Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, April 20, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
7:00 am - 3:00 pmLocation / Room: Registration Desk8:00 amExecutive Advisory Council Breakfast - Cybersecurity in an Interconnected World - VIP / Invite OnlyRegistration Level:VIP / Exclusive
8:00 am - 9:15 amLocation / Room: Strafford8:00 amSecureWorld Plus: Building a Successful Information Security Awareness ProgramCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Berwin8:00 amSecureWorld Plus: DevOps and APPSec: Building an AppSec PipelineRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: Devin8:30 amSecureWorld Plus: Handling & Managing Security IncidentsPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:30 am - 9:30 am8:30 amComputer Security For ML Business & GovernmentRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amData Breach Digest- Scenarios from the FieldRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amNarco Terror and Security Issues We FaceRegistration Level:Conference Pass
8:30 am - 9:15 pm8:30 amSecureAuth: Identity in Security - Know Who's in Your NetworkRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 amLocation / Room: Wayne9:00 amExhibit Floor OpenRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Digital Doomsday- a Message from the U.S. Cyber Defense Advisor to NATORegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
10:15 am - 11:15 am11:00 amExecutive Advisory Council Roundtable - BYOD Trends - VIP/Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: Strafford11:15 amA 2016 Perspective on Bring Your Own Device (BYOD)Registration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Villanova11:15 amGarbo, D-Day and Ultimate Social EngineeringPresident, CISSP, O'Leary Management EducationRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amRadware: Cyber War Chronicles - Stories From the Virtual TrenchesSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
11:15 am - 12:00 pm11:15 amWombat: The State of Phishing Attacks and How to Reduce Their ImpactRegistration Level:Open Sessions
11:15 am - 12:00 pm12:00 pmExecutive Roundtable - Big Data Security- VIP/Invite OnlyRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: Strafford12:15 pmLUNCH KEYNOTE: Radware - Safety, Sanctuary and Security: The Societal Impact of Ever-Permeating ConnectivityDirector of Security, RadwareRegistration Level:Open Sessions
12:15 pm - 1:00 pm1:15 pmPanel: Current ThreatscapeSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
1:15 pm - 2:15 amLocation / Room: Keynote Theater1:15 pmPanel: Locking Down the EndpointsRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Villanova2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibit Floor3:00 pmFrugal Girl's Guide to Threat ManagementRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Wayne3:00 pmHIPAA-HITECH Enforcement Update: Preparing Your Organization for the Phase II Audits and Possible EnforcementRegistration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmNew Twists on Moving Target DefenseRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Haverford3:00 pmSecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)Registration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmSecureWorld Plus: DevOps and APPSec: Building an AppSec Pipeline - (SecureWorld Plus Registrants ONLY)Registration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmSecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants Only)Registration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmService Provider Management and OversightRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Villanova - Thursday, April 21, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
7:00 am - 3:00 pm8:00 amSecureWorld Plus: Building a Successful Information Security Awareness Program (SecureWorld Plus Registrants ONLY)CSO, Security Mentor; Former CISO, State of MichiganRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:00 amSecureWorld Plus: DevOps and APPSec: Building a AppSec Pipeline- (SecureWorld Plus Registrants ONLY)Registration Level:SecureWorld Plus
8:00 am - 9:30 am8:00 amSecureWorld Plus: Handling & Managing Security Incidents - (SecureWorld Plus Registrants ONLY)Registration Level:SecureWorld Plus
8:00 am - 9:30 am8:30 am20 Years of Auditing - Lessons LearnedRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amCloud Services Best PracticesRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amSecurity Enhanced ComposerRegistration Level:Conference Pass
8:30 am - 9:15 am8:30 amWelcome to the Desert of the New Cybersecurity WorldRegistration Level:Conference Pass
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Hacked Again- It Can Happen to Anyone, Even a CyberSecurity ExpertRegistration Level:Open Sessions
9:30 am - 10:15 am10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 am11:00 amExecutive Advisory Council Roundtable - Your Security Org's Structure - VIP / Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm11:15 amCheck Point Software: The Critical Need for Incident ResponseRegistration Level:Open Sessions
11:15 am - 12:00 pm11:15 amInformation OverloadRegistration Level:Conference Pass
11:15 am - 12:00 pm11:15 amLogicNow: Data Breach Risk Intelligence That MattersRegistration Level:Conference Pass
11:15 am - 12:00 pm12:00 pmAdvisory Council Roundtable Lunch: Let's Talk About Risk- Lunch Served VIP/Invite OnlyRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: The Confluence of Data Security ChallengesRegistration Level:Open Sessions
12:15 pm - 1:00 am1:15 pmPanel: After The HackRegistration Level:Conference Pass
1:15 pm - 2:15 pm1:15 pmPanel: You've Got Humans on Your NetworkRegistration Level:Conference Pass
1:15 pm - 2:00 pm2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
2:15 pm - 3:00 pm2:30 pmDash for Prizes & CyberHuntRegistration Level:Open Sessions
2:30 pm - 2:45 pm3:00 pmFrom Security Director to Risk Leader: Continuous Monitoring, Transparency and Accountability in the New Era of Security Risk ManagementRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmHIPAA-HITECH Enforcement Update: Preparing Your Organization for the Phase II Audits and Possible EnforcementRegistration Level:Open Sessions
3:00 pm - 3:45 pm3:00 pmSecure Digital Password Storage- Are you Doing it Right?Registration Level:Conference Pass
3:00 pm - 3:45 pm3:00 pmSecurity Architecture ToolsRegistration Level:Open Sessions
3:00 pm - 3:45 pm
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Ben DesjardinsDirector of Security, Radware
Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.
Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes