Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, November 9, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
7:00 am - 3:00 pmLocation / Room: Registration Desk8:00 amExecutive Advisory Board BreakfastRegistration Level:VIP / Exclusive
8:00 am - 9:15 am8:00 amDesigning and Building a Cybersecurity Program Based on the NIST Cybersecurity FrameworkSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:00 amHandling & Managing Security IncidentsPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:30 amUsing Statistical Process Control (SPC) to Measure Network Traffic and Identify ThreatsChief Engineer of Information Security, Mitre CorpRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am8:30 amCybersecurity Assessments and Planning: The Attorney's RolePartner - Data Protection, Privacy & Security Group, K&L GatesRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 pm8:30 amProtecting Payments with PCIChief Technology Officer, PCI Security Standards CouncilRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 amLocation / Room: 2028:30 amRealistic Risk Management Using CIS 20 Critical Security ControlsMicrosoft, Director of Security Program ManagementRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: The Cost and Consequences of the Insider Threat: What the Latest Ponemon Institute Research RevealsChairman and Founder, Ponemon InstituteRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibit Floor11:00 amExecutive Advisory Council Roundtable: Identity is the New Firewall - VIP/Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm11:15 amEdgar Allan Poe: Paradox, Enigma, GeniusPresident, CISSP, O'Leary Management EducationRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amHiTrust as a Compliance FrameworkDirector of Information Security, Landmark HealthRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amRadware: Cyber War Chronicles - Stories From the Virtual TrenchesDirector of Security, RadwareRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amTrend Micro: The Endpoint is not the Battle GroundPrincipal Engineer, Trend Micro, Inc.Registration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amJuniper / Virtual Armor: Detect. Enforce. Adapt.Network Consulting Engineer, Juniper NetworksRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm12:00 pmAdvisory Council Roundtable: Find the Talent, Keep the Talent - VIP / INVITE ONLYRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Radware The Current Economics of Cyber AttacksSecurity Evangelist, North America, RadwareRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
12:15 pm - 1:00 pmLocation / Room: Keynote Theater1:15 pmPanel: After the HackRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:15 amLocation / Room: Keynote Theater1:15 pmPanel: Current ThreatscapeRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:15 pm1:15 pmArbor Networks: Is Your Organization Prepared to Stop The Modern Day DDoS Attack?Director, Product Marketing, Arbor NetworksRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:00 pm3:00 pmVenafi: Securing Trust – Defending Against Next-generation AttacksDirector Customer Support, VenafiRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 am3:00 pmCybersecurity Defense UpdateBusiness Information Security Officer (BISO), T-Mobile USARegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmImproving Your Incident Response Process Through Lessons Learned From Treating Trauma in IndividualsBoard Member, Cybersecurity Leader, Angel InvestorRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmPanel: Locking Down the EndpointsRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 4:00 pm3:00 pmSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity FrameworkSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmSecureWorld Plus: Handling & Managing Security IncidentsPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pm3:00 pmSlack Space: Human Behavior in Healthcare Settings and Cybercrimes as a ServiceRisk & Threat Analyst, UW Medicine IT Services & SecurityRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm5:00 pmOptiv Happy HourRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
5:00 pm - 8:00 pm - Thursday, November 10, 20167:00 amRegistration OpenRegistration Level:
Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
7:00 am - 3:00 pm8:00 amInfraGard Chapter Meeting - Chapter Business and 2017 Strategic Goals (Open to All Attendees)PCI Environments, AWSChapter President, Evergreen InfraGardRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
8:00 am - 9:00 am8:00 amSecureWorld Plus: Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity FrameworkSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:00 amSecureWorld Plus: Handling & Managing Security IncidentsPresident, CISSP, O'Leary Management EducationRegistration Level:SecureWorld Plus
8:00 am - 9:30 am8:30 amEnd to End Cybersecurity Due DiligenceSecurity Engineer, AmazonRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am8:30 amData Breach Digest - Scenarios from the FieldCybersecurity Technologist, CISO, and Threat Intelligence ProfessionalRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am8:30 amGaining Better Visibility into Risk- The Future of GRCManaging Director, Grant ThorntonRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am8:30 amMaking the Case to Executives and BoardsRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am8:30 amThe Fine Line Between Security and SurveillanceVP & CISO, F5 NetworksRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
8:30 am - 9:15 am9:00 amExhibit Floor OpenRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:00 am - 3:00 pm9:30 amOPENING KEYNOTE: Intelligence and Cybersecurity: Toward a More Effective Public / Private PartnershipCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
9:30 am - 10:15 amLocation / Room: Keynote Theater10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibit Floor11:00 amAdvisory Council Roundtable: Security Awareness - VIP/Invite OnlyRegistration Level:VIP / Exclusive
11:00 am - 12:00 pm11:15 amProducing Cybersecurity and Information Assurance ProfessionalsExecutive Director, Center for Information Assurance and Cybersecurity, University of WashingtonRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amIoT - A Vision for the FutureFounder & President, AgeLight Advisory & Research GroupRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amPalo Alto Networks: Change the Game: Leverage Multi-Method Prevention at Your EndpointsGlobal Director, Systems Engineering, CSS, Palo Alto NetworksRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amWombat Security: The Top 8 Security Risks Beyond the PhishProduct Manager, Wombat SecurityRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm11:15 amForcePoint: Ransomware - The Theory and Practice of Exploiting the Kill ChainCISO, ForcepointRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
11:15 am - 12:00 pm12:00 pmAdvisory Council Roundtable Lunch: Ransomware-Crime is a Service - VIP / INVITE ONLYRegistration Level:VIP / Exclusive
12:00 pm - 1:00 pm12:15 pmLUNCH KEYNOTE: Optiv - Cloud Ready? 7 Tips to Weather the StormChief Strategy Officer, RemediantRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
12:15 pm - 1:00 pm1:15 pmPanel: Emerging ThreatsRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:15 pmLocation / Room: Keynote Theater1:15 pmPanel: You've Got Humans on Your NetworkRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:00 pm1:15 pmTavve: The Red Headed Step Children- ICMP, SNMP and Other Network Management ProtocolsSenior Sales Engineer, TavveRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:00 pm1:15 pmCylance: The Merits of Applying Machine Learning to Complex Cybersecurity ProblemsEnterprise Sales Manager, CylanceSenior Sales Engineer, CylanceRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
1:15 pm - 2:00 pm2:15 pmConference Dessert & Coffee Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibit Floor2:15 pmConference Dessert Break / Exhibitor Product DemonstrationsRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibit Floor2:30 pmDash for Prizes & CyberHunt WinnersRegistration Level:Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
2:30 pm - 2:45 pmLocation / Room: SecureWorld Exhibit Floor3:00 pmBehavioral Analytics in Security: What Your Vendor Says vs RealityDirector, Security Monitoring & Analytics, MicrosoftRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmCyber Incident Response at the Executive LevelvCISO, Cyber Risk Opportunities LLCRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm3:00 pmValidation of Asymmetric Cyber ResiliencyProgram Manager, Pacific Northwest National LabRegistration Level:Conference Pass
SecureWorld Plus
VIP / Exclusive
3:00 pm - 3:45 pm
- NETSCOUT ArborBooth: 224
For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.
- CentrifyBooth: TBD
Centrify provides unified identity management across data center, cloud and mobile environments. Centrify software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization’s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management.
Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent. - Checkmarx Inc.Booth: 304
Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.
- CiscoBooth: TBD
Cisco builds truly effective security solutions that are simple, open and automated. Drawing on unparalleled network presence as well as the industry’s broadest and deepest technology and talent, Cisco delivers ultimate visibility and responsiveness to detect more threats and remediate them faster. With Cisco, companies are poised to securely take advantage of a new world of digital business opportunities.
- Cloud Security Alliance (CSA)Booth: TBD
The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
- <CloudTalk MeetupBooth: TBD
CloudTalk Meetup’s is a community oriented group aimed at furthering the education in cloud computing. Our mission is to educate technology professionals in this fast paced technology as well as to promote cloud computing vendors and product developers in the local development community. Our meetup has over 700 registered cloudies with disciplined in dev/ops, IT Operations, Product Development and Business/Marketing. The forum provides a great place for professionals to collaborate, share ideas, foster creative brainstorming.
We hold monthly local events and webinars with presentations delivered by a cloud computing vendor and industry experts that gives detailed technical overview of platforms, tools and industry best practices covering cloud, big data, IT, DR, telecom, security, mobile, social web…. The presentation can be followed with hands-on labs where attendees can experience the technology on their own. Some of the big cloud computing vendors who presented at our meetups are Microsoft Azure, Amazon AWS, VMWare’s CloudFoundry, Citrix’ CloudStack, RedHat’s OpenShift, CenturyLink CLC , IBM Cloud. We have big data companies such as Elasticsearch and DataMeer; DR and Data virtualization companies like DataGardens and Actifio.
- Column Information SecurityBooth: TBD
Column Information Security is an information security consultancy and solutions provider for enterprise, public sector and government organizations. We ensure mitigation of risk through strategic planning, building and operating security systems and programs, and implementation of industry leading technologies including SailPoint, CyberArk and Veracode. For more information, visit www.columninfosec.com
- CTINBooth: TBD
CTIN has been providing high tech crime fighting training since 1996 in the areas of high-tech security, investigation, and prosecution of high-tech crimes for both private and public sector security and investigative personnel and prosecutors. CTIN sponsors training from experts world-wide for the benefit of private organizations and law enforcement agencies.
- CyphortBooth: 206
Cyphort is the next generation APT defense solution for the enterprise. Cyphort provides a single pane of glass across perimeter and laterally moving threats, correlates threat signals before and after an incident while eliminating noise from false alerts and red herrings.
- DruvaBooth: TBD
Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in today’s mobile and distributed enterprise. Druva’s award-winning inSync and Phoenix solutions prevent data loss and address governance, compliance, and eDiscovery needs on laptops, smart-devices and remote servers.
- Electronic Crimes Task ForceBooth: TBD
The role of the U.S. Secret Service has gradually evolved since the agency’s 1865 inception, from its initial mandate — suppressing the counterfeiting of U.S. currency — to protecting the integrity of the nation’s financial payment systems. During this time, as methods of payment have evolved, so has the scope of the Secret Service’s mission. Computers and other chip devices are now the facilitators of criminal activity or the target of such, compelling the involvement of the Secret Service in combating cyber crime. The perpetrators involved in the exploitation of such technology range from traditional fraud artists to violent criminals – all of whom recognize new opportunities to expand and diversify their criminal portfolio.
- Fidelis CybersecurityBooth: 204
Fidelis Cybersecurity is a leading provider of threat detection, hunting and response solutions. Fidelis combats the full spectrum of cyber-crime, data theft and espionage by providing full visibility across hybrid cloud / on-prem environments, automating threat and data theft detection, empowering threat hunting and optimizing incident response with context, speed and accuracy.
By integrating bi-directional network traffic analysis across your cloud and internal networks with email, web, endpoint detection and response, and automated deception technology, the Fidelis Elevate platform captures rich metadata and content that enables real-time and retrospective analysis, giving security teams the platform to effectively hunt for threats in their environment. Fidelis solutions are delivered as standalone products, an integrated platform, or as a 24×7 Managed Detection and Response service that augments existing security operations and incident response capabilities. Fidelis is trusted by Global 1000s and Governments as their last line of defense. Get in the hunt. For more information go to www.fidelissecurity.com.
- GemaltoBooth: 308
Today’s enterprises depend on the cloud, data and software to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect their most sensitive information and software wherever it is created, accessed or stored – from the cloud and data centers to devices and across networks. As the global leader in cloud and data protection, our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in the devices and services used by millions of consumers every day.
- GigamonBooth: TBD
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- GuidePoint Security LLCBooth: TBD
GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com
- Institute of Internal Auditors (IIA)Booth: TBD
Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. The IIA is the internal audit profession’s global voice, recognized authority, acknowledged leader, chief advocate, and principal educator. Generally, members work in internal auditing, risk management, governance, internal control, information technology audit, education, and security.
- InfraGardBooth: TBD
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- ISACABooth: TBD
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
- International Information Systems Security Certification Consortium, Inc., (ISC)²®Booth: TBD
Headquartered in the United States and with offices in London, Hong Kong and Tokyo, the International Information Systems Security Certification Consortium, Inc., (ISC)²®, is the global, not-for-profit leader in educating and certifying information security professionals throughout their careers. We are recognized for Gold Standard certifications and world class education programs.
We provide vendor-neutral education products, career services, and Gold Standard credentials to professionals in more than 135 countries. We take pride in our reputation built on trust, integrity, and professionalism. And we’re proud of our membership – an elite network of nearly 90,000 certified industry professionals worldwide.
- ISSA New EnglandBooth: TBD
The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.
Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.
Visit the National Headquarter’s website at www.issa.org.
- MalwarebytesBooth: 334
Malwarebytes secures endpoints, making workplaces resilient. Our adaptive attack protection predicts and detects attacks with multi-layer detection across the kill chain. We enable active threat response with machine learning that is actionable and automated, allowing for full recovery when a compromise occurs. We empower enterprise endpoint orchestration across siloed IT and Security organizations, simplifying security management and making responses effective. Malwarebytes makes endpoints resilient so workplaces can protect and remediate, and employees can regain control of their digital lives. Visit us at www.malwarebytes.com/business.
- NETSCOUTBooth: 420
NETSCOUT nGenius packet flow switches provide security visibility by optimizing the flow of traffic from the network to security systems. These appliances collect and organize packet flows—creating a unified packet plane that logically separates the network layer from the security systems. Our customers use packet flow switches to optimize and scale out their cyber security deployments, so that they can spend less time in adding, testing and managing their security systems.
- New Tech SeattleBooth: TBD
Seattle’s largest ongoing monthly event with more than 5,600 members. New Tech Seattle is the place where you’ll always make great connections, enjoy great food and drinks, learn about new companies doing cool things, laugh, smile, and have a fun night out. And most importantly, you’ll discover the people, partners, organizations, and resources to help you to build your dreams.
It’s your community, we just love it and give everyone a place to play together. New Tech Seattle happens on the 2nd or 3rd Tuesday of every month. You can also join us on the 1st or 2nd Tuesday of every month at New Tech Eastside if you spend more time in Kirkland, Bellevue, Redmond, and the surrounding cities.
- Northwest Tech Alliance (NWTA)Booth: TBD
The Northwest Tech Alliance (NWTA) is an independent technology association dedicated to bringing together some of the brightest minds from the technology industry.
NWTA events are focused on helping attendees:
· Network with other technology industry professionals
· Provide education and information relative to the latest technologies and industry trends
· Generate opportunities for personal, professional and business growth
· Promote the Puget Sound area as a desirable place to start and grow successful technology companies
· Learn about local food/chefs, wineries, breweries, and distilleries
· Support local businesses and give back to the community
· Build lifelong relationships - Online Trust Alliance (OTA)Booth: TBD
The Online Trust Alliance (OTA) is a non-profit with the mission to enhance online trust, while promoting innovation and the vitality of the internet. OTA’s goal is to help educate businesses, policy makers and stakeholders while developing and advancing best practices and tools to enhance the protection of users’ security, privacy and identity. OTA supports collaborative public-private partnerships, benchmark reporting, meaningful self-regulation and data stewardship.
- OptivBooth: 112
Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.
- Palo Alto NetworksBooth: 418
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
- PresidioBooth: TBD
Presidio is the premier provider of digital transformation; solutions built on agile secure infrastructure deployed; in a multi-cloud world with business analytics.
- Qualys, Inc.Booth: 312
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
- RadwareBooth: 200
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- <SiriusBooth: TBD
Sirius is a national integrator of technology-based business solutions that span the data center and other lines of business. Sirius is focused on helping organizations of all sizes reduce cost and complexity, improve service, and minimize risk with strategic solutions for cloud, analytics, mobility, security, IT infrastructure optimization and more.
- Spirent CommunicationsBooth: TBD
As a leader in test, measurement, assurance, and security solutions for next-generation devices and networks, Spirent empowers cyber security champions to tame the complexity of balancing security with high availability business demands. We provide expert guidance and methodologies to help our customers find clarity in the face of complexity, overcome the challenges of a fast-approaching future, and ultimately deliver on their promise to their own customers.
- StructuredBooth: TBD
Structured is an award-winning solution provider delivering secure, cloud-connected digital infrastructure. For nearly 30 years, we’ve helped clients through all phases of digital transformation by securely bridging people, business and technology.
- <Tavve’s ZoneRangerBooth: TBD
Tavve’s ZoneRanger is an application-layer proxy firewall for management protocols. This edge solution eliminates the need for open firewall ports and their corresponding firewall rules. The ZoneRanger is vendor independent supporting SNMP, ICMP, Syslog, Netflow, TACACS+, and numerous other management protocols. Current ZoneRanger environments support an extensive list of management applications, including Splunk, ArcSight, Solarwinds, HPNA, CA Unicenter. The ZoneRanger is installed at two of the top 10 banks in the US, as well as numerous financial institutions and credit card companies around the world
- TechTargetBooth: TBD
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- Tempered NetworksBooth: TBD
Tempered Networks meets the cyber security and connectivity needs for organizations who require uncompromised protection for business critical infrastructure. Our solution ‘cloaks’ critical systems, communications and endpoints, effectively rendering them invisible to all but trusted devices. Unlike traditional security solutions, our platform includes centralized orchestration of policies to reduce manual errors.
- ThalesBooth: TBD
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- <ThreatTrackBooth: TBD
ThreatTrack specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by businesses, enterprises and government agencies around the world. ThreatTrack develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats.
- Trend MicroBooth: 210
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- VaronisBooth: 418
Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.
- VenafiBooth: TBD
Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted.
With more than 30 patents, Venafi delivers innovative solutions for the world’s most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms; four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa. Venafi is backed by top-tier investors, including TCV, Foundation Capital, Intel Capital, QuestMark Partners, Mercato Partners and NextEquity.
For more information, visit: www.venafi.com.
- <VeriatoBooth: 320
Veriato provides User Behavior Analytics and User Activity Monitoring solutions.
Over 36,000 organizations worldwide trust Veriato to gain insight into human activity on their network.
Veriato’s award-winning solutions include Veriato Recon (behavioral analytics based insider threat detection),
Veriato 360 (enterprise-grade User Activity Monitoring), and Veriato Investigator (employee investigation tool).
- <Washington Technology Industry AssociationBooth: TBD
As one of the oldest and largest statewide technology trade associations in North America, we’re passionate about promoting Washington as a desirable place to start and grow successful technology companies amid a strong and connected community. WTIA is the place to connect to Washington’s technology industry.
- Wombat Security TechnologiesBooth: TBD
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.
- ZscalerBooth: 220
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Omar ChaudhryChief Engineer of Information Security, Mitre Corp
Omar Chaudhry is currently pursuing a Doctor of Philosophy (Ph.D.) in Systems Engineering at The George Washington University. He is also the Chief Engineer of Information Security at The MITRE Corporation. Omar is a cybersecurity practitioner with almost 15 years of experience in operational security and compliance.
- Jake Bernstein, Esq.Partner - Data Protection, Privacy & Security Group, K&L Gates
Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.
- Troy LeachChief Technology Officer, PCI Security Standards Council
: Troy Leach is the Chief Technology Officer for the PCI Security Standards Council. In his role, Mr. Leach partners with Council representatives, Participating Organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject matter expert on payment security and holds advanced degrees from Syracuse University in network management and information security.
- Andrew BazeMicrosoft, Director of Security Program Management
Andrew Baze is a principal security analysis program coordinator in Microsoft's Cloud and Enterprise Security group, assessing and improving security capability across Microsoft's online services and infrastructure. He enjoys applying his 15+ years of engineering, risk management and security analysis experience to help organizations better understand and improve their security.
- Dr. Larry PonemonChairman and Founder, Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.
Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Kate WakefieldDirector of Information Security, Landmark Health
Kate Wakefield has sixteen years of Infosec experience including retail, telecommunication, and over ten years in healthcare. Special interests include Privacy, Risk Assessment,IT audit, and Compliance. She has been using HiTRUST as a compliance framework since 2015. Kate holds CIPT and CISSP certifications and served on the local ISSA Board.
- Ben DesjardinsDirector of Security, Radware
Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.
Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.
- Craig SchippersPrincipal Engineer, Trend Micro, Inc.
Craig Schippers is a CISSP Certified Principal Sales Engineer at Trend Micro. He has worked in the Security Industry for approximately 17 years assisting customers with their Infrastructure Security needs. He lives in the Kettle Falls, WA.
- Bill KineNetwork Consulting Engineer, Juniper Networks
- Ron WinwardSecurity Evangelist, North America, Radware
As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity providers around the world.
Ron is an industry-recognized expert in the Mirai IoT botnet and its modern variants. Ron conducted the industry’s first complete analysis of the Mirai attack vectors, producing forensic examples for public distribution of each attack and the specific impact each attack had on networks. His work on IoT attack analysis has been presented at conferences worldwide and has been referenced by NIST.
Prior to joining Radware, Ron was Director of Network Engineering for a global datacenter provider and ISP. In this role, Ron oversaw the growth and development of a global network infrastructure that delivered services to other ISPs, hosting providers, and enterprises around the world. During this time, Ron assisted some of the world’s top businesses in mitigating cyberattacks on their infrastructure, cultivating an extensive knowledge in DDoS attack methodologies.
Ron holds a Bachelor of Science degree in Business and has earned many technical certifications throughout his engineering-focused career. Ron acutely understands the impact of technology and security on business and is enthusiastic about their interrelation. - Tom BienkowskiDirector, Product Marketing, Arbor Networks
Tom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he’s a Director of Product Marketing focusing on Arbor’s industry leading DDoS Protection solution.
- Mark MillerDirector Customer Support, Venafi
Mark Miller has been working with security software products for over 16 years. Before that and without realizing it he was preparing for his computer software career by playing games in DOS and Windows. He grew up as a middle child in a large family teaching him how to work with all personality types. His main focus over his career so far has been creating and leading strong teams to solve difficult product issues. Over time, some of the roles he has helped fill are Support, IT, Training, Development, QA, Sales Engineering, and Professional Services. Today he is the Director of World Wide Support at Venafi and considers himself lucky to get to work with some of the best talent in the industry.
- Kevin MurphyBusiness Information Security Officer (BISO), T-Mobile USA
Kevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT security certifications.
- Vanessa PeguerosBoard Member, Cybersecurity Leader, Angel Investor
Vanessa is an accomplished technology executive with over 30 years of experience. Currently she serves as a Corporate Board Director of the public company Liveperson (NASDAQ: LPSN), Boeing Employee Credit Union, and Prisidio. Formerly she was on the board of Carbon Black (NASDAQ: CBLK) and was part of the transaction to sell Carbon Black to VMware. Vanessa is also very active in angel investing and is a venture partner for Flying Fish Partners.
Vanessa has held senior leadership positions at organizations such as DocuSign, Expedia, U.S. Bank, and AT&T Wireless. Her expertise spans various domains, including technology architecture and engineering, risk management, cybersecurity, and compliance. Vanessa has a proven track record of successfully building and leading high-performance cybersecurity teams, implementing robust security frameworks and controls, and driving cultural change to foster a strong security mindset within organizations.
Vanessa's educational background includes a MBA from Stanford University, MS in Telecommunication from the University of Colorado, Boulder and a BS in Engineering from UC Berkeley. She also holds various cybersecurity certifications including CISSP, CRISC, CISM, and GSEC. Relative to her board work, she holds the National Association of Corporate Directors (NACD) Director Professionalism certification.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Carla HoughRisk & Threat Analyst, UW Medicine IT Services & Security
- Jordan WisemanPCI Environments, AWS
- Eddy CruzChapter President, Evergreen InfraGard
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- John O'LearyPresident, CISSP, O'Leary Management Education
John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award.
- Alejandro VillegasSecurity Engineer, Amazon
Seasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001
- Joan RossCybersecurity Technologist, CISO, and Threat Intelligence Professional
Joan Ross is a respected industry thought leader who develops advanced security strategies, publishes and speaks on implementing threat intelligence. Joan is a former Chief Security Officer for two technology companies, coming up the security ranks as an encryption engineer and cloud security architect. As an early CISSP holder from back in the 1990’s, she maintains a number security and privacy certifications and earned her Masters of Science degree in design and engineering focusing on incident response with the U.S. Coast Guard.
- Mary GardnerVP & CISO, F5 Networks
Mary Gardner’s background provides a wealth of security, compliance, and risk management expertise from a variety of industries, including healthcare, finance, and transportation/logistics. She joined F5 as chief information security officer (CIS)) from Seattle Children’s, where she served as CISO. She has also held security leadership positions at Fred Hutchinson Cancer Research Center, Port of Seattle, JPMorgan Chase, and Washington Mutual.
Gardner holds a B.S. from Trinity University. She is also a Certified Information Systems Security Professional (CISSP) and member of the Executive Women’s Forum. Gardner is based in Seattle at F5’s corporate headquarters.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Barbara Endicott-PopovskyExecutive Director, Center for Information Assurance and Cybersecurity, University of Washington
Barbara Endicott-Popovsky, Ph.D., is Executive Director of the Center for Information Assurance and Cybersecurity at the University of Washington, recently re-designated by NSA/DHS as a Center of Academic Excellence in Cyber Defense Education, headquartered at UW Bothell, and a Center of Academic Excellence in Research, headquartered at the APL (Applied Physics Lab). She is a Principal Research Scientist at APL; an Affiliate Professor at UW Bothell’s Department of Computer Science and Systems and UW Seattle’s Department of Urban Planning and Management for the Master of Infrastructure Planning and Management, and adjunct faculty at University of Hawaii Manoa’s Department of Information and Computer Science. She was named Department Fellow at Aberyswyth University Wales (2012). Her academic career follows a 20-year career in industry marked by executive and consulting positions in IT architecture and project management.
- Craig SpiezleFounder & President, AgeLight Advisory & Research Group
Craig Spiezle is the founder and managing partner of AgeLight Advisory Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mindset to stewardship. Craig is the Charmain emeritus of the Online Trust Alliance, an initiative of the Internet Society. He frequently briefs international policy makers driving awareness of best practices by both the public and private sectors and importance of internet governance. Craig has championed security best practices to help protect consumers while promoting innovation and the role of meaningful self-regulation. Prior to OTA, Craig spent over a decade at Microsoft focused on security and privacy enhancing technologies and standards. Craig chairs the Online Trust & Integrity Council and is on the board of the Identity Theft Council, editorial board of SC Magazine and a member of InfraGard, the IAPP and the APWG.
- Kevin KinGlobal Director, Systems Engineering, CSS, Palo Alto Networks
- Chris LueddeProduct Manager, Wombat Security
- David BartonCISO, Forcepoint
David Barton is the Chief Information Security Officer for Forcepoint, responsible for securing the company and sharing key learnings with customers. Barton brings to his role more than 20 years of experience in security leadership across a variety of sectors, including telecommunications, healthcare, software development, finance and government. Prior to joining the company in 2015, he spent three years as the Head of Information Security at Hireright, where he was responsible for securing the company’s information and physical assets on a global scale. Barton holds an MBA from the University of Missouri – Kansas City and a bachelor’s degree in Management Information Systems from Simpson College. He is also a Certified Information Systems Security Professional (CISSP).
- JD SherryChief Strategy Officer, Remediant
JD Sherry is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cybersecurity, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private, and hybrid clouds emphasizing security architecture best practices to meet strict compliance standards.
Over the last decade, he has established himself as a trusted senior advisor for the protection of Payment Card Industry (PCI), Health Information Privacy Act (HIPAA), and Personally Identifiable Information (PII) data. JD interfaces regularly with TV/media/press to provide expert insight on the state of cybersecurity and how individuals and organizations can adequately protect themselves from loss. JD has held Top Secret clearance and has an MBA/IT degree from Jones University and a B.S. degree from the University of Nebraska.
- Chuck CraftSenior Sales Engineer, Tavve
Chuck's role at Tavve is making customers successful in moving network protocols such as SNMP, Syslog and Netflow into and out of the DMZ. He draws on over 30 years of IT/computer experience; 24 years (NNM 3.31) of that in network and systems management working for HP resellers and vendors.
- Brent McKinnonEnterprise Sales Manager, Cylance
- Patti SauderSenior Sales Engineer, Cylance
- Santosh KandalaDirector, Security Monitoring & Analytics, Microsoft
Santosh Kandala is a passionate security leader with diverse experience in the areas of behavioral analytics, security monitoring, incident response, cloud scale detection, digital forensics, ethical hacking and investigations. When is he is not finding needles in the haystack, you will see him running half marathons in the trails around Puget Sound.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Nick Multari, PhDProgram Manager, Pacific Northwest National Lab
Nick Multari provides programmatic and technical guidance to cybersecurity research programs at the Pacific Northwest National Lab (PNNL). Prior to joining PNNL, he led the trusted cyber technology group at Boeing Research and Technology. He received his PhD in Computer Science from the University of Texas at Austin

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes