 global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data—consumable in any cloud or hybrid environment. The company is headquartered in San Francisco, California, with offices around the world.

    For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media.

  • Hoxhunt
    Booth:

    Data breaches start with people, so Hoxhunt does too. We combine cognitive automation with the human touch to create individualized adaptive training experiences employees love, and a managed service model enterprises depend on.

  • National Cybersecurity Alliance
    Booth:

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Rubrik
    Booth:

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • Trend Micro
    Booth:

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rebecca Herold
    CEO, The Privacy Professor; CEO, Privacy & Security Brainiacs

    Rebecca Herold has more than 30 years of security, privacy, and compliance experience. She is founder of The Privacy Professor Consultancy (2004) and of Privacy & Security Brainiacs SaaS services (2021) and has helped hundreds of clients throughout the years. Rebecca has been a subject matter expert (SME) for the National Institute of Standards and Technology (NIST) on a wide range of projects since 2009, including: seven and a half years leading the smart grid privacy standards creation initiative, and co-authoring those informative references and standards; two years being a co-author of and a SME member of the team that created the Privacy Framework (PF) and associated documents; and three years as a SME team member, and co-author of the Internet of Things (IoT) technical and non-technical standards and associated informative references; and performing throughout the years proof of concept (PoC) tests for a variety of technologies, such as field electricity solar inverters, PMU reclosers, and associated sensors. Rebecca has served as an expert witness for cases covering HIPAA, privacy compliance, criminals using IoT devices to track their victims, stolen personal data of retirement housing residents, tracking apps and website users via Meta Pixels and other tracking tech, and social engineering using AI. Rebecca has authored 22 books, and was adjunct professor for nine and a half years for the Norwich University MSISA program. Since early 2018, Rebecca has hosted the Voice America podcast/radio show, Data Security & Privacy with the Privacy Professor. Rebecca is based in Des Moines, Iowa, USA. www.privacysecuritybrainiacs.com

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Joseph Carson
    Chief Security Scientist & Advisory CISO, Delinea

    Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical infrastructure, financial, and maritime industries.

  • speaker photo
    Janet Lawless
    CEO & Founder, Center for Threat Intelligence

    Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge holistic threat intelligence program including assessments, consulting and training. Janet’s former leadership roles at Microsoft and Cisco, creating and managing global programs focused on compliance and security, in addition to her work at a cyber-security start-up, brings a wealth of knowledge in security services. Janet is currently the Chair for ASIS International Puget Sound Chapter, and former Committee Chair for Women in Security. She is Chair Emeritus for the Pacific Coast Analyst Roundtable and a former Board Member for the American Red Cross. She is also a member of InfraGard, the United States Secret Service Cyber Fraud Task Force and the Washington State Fusion Center.

  • speaker photo
    Jason Kikta
    CISO, Automox

    Jason Kikta is the Chief Information Security Officer at Automox. He previously served for over 20 years in the United States Marine Corps, which included seven years at U.S. Cyber Command designing and managing the national counter-APT and counter-ransomware missions.

  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Katherine Chipdey
    Director, Solutions Engineering and Alliances, Automox

    Katherine Chipdey has spent her career in Cybersecurity, consulting on how to simplify our understanding of the threat landscape and building programs for thousands of customers around EDR, SOAR, and MDR. At Automox, she helped build out the Solutions Engineer Team, where she focused on automating IT operations, reducing risk, and bridging that gap between security and IT for prospects and customers alike. Katherine now manages the technical channel relationships, enabling other IT and Security experts on how to use Automox in order to help their customers meet business needs and critical security goals like never before. Katherine has most enjoyed the opportunity to use her background and experiences in the the field to meet security/ IT teams, and enable them to be as successful as possible with their initiatives - where a relationship can be made, she will try, as those meaningful interactions and the growth, learning, and connection they bring are invaluable to her. Outside of work, she could spend forever talking about her travels, archery, and pups.

  • speaker photo
    Connie Glaspie
    Regional Vice President of Sales, ForgeRock

    RVP of Sales serving Western North America & LATAM for the global digital leader ForgeRock. Leading a team of security sales professionals, responsible for managing some the world’s largest enterprises throughout Western Canada & USA, Argentina, Chile, Peru, Columbia, Mexico and Brazil.

    Connie brings over 19+ years of digital identity industry experience (identity, access management, directory, API management, App Sec, & data masking), strong leadership skills required for coaching high-performing sales organizations to deliver the expected business outcomes of leading global enterprises.

    Her passion is helping organizations leverage digital identity as a competitive advantage to drive top-line revenue, while mitigating risk and driving down cost. Connie has worked for several start-ups including ForgeRock – leading global digital identity industry; Veracode – cloud-Application Risk Management leader; Delphix – leading Data Masking provider; and 19+ years in identity, access management, advanced auth, and directory, at CA Technologies and most recently www.forgerock.com.

  • speaker photo
    Evan Shelley
    RVP, Sales Engineering Strategy, Rubrik
  • speaker photo
    Robb Reck
    Co-Founder & Podcast Host, Colorado = Security

    Robb Reck, MBA, CISSP, is an information security and risk professional, with over 20 years of experience in IT, Compliance, and Information Security. Reck has created comprehensive application security programs for multiple financial institutions.

  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.

  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.

  • speaker photo
    Philip Dawson
    Head of AI Policy and Assurance, Armilla Assurance
  • speaker photo
    Benjamin Benhan
    Global Privacy and InfoSec Attorney, eBay

    With over six years of experience in privacy and data governance, Ben is a passionate and driven global privacy and infosec attorney at eBay, where he helps the company navigate the complex and evolving regulatory landscape of data protection and cyber security. He has a strong background in computer science, cyber security, network engineering, and law, as well as multiple certifications that demonstrate his proficiency and credibility in the field. He is motivated by the challenge of balancing the needs and interests of various stakeholders while ensuring the highest standards of compliance, ethics, and risk management. He values diversity, innovation, and collaboration, and enjoys working with a dynamic and cross-functional team that shares his vision of creating a safe and trusted online marketplace for millions of users worldwide.

    In his current role, he advises eBay on global privacy and infosec matters, including developing and implementing policies, procedures, and best practices in privacy, security, and data governance. He leads global efforts in vendor risk management and data processing agreements, and has experience conducting privacy impact assessments, responding to data breaches and incidents, and liaising with regulators, customers, and partners. He leverages his skills in cyber policy, data privacy, and legal aspects to provide practical and strategic solutions that align with the company's business objectives and values. He also contributes to the continuous improvement and education of the privacy and infosec programs by staying updated on the latest trends, developments, and standards in the industry, and by sharing his insights and expertise with his colleagues and peers.

  • speaker photo
    Jon Gellin
    Threat Operations Lead, Hoxhunt
  • speaker photo
    Eliot Baker
    Content Marketing Lead, Hoxhunt
  • speaker photo
    Eliott Tallqvist
    Product Marketing, Hoxhunt
  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Scarlett Menendez
    Technical Sales Engineer, Trend Micro

    Scarlett Menendez is a cybersecurity professional with a specialization in cyber threat intelligence and programming in Seattle. Holding a distinguished position at Trend Micro, she has dedicated herself to providing insights on the evolving landscape of cyber threats, and offers strategic counsel on fortifying organizational infrastructures with Trend Micro's solutions. Scarlett is the founder of the TechShe Committee: a Tech Empowerment Initiative for Women at Trend Micro. Furthermore, her philanthropic efforts extend to Neural Oceans, an initiative dedicated to offering open-source technology education to schools in economically challenged communities. As the global landscape pivots towards Generative AI and decentralization, Scarlett promotes thought leadership on pen-testing with AI, and ensuring robust cybersecurity measures within the industry.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.

    With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.

    VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.

    VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes