googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, November 8, 2023
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 1
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am
    Location / Room: 407/408

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    ISSA Puget Sound Chapter Meeting - Open to all attendees
    • session level icon
    New CISO Success Blueprint: Preparing and Thriving in the First 30 Days
    speaker photo
    Director of IT, CISO, Blueprint
    speaker photo
    CIO / CISO, Sellen Construction
    speaker photo
    ISSA-PS Board Secretary; Division Cybersecurity Officer, PNW, CommonSpirit Health
    speaker photo
    CISO, VP, Constellis
    speaker photo
    Outreach Director, ISSA Puget Sound
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: 404/405

    This session delves into the crucial strategies and insights vital for establishing a successful tenure as a Chief Information Security Officer. Drawing on the experiences of seasoned CISOs, this presentation navigates the intricacies of early challenges, effective risk management, and fostering a robust cybersecurity culture within organizations. Join us as we uncover the pivotal steps and best practices that set the trajectory for a thriving cybersecurity leadership journey.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Implications of ChatGPT and Other Similar AI Tools
    speaker photo
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: 402

    ChatGPT (Generative Pre-trained Transformer) is a language model developed by OpenAI. It is based on the Transformer architecture and is one of the largest and most powerful language models available today. ChatGPT has been pre-trained on massive amounts of text data and can generate human-like text in response to prompts given to it. ChatGPT, and other AI programs, have the potential to revolutionize the way we interact with technology and each other. With any new technology there are negatives and positives. Come ready to add to the discussion with your peers at this invitation-only breakfast meeting of the SecureWorld Seattle Advisory Council.

    9:00 am
    [Opening Keynote] Running Cybersecurity as a Business
    • session level icon
    speaker photo
    Chief Trust Officer, Pantheon.io
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The old way of running security no longer works. Providing insights from a CISO’s perspective – and perhaps with some controversial takes – this opening keynote delves into the strategic shift from traditional IT security to ‘trust product development’ measured in value outcomes. The session underlines how such a strategic pivot can meet rigorous cybersecurity standards while promoting growth and retention by aligning trust mechanisms to various customer stakeholders.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    [Panel] Great Minds Think Alike: Bringing Security Teams Together!
    • session level icon
    speaker photo
    Cybersecurity Advisor, Region 10, DHS CISA
    speaker photo
    Regional Cybersecurity Advisor, Region 10, DHS CISA
    speaker photo
    Managing Partner, Rezolvrizk LLC; Former CSO, Wells Fargo
    speaker photo
    Information Security & Compliance Engineer, Costco Wholesale
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: 404/405

    This panel discusses the historical independence between physical, Operational Technology (OT), and Information Technology (IT) security. The independence can be attributed to a variety of factors including industry experience, professional training, hiring practices, and event handling. Despite their separate origins, the three areas of security are becoming increasingly interconnected in modern times due to the growing dependence on technology and the need for a more holistic approach to security.

    10:15 am
    Cybersecurity in Real-Time: Anticipating Threats and Decoding Network Behavior
    • session level icon
    speaker photo
    Threat Research Analyst, Team Cymru
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 406

    In the fast-evolving realm of cybersecurity, professionals must anticipate emerging threats while simultaneously addressing active ones. A proactive defense strategy is paramount, but so is the ability to quickly assess the impact of present threats. By leveraging NetFlow data analysis, they can preemptively counter threats, often before they go live, and efficiently differentiate between regular and malicious network activities. Specialized tools enhance this by uncovering hidden aspects of the IT landscape, fortifying both proactive and reactive defenses. In this presentation, I’ll explore three major challenges security operations teams face and how we effectively address them.

    10:15 am
    [Panel] Safely Using AI to Increase Revenue and Productivity While Decreasing Risk
    • session level icon
    speaker photo
    VP, CSO - Cloud Security Transformation, Netskope
    speaker photo
    Practice Director, Big Data & Analytics, Optiv
    speaker photo
    Regional Director, Optiv
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 403

    Join Optiv and Netskope experts as we deep dive into AI. How do the advantages and disadvantages of its use help shape the success of your business?

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Securing the Future: Exploring Legal and AI Frontiers in Cybersecurity
    • session level icon
    speaker photo
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 406

    This presentation focuses on the power of generative AI and the legal, privacy, and security-related risks that are the inevitable cost of harnessing that power. Organizations must be aware of the many implications created through the deployment of a generative AI tool in their environment, and security personnel must learn to ask critical questions. You will learn why you need to ask “who owns the data?”, “who owns the tool?”, “who is responsible for the output of the tool?”,  and more from a combination of the legal, privacy, and security perspectives.

    11:10 am
    The New World Order for CISOs: Privacy, the SEC, and Accountability
    • session level icon
    speaker photo
    Head of Data Governance and Privacy, Alaska Airlines
    speaker photo
    Incident Response & Data Privacy Compliance Attorney
    speaker photo
    Sr. Associate Attorney, BakerHostetler
    speaker photo
    Risk Advisory Practice - Cyber Privacy and Risk, Grant Thornton LLP (US)
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 403

    As CISOs become increasingly accountable for their organization’s cybersecurity posture, they must also be mindful of the ever-changing regulatory landscape. One area of particular concern is the intersection of privacy, the SEC, and accountability.

    In this session, we will discuss the following topics:

    • The SEC’s recent cybersecurity regulatory actions and their implications for CISOs
    • The growing importance of privacy in the cybersecurity landscape
    • How CISOs can balance the need to protect privacy with the need to comply with SEC regulations
    • Strategies for CISOs to demonstrate accountability for their organization’s cybersecurity posture
    11:10 am
    [Panel] Symphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital Orchestra
    • session level icon
    Identifying the Current Threat Landscape
    speaker photo
    Growth Technologies Evangelist, Check Point Software Technologies
    speaker photo
    VP, Cyber Risk, Skybox Security
    speaker photo
    Sales Engineer, Cymulate
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: 404/405

    In the ever-changing symphony of the cyber realm, a cacophony of threats echoes throughout. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.

    Threat actors—wielding exploit kits and Zero-Day vulnerabilities—orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations. To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.

    Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we will compose a symphony of cybersecurity, safeguarding the digital soundscape and ensuring a melodious future.

    12:00 pm
    [Lunch Keynote] Insider Threats and How to Hunt for Malicious Insiders with a Spotlight on Ransomware
    • session level icon
    speaker photo
    Security Strategist, VMware Carbon Black
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Real-world insider threats causing the most harm go well beyond news headlines or Hollywood stories. For example, what about the system administrator caught selling corporate data to acquisition targets? Or the employee caught trying to steal a manufacturing process formula and client lists, and who sent confidential information to other employees? How were they caught, how quickly could your organization be breached by malicious insiders like these, and how could your team find them?

    Threat hunters are often tasked with looking for attackers’ tools, techniques and procedures, but how can your team look for malicious insiders? Join us for this session as we discuss the techniques used during specific investigations that helped uncover these insider threats. We’ll get inside the minds of various kinds of malicious insiders—from the leaker, to the blackmailer, to the snooper, to the wannabe spy—and why every organization needs to expand threat hunting to include  insider threats.

    12:00 pm
    Advisory Council Lunch Roundtable – (VIP / Invite Only)
    • session level icon
    The Role of Identity in a Rapidly Evolving Threat Landscape
    speaker photo
    Field CTO & Principal Solutions Engineer, Okta
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: 402

    Amid the breakneck pace of change in the cybersecurity threat landscape, securing digital identities remains both a complex art and science. Striking the balance between robust security and a seamless user experience requires organizations to remain two-steps-ahead of bad actors. Join this discussion to gain insights from cybersecurity leaders on what exactly the rapidly-changing threat environment looks like today, what to expect going forward, and to explore effective approaches for mitigating cyber risks without compromising on user experience.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Build SASE Better: The Journey in Building a Blueprint for Secure Access Service Edge
    • session level icon
    speaker photo
    Strategic Planning & Design Manager, State of Washington
    speaker photo
    Solutions Architect, State of Washington
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: 403
    Want something to withstand the test of time? You need a solid foundation, a plan to guide the build process, and a willingness to see the plan through. These truths apply regardless of whether you’re constructing a building or a security program. In this session, you’ll start off at the ground level. You’ll learn the details of the creation of a Secure Access Service Edge (SASE) blueprint. A multifaceted problem set drove the need for a comprehensive & overarching strategic plan, paving the way to evolve Gartner’s SASE framework. You’ll then hear about Washington State’s current SASE framework roadmap, including on many of the key components we are pursuing. At the end of it, you’ll walk away with a deeper appreciation of how our SASE framework approach will lead to an actionable blueprint by 2024 that can uphold security at our organization now and into the future.
    1:15 pm
    [Panel] Navigating the Cybersecurity Symphony in the Age of AI
    • session level icon
    Understanding and Theorizing the Future of Generative AI
    speaker photo
    Mandiant Principal Architect, Google Cloud
    speaker photo
    Principal Security Practitioner, Horizon3.ai
    speaker photo
    VP, GTM Strategy, Cyera
    speaker photo
    CISO, AAA Washington
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 404/405

    Generative AI, such as ChatGPT and Bard, has incredible potential, but it also brings certain negative elements and concerns for everyone. It is important to address these concerns to ensure responsible and ethical use of AI technology, especially within cybersecurity. This panel covers insider threats, lack of accountability, cybersecurity vulnerabilities, fake data and data privacy, human replacement concerns, and ethical misuse.

    By understanding these fears and proactively addressing them through responsible development, robust safeguards, and ongoing monitoring, we can harness the potential of generative AI while mitigating its associated risks. Collaboration between AI researchers, policymakers, and industry professionals is essential to ensure that generative AI technology is developed and deployed in a manner that aligns with ethical standards and human values. Hear from experts in the field on how they’re trying to navigate this new song and dance with AI, what we can expect in the near and distant future, and what it takes to provide the support DevOps teams need.

    1:15 pm
    The Modern SOC, Reimagined: Hear the Future and Fight Tech with Tech
    • session level icon
    speaker photo
    Cortex Systems Engineer, Palo Alto Networks
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 406

    Modern applications, workloads, and microservices are generating vast amounts of data faster than most security operations centers (SOCs) can adapt. And security teams operating on a legacy SOC model can spend hours—even days—triaging a single threat event. How can SOC teams outpace modern threats? By fighting technology with technology and leaning into AI to augment analysts, SOC teams can amp up their defenses and focus on more critical issues.

    So, what’s next for the SOC? Join this keynote with David Sigmon, Cortex Systems Engineer, as he discusses today’s advanced adversaries and shares expert views on how SOC teams must adapt to cope with a flood of disconnected data.

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:30 pm
    [Panel] Women in Security: Harnessing Diverse Talents to Strengthen Cybersecurity
    • session level icon
    speaker photo
    CISO, Valon
    speaker photo
    Deputy Chief Privacy Officer (CPO), Boeing
    speaker photo
    VP, Data Security Architecture, Salesforce
    speaker photo
    Cybersecurity Technologist, CISO, and Threat Intelligence Professional
    speaker photo
    Manager, Cybersecurity, KPMG
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: 404/405

    ISACA Puget Sound SheLeadsTech, Women in Cybersecurity (WiCyS) Western WA, and Women in Tech Global organizations are excited to come together to co-host a phenomenal panel of experienced cybersecurity leaders and practitioners to share diverse experiences and journeys in the field. You will hear about their learnings and what it takes to build strong cyber strategies and programs through a diverse and inclusive workforce instrumental in long-term success and organizational mission delivery.

    2:30 pm
    There Is No 'I' in Team, but if You Look Closely, There Is a 'Me'
    • session level icon
    How to Navigate Being the First Dedicated Security Hire and Growing a Team
    speaker photo
    Head of Security, Xeal
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: 406

    Being the first dedicated security hire at any organization is an incredible learning experience. One moment you could be hands-on deploying EDR and MDM tools, the next, you’re on a sales call with a prospect or talking to the board. But amongst the opportunity, there is of course plenty of stress, anxiety, and burnout. When you’re doing the things that might otherwise be done by a team of folks, how do you know where to get started? How do you prioritize? This session will answer those questions.

    2:30 pm
    Zero Trust Microsegmentation: It's Easier Than You Think
    • session level icon
    speaker photo
    Regional Systems Engineer, Illumio
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: 403

    Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network.  Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

    • Gaining visibility to where you are the most vulnerable
    • Closing risky ports
    • Leveraging tools you already have in place without adding layers of complexity
    3:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:45 pm
    [Closing Keynote] A Whole Lotta BS (Behavioral Science) About Cybersecurity
    • session level icon
    speaker photo
    Director, Information Security & Engagement, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: Keynote Theater

    Let’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security.  We’ll explore the 2023 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.

    3:45 pm
    WiCyS Western Washington Affiliate Meeting - Open to all attendes
    • session level icon
    WiCyS Wants You! Meet and Greet Discussion of the 2024 Roadmap
    speaker photo
    President, WiCyS Western Washington Affiliate
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:30 pm
    Location / Room: 409

    Come and join a meet-and-great mixer, including hearing affiliate updates and meeting the WiCyS Western Washington leadership team.

    3:45 pm
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 2
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm
    Location / Room: 407/408

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    4:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 5:30 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary hors d’oeuvres and beverages. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.

  • Thursday, November 9, 2023
    7:00 am
    Registration open
    Registration Level:
    7:00 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 3
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am
    Location / Room: 407/408

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    InfraGard Chapter Meeting - Open to all attendees
    • session level icon
    The Ukrainian Paradox: Cyber and Geo-Political Implications of This Conflict
    speaker photo
    President, Washington State InfraGard Chapter
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am
    Location / Room: 409

    This session is designed for individuals interested in a perspective of the war in Ukraine and its far-reaching cybersecurity impacts. The topics will be open and free flowing discussing real-world issues with the ability to ask questions. The session will cover how to prepare your organization for a bad day.  What is combat electronic warfare and is it different from cybercriminal activity. The tactics and techniques of a cyber guerrilla force.  A discussion of how drones are changing the attack vector of security.  Why having a detailed action plan for incident response is critical and where to find reliable information. The view of this presentation is based off facts and information gathered by a former U.S. Army Special Force Operator (Green Beret) who has family and friends in Ukraine.

    Session objectives include:

    • The magnitude of the cyber issue
    • Day 666 of the war in Ukraine
    • Threat actors and the different types
    • CIA & FBI recruiting ground
    • Uptick in cybercrime
    • Electronic Warfare (or IP Theft)
    • What is Combat Electronic Warfare Intelligence?
    • Drone warfare, the evolving security threat
    • U.S. Critical Infrastructure: what is it?
    • Nuclear energy plant: how to protect it and not
    • The need for tabletop exercises
    • The Good, Bad, and Ugly of being a CISO
    • Just enough security
    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Remaining Resilient and Identifying the Next Transformation Facing Cybersecurity Professionals
    speaker photo
    Founder & President, AgeLight Advisory & Research Group
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am
    Location / Room: 402

    Join this invitation-only meeting for SecureWorld Seattle Advisory Council members to discuss:

    • The next transformation that is going to “bite cybersecurity professionals in the @ss” and the shifts to take note of in the cybersecurity landscape
    • What transformations are coming in the next 5-10 years that cybersecurity professionals, and business leaders in general, should be thinking about
    • Resilience. How do we stress the importance of resilience when it comes to data centers?
    • What keeps cybersecurity professionals like you up at night is what you can’t even imagine is coming next.

    Come prepared to add to the discussion. The more voices, the better.

    9:00 am
    [Fireside Chat] Transitioning from CISO to CIO: What Changes?
    • session level icon
    speaker photo
    CIO, Morgan, Lewis & Bockius LLP
    speaker photo
    CEO, Kidware Software LLC
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    A talk with Steve Naphy, CIO of Morgan Lewis, a Philadelphia-based law firm working with clients ranging from established, global Fortune 100 companies to enterprising startups. Steve talks about his move from head of InfoSec to Chief Information Officer.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    GenAI and Security: How to Proceed (with Caution)
    • session level icon
    speaker photo
    BISO, Salesforce
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: 406

    By now, we have all heard about Generative AI, Large Language Models (LLMs), and the promise of how they will improve our world. But there are also risks to using these technologies. How can a security or compliance team help enable this new technology without taking on too much risk? This session talks about the risks, state of security and compliance around these technologies, and possible ways to progress safely in the realm of AI and LLMs.

    10:15 am
    [Panel] Cyber Rhapsody: Harmonizing the Truths Behind Modern Cybersecurity Myths
    • session level icon
    speaker photo
    Co-Founder & CPO, Veriti
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 404/405

    In the ever-evolving landscape of cybersecurity, staying informed and dispelling prevalent myths is paramount to safeguarding our digital realm. This panel provides an engaging discussion, set to the tune of a Cyber Rhapsody, unveiling and demystifying contemporary cybersecurity myths that have emerged in recent times. By shedding light on these misconceptions, this presentation aims to empower individuals and organizations with accurate knowledge and practical insights to fortify their digital defenses.

    Through this melodious journey of debunking cybersecurity misnomers, individuals and organizations can acquire a deeper understanding of the evolving threat landscape, empowering them to make informed decisions and implement effective strategies to protect their digital assets. Let the Cyber Rhapsody resonate as a guide to harmonizing security in our interconnected world.

    10:15 am
    Behind the Scenes of Teams and OneDrive: The Secret Life of Shared Files
    • session level icon
    speaker photo
    Chief Product Evangelist, Tenfold Security
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: 403

    With the accelerated use of Microsoft 365, we are shooting more sensitive and confidential data into the cloud than we are aware of. Keeping track of what files users are sharing among each other in Teams and OneDrive and knowing who else has access to seems an impossible task. What can you do about it? Find out in this talk.

    Topics covered include:

    • What goes on in the background when we share data in Teams & OneDrive.
    • Why more people have access to shared files than we think.
    • How tenfold helps you keep track of permissions and shared files once and for all
    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Do You Know What You Don't Know, and Why Don't You Know It?
    • session level icon
    speaker photo
    Regional Cybersecurity Advisor, Region 10, DHS CISA
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: 403

    This session explores the common threat vectors for infiltration and some of the actions you can take to prevent these intrusions.

    11:10 am
    [Panel] Responding to Incidents: From Preparation to Execution
    • session level icon
    speaker photo
    Chief Cyber Business Officer, CYGNVS
    speaker photo
    VP, Corporate Privacy, and General Counsel, Spirion
    speaker photo
    Cybersecurity State Coordinator/Advisor, Region 10, State of WA, DHS CISA
    speaker photo
    Deputy Chief Privacy Officer (CPO), Boeing
    speaker photo
    Business Information Security Officer (BISO), T-Mobile USA
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: 404/405

    In the world of cybersecurity, it’s not a matter of if or when you’ll face an incident; it’s about how often you’ll be impacted. Join our panel of seasoned cybersecurity leaders as they delve into the crucial topic of incident response. When you receive that ominous call—”we have an incident”—what do you do?

    Our panel will explore four key strategies:

    1. Have a Plan, Practice the Plan, Follow the Plan: Preparation is paramount. Establish a well-defined incident response plan and ensure your team practices it regularly. When the time comes, following the plan will be second nature.
    2. Understand Your Data and Its Regulatory Impact (Blast Radius): Know your data inside out. Identify what regulated data may have been affected – the Blast Radius. Understanding this scope is vital for effective incident containment and mitigation.
    3. Assess the Severity: How bad is it? Our experts will guide you through assessing the severity of the incident. This assessment forms the basis for determining who needs to be notified and what needs to be communicated, all in compliance with relevant regulations like SEC Rule and HIPAA.
    4. Retainers and SLAs with Key Vendors: Ensure you have retainer agreements in place with key vendors. Service Level Agreements (SLAs) should be ready to go. Our panel will discuss the importance of these relationships in facilitating a swift response.
    11:10 am
    Vaultless: The Future of Secrets Management
    • session level icon
    speaker photo
    CEO & Co-Founder, Akeyless
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: 406

    Today’s breaches repeatedly show that the Achilles heel of enterprise security is Secrets Sprawl, where thousands of machine credentials, API keys, and certificates can easily be found within DevOps Automation tools and cloud-containerized environments. The first attempt to better manage secrets using centralized Vaults became insufficient in today’s multi-cloud, microservices-driven landscape. Learn how the Vaultless approach represents the future of Secrets Management, with a lightweight, secure, and easy-to-scale solution to manage secrets that evidently results in faster and wider security adoption.

    12:00 pm
    [Lunch Keynote] Cyber-Enabled Fraud and Business Email Compromise in 2023
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    The presentation will cover the Secret Service’s view on current cybercrime trends to include the emergence of AI/ML in the cybercrime world. Investigator Dougherty will frame it in the lens of BEC (Business Email Compromise) and discuss the new and emerging advancements cyber criminals are using to victimize businesses in 2023 and beyond. Investigator Dougherty may even share a a deepfake of himself.

    12:00 pm
    Advisory Council Roundtable Lunch – (VIP / Invite Only)
    • session level icon
    The State of Cybersecurity in 2023: The Good, the Bad, and the Unknown
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: 402

    The bad actors are getting more sophisticated. A new “hybrid war” landscape thanks to the Ukraine-Russia war and now the Israel-Hamas war. Current and developing vectors for attacks: BEC, malware, phishing, DDoS, spyware, ransomware, and more. Join this VIP lunch roundtable for SecureWorld Seattle Advisory Council members to rub elbows and commiserate with CISO peers and invited guests to share ideas, best practices and lessons learned in the fight to keep the public and private sectors safe from cybercrime. And let’s not forget the challenge of filling the cybersecurity talent pipeline.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Elevating Cybersecurity Standards: The Role of Accredited Service Providers and Certified Individuals
    • session level icon
    speaker photo
    Community Manager, CREST USA
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm
    Location / Room: 406

    The digital era has witnessed an exponential increase in cyber threats, making it crucial for organizations to adopt and implement effective security measures. CREST International, as a leading body in cybersecurity standards, emphasizes the critical role played by accredited service providers and certified individuals in shaping a resilient and secure cyber environment.

    Tailored to meet the interests and concerns of CIOs and CISOs, this session explores the profound impact of accreditation and certification on enhancing cybersecurity infrastructure and response capabilities within organizations.

    1:15 pm
    [Panel] Cloud Sonata: Orchestrating Security in the Digital Sky
    • session level icon
    Securing Your Cloud Environment
    speaker photo
    Customer Success Manager, Outshift by Cisco
    speaker photo
    Enterprise Solutions Architect, Aqua Security
    speaker photo
    Global IAM Strategist, One Identity
    speaker photo
    Distinguished Fellow, ISSA
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 404/405

    In the symphony of modern cybersecurity, the cloud environment plays a key role as both a conductor of efficiency and a source of potential vulnerabilities. As organizations increasingly embrace the cloud to unlock agility and scalability, it is crucial to harmonize the protective measures that safeguard these virtual landscapes.

    This panel discussion delves into the intricate nuances of securing cloud environments. These experts will share their orchestration of robust security frameworks, best practices, and cutting-edge technologies that fortify the digital sky against threats. From encryption and access controls to identity management and incident response, they will explore the melodies of defense that resonate within the cloud and how they can impact any organization.

    1:15 pm
    Tabletop Exercises: The Fun Kind
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: 403

    Tabletop exercises are not a new thing in incident response training and compliance requirements. But they can often be dull and it can be difficult to herd all of the proverbial cats into a room.  But what if we could address that problem to some extent?  What if IR tabletops became a game that people enjoyed to play and still accomplished learning objectives? What if we played a game like Dungeons & Dragons (D&D)? But instead of fighting orcs with magic you are fighting a realistic ransomware scenario armed with your D20 playing as the dexterous Deputy CISO (who’s always the scapegoat, right?) along with the rest of your team.

    There is ample evidence that learning happens more effectively when there is fun and laughter involved.  Not only that, if people are excited about participating, aligning schedules and getting people into a room (or e-room) is much easier.  I’ll tell you about my path to IR role playing games, my experiences, and how you can get started doing your own gamified IR tabletops right away!

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:30 pm
    CISOs Are Still from Mars, Board Members Are Still from Venus
    • session level icon
    New Lessons Learned from Previous Board Interactions
    speaker photo
    Founder & President, AgeLight Advisory & Research Group
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: 406

    A year after giving this presentation at SecureWorld Seattle 2022, Craig Spiezle shares updated lessons learned from the trenches on how to effectively communicate with a board and your executive leadership. With the ever-changing landscape of cybersecurity, new SEC rules, and increased accountability for CISOs and other leaders, this session shares missteps and mistakes, providing strategies to help tell a powerful story to: 1) inform and educate; 2) influence a decision; and 3) inspire action.

    2:30 pm
    Metrics That Matter and When They Don’t
    • session level icon
    speaker photo
    Independent Consultant
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm
    Location / Room: 403

    Jared Pfost has built metrics programs at four global companies and consulted for many others. Learn when to start and stop measurement of controls at the operational and executive levels. Does your organization really want to be data driven or just demonstrate compliance? Jared shares the most effective measures across Access Management, Data, Applications, Devices, Networks, GRC, and Response. He will also share techniques for visual story-telling to drive decisions, or not!

    2:30 pm
    Demystifying External Exposure Management
    • session level icon
    speaker photo
    Software Engineering Director, CyCognito
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    Location / Room: 404/405

    Organizations are increasingly recognizing that unmanaged or under-managed, exposed assets represent the path of least resistance for attackers to execute successful attacks. Yet, the typical G2K organization is unaware of between one to two thirds of exposed assets. Moreover, these assets, which may include business critical web apps with PII data are rarely if ever tested for security vulnerabilities. The combination of unknown exposed assets and inadequate testing with the reality of siloed security programs is a perfect storm that creates a gaping hole that Gartner suggests organizations address as part of an External Exposure Management program. Join this session to learn more about the state of exposure management; it’s key challenges and effective solutions.

    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 4
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm
    Location / Room: 407/408

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

Exhibitors
  • Akeyless
    Booth: 230

    Akeyless Security is the company behind Akeyless Platform, the leading Vaultless Secrets Management platform designed to protect credentials, certificates and keys across multi-cloud and DevOps Environments.

  • Aqua Security
    Booth: 320

    Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.

  • ASIS Puget Sound
    Booth: n/a

    ASIS Puget Sound Chapter #051 of ASIS International is a local chapter of about 425 members strong. We are a mix of private security professionals, public law enforcement and security technology vendors that continuously strive to enhance our profession in the Puget Sound region. Our membership includes employees from organizations such as Microsoft, Amazon, Boeing, Starbucks, Costco, Nordstrom, Federal Protective Services, and numerous other public law enforcement agencies & private corporations.

    We believe in peer-to-peer networking, continuing education, certification and sharing of best practices to further the profession and enhance our posture in the community. The chapter leadership encourages use of the ASIS membership to be leveraged to its full potential through active participation in chapter initiatives, activities or volunteer efforts as well as community service.

  • AuditBoard, Inc
    Booth: 280

    AuditBoard is the leading cloud-based platform transforming how enterprises manage risk. Its integrated suite of easy-to-use audit, risk, and compliance solutions streamlines internal audit, SOX compliance, controls management, risk management, and security compliance. AuditBoard’s clients range from prominent pre-IPO to Fortune 50 companies looking to modernize, simplify, and elevate their functions. AuditBoard is the top-rated audit management and GRC software on G2, and was recently ranked for the second year in a row as one of the 100 fastest-growing technology companies in North America by Deloitte.

  • BlackBerry Corporation
    Booth: 430

    BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.

  • Check Point Software Technologies
    Booth: 360

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • CREST
    Booth: 375

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • Critical Start
    Booth: 275

    Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.

  • CyberArk Software
    Booth: 300

    CyberArk (NASDAQ: CYBR) is the global leader in privileged access security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets. The company is trusted by the world’s leading organizations, including 50 percent of the Fortune 500, to protect against external attackers and malicious insiders. A global company, CyberArk is headquartered in Petach Tikva, Israel, with U.S. headquarters located in Newton, Mass. The company also has offices throughout the Americas, EMEA, Asia Pacific and Japan.

  • CyCognito
    Booth: 140

    CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn’t even know existed. Welcome to the Shadow Risk Revolution.

  • Cyera
    Booth: 160

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • Cymulate
    Booth: 150

    Cymulate SaaS-based continuous security validation makes it simple to measure and improve your security posture across the full attack kill-chain. Every assessment is scored and includes actionable remediation guidance to mitigate risk and optimize security control effectiveness. Cymulate enables you to take data-driven decisions and manage your security resources efficiently.

  • DHS Cybersecurity and Infrastructure Security Agency (CISA), Region 10
    Booth: 530

    Through CISA’s efforts to understand and advise on cyber and physical risks to the Nation’s critical infrastructure, we help partners strengthen their own capabilities. We connect our stakeholders in industry and government to each other and to resources, analyses, and tools to help them build their own cyber, physical and communications security, and, in turn, strengthen national resilience.

    Led by Regional Director Patrick J. Massey, based in Seattle, Washington, CISA’s Region 10 staff provides cybersecurity, physical infrastructure security, chemical security, and sector outreach services to 271 Tribal Nations and the following states: Alaska, Idaho, Oregon, and Washington.

    Region 10 personnel carry out CISA’s five priorities:

    • Improve supply chain security against cyber threats from malicious actors and the rollout of 5G technologies;
    • Harden federal networks (the civilian .gov domain);
    • Reduce risk at soft targets;
    • Enhance election security; and
    • Protect critical infrastructure that includes industrial control systems and the processes that provide vital services in critical infrastructure.
  • Elasticsearch, Inc.
    Booth: 390

    At Elastic, we help organizations, their employees, and their customers accelerate the results that matter.

    With solutions in Enterprise Search, Observability, and Security, we help enhance customer and employee search experiences, keep mission-critical applications running smoothly, and protect against cyber threats. Delivered wherever data lives, in one cloud, across many clouds, or on-prem, Elastic enables more than 50% of the Fortune 500, and 17,000+ customers including Netflix, Uber, Slack, and Microsoft, to achieve new levels of success at scale and on a single platform. Learn more at elastic.co.

  • Endace
    Booth: 285

    Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.

  • Expel
    Booth: 480

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • F5
    Booth: 310

    F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

  • ForeScout Technologies, Inc.
    Booth: 130

    ForeScout Technologies, Inc. has pioneered an agentless approach to network security to address the explosive growth of the Internet of Things (IoT), cloud computing and operational technologies (OT). We offer a highly scalable, heterogeneous platform that provides Global 2000 enterprises and government agencies with agentless visibility and control of today’s vast array of physical and virtual devices the instant they connect to the network. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. As of June 30, 2018, more than 2,900 customers in over 80 countries improve their network security and compliance posture with ForeScout solutions.

  • Fortinet
    Booth: 380

    Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.

  • Gigamon
    Booth: 210

    Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. 

  • Gutsy
    Booth: 190

    At Gutsy we’re redefining security governance. Gutsy is the same band of entrepreneurs who joined together in 2015 to create Twistlock. We believe that security is about people, process, and technology, but customers didn’t have a good way to understand how those worked together.

    We’re building Gutsy to empower security leaders with continuous, data driven, understanding of how their organizations actually work so they can answer hard questions and make good decisions.

  • hCaptcha
    Booth: 385

    hCaptcha brings a modern, privacy-focused approach to stopping bots. Our systems are thus designed from the ground up to minimize data collection and retention while maintaining class-leading security. The best way to protect user data is not to store it at all.

  • Horizon3.ai
    Booth: TBD

    Horizon3.ai’s mission is to help you find and fix attack vectors before attackers can exploit them. NodeZero, our autonomous penetration testing solution, enables organizations to continuously assess the security posture of their enterprise, including external, identity, on-prem, IoT, and cloud attack surfaces.

    Like APTs, ransomware, and other threat actors, our algorithms discover and fingerprint your attack surface, identifying the ways exploitable vulnerabilities, misconfigurations, harvested credentials, and dangerous product defaults can be chained together to facilitate a compromise.

    NodeZero is a true self-service SaaS offering that is safe to run in production and requires no persistent or credentialed agents. You will see your enterprise through the eyes of the attacker, identify your ineffective security controls, and ensure your limited resources are spent fixing problems that can actually be exploited.

  • Illumio
    Booth: 240

    We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
    Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others.

  • ISC2 Seattle Chapter
    Booth: 500

    Bringing like-minded professionals together in the Greater Puget Sound region to discuss current tactics, techniques, and procedures within cybersecurity.

  • ISACA Puget Sound Chapter
    Booth: 560

    The aim of the Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the area.

    The association is one of individual members who are practitioners of information systems auditing, security, risk, and/or governance in his or her organization. The membership of the ISACA reflects a multiplicity of backgrounds and skills that make our profession challenging and dynamic.

    This chapter is run by volunteers who are ISACA members nominated and elected through an established process. Please contact us if you are interested in serving on the board.

  • ISSA Puget Sound Chapter
    Booth: 510

    ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. Join today.

  • Keysight
    Booth: 440

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Mandiant, now part of Google Cloud
    Booth: 330

    Since 2004, Mandiant has been a trusted partner to security-conscious organizations. Effective security is based on the right combination of expertise, intelligence, and adaptive technology, and the Mandiant Advantage SaaS platform scales decades of frontline experience and industry-leading threat intelligence to deliver a range of dynamic cyber defense solutions. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.

  • Netskope
    Booth: 200

    The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

  • Okta
    Booth: 120

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • One Identity
    Booth: 290

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

  • Optiv
    Booth: 200-250

    Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.

  • Outshift by Cisco
    Booth: 180

    Outshift by Cisco is the incubation engine for Cisco’s emerging technologies exploring innovation in cloud native development, AI/ML, API security, observability, network automation, and more.

    Backed by Cisco’s unrivaled portfolio of end-to-end security solutions, Panoptica offers a differentiated experience for complete code to cloud security coverage.

    Panoptica is Outshift by Cisco’s cloud native application security solution. It secures modern applications and workloads to ensure end-to-end security and compliance in multicloud environments. Utilizing advanced visual contextual insights along attack paths, Panoptica boosts visibility, accurately prioritizes risks, and offers actionable remediation guidance, securing your entire cloud application stack.

  • Palo Alto Networks
    Booth: 260

    Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

  • Probely
    Booth: 400

    Probely is the premier cloud-based application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs.

    Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle.

    With over 30,000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them.

  • ReliaQuest
    Booth: 345

    ReliaQuest, the force multiplier of security operations, increases visibility, reduces complexity, and manages risk with its cloud native security operations platform, GreyMatter. ReliaQuest’s GreyMatter is built on an open XDR architecture and delivered as a service anywhere in the world, anytime of the day, by bringing together telemetry from tools and applications across cloud, on-premises and hybrid cloud architectures. Hundreds of Fortune 1000 organizations trust ReliaQuest to operationalize security investments, ensuring teams focus on the right problems while closing visibility and capability gaps to proactively manage risk and accelerate initiatives for the business. ReliaQuest is a private company headquartered in Tampa, Fla., with multiple global locations. For more information, visit www.reliaquest.com.

  • Rubrik
    Booth: 470

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • Skybox Security
    Booth: 340

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • Spirion
    Booth: n/a

    Spirion is a leading enterprise data management software solution that provides high-precision searches and automated classification of unstructured and structured data with unparalleled accuracy.  Spirion helps businesses reduce their sensitive data footprint and proactively minimize risks, costs and reputational damage of cyberattacks by discovering, classifying, monitoring and protecting sensitive data.

  • Splunk
    Booth: 110

    You see servers and devices, apps and logs, traffic and clouds. We see data—everywhere. Splunk® offers the leading platform for Operational Intelligence. It enables the curious to look closely at what others ignore—machine data—and find what others never see: insights that can help make your company more productive, profitable, competitive and secure. What can you do with Splunk?
    Just ask.

  • Team Cymru
    Booth: 170

    Team Cymru’s mission is to save and improve human lives.  We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.

    Our business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.

    Community Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.

    Since 2005, our reputation remains unchallenged.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Tenable
    Booth: 350

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • tenfold Software North America
    Booth: 265

    The access management solution tenfold enables organizations to manage all access rights and user accounts across their on-prem, cloud and third-party systems and apps centrally from within one platform. Not only does this accelerate approval processes, it also protects data against theft and misuse. Thanks to seamless logs and on-demand reports, compliance regulations are also kept at bay. tenfold is quick and easy to install, user-friendly and integrates with numerous systems, making it the perfect fit for mid-size organizations.

  • Tevora
    Booth: 410

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • Thales
    Booth: 255

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatLocker
    Booth: 245

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Traceable
    Booth: 365

    Traceable is the industry’s leading API Security company that helps organizations achieve API protection in a cloud-first, API-driven world. With an API Data Lake at the core of the platform, Traceable is the only intelligent and context-aware solution that powers complete API security – security posture management, threat protection and threat management across the entire Software Development Lifecycle – enabling organizations to minimize risk and maximize the value that APIs bring to their customers.

  • Trellix
    Booth: 355

    Trellix is a cybersecurity company that helps enterprises in protecting themselves against advanced threats and gaining confidence in the security and resilience of their operations. Trellix provides their clients with a dynamic XDR architecture that adjusts to threat actors’ pace and delivers enhanced cyber threat intelligence.

  • Trend Micro
    Booth: 220

    Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.

  • Varonis Systems, Inc.
    Booth: 450

    Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification and analytics. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation.

  • Veeam Software
    Booth: 420

    Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.

    With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.

  • Veriti
    Booth: 460

    Veriti is a fast-growing security infrastructure innovator that helps organizations maximize their security posture while ensuring business uptime.

    Integrated with the entire security stack, Veriti provides a consolidated management layer that continually and proactively monitors exposure to threats and provides actionable remediation paths for security gaps and high-risk vulnerabilities across the organization’s infrastructure and attack surface.

  • VMware Carbon Black
    Booth: 270

    VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.

    At the heart of everything we do lies the responsibility and the opportunity to build a sustainable, equitable and more secure future for all. Since our founding in 1998, our employees and partners have been behind the tech innovations transforming entire industries. Today, we continue to cultivate a culture of innovation where curiosity meets execution.

    We work to harness the next wave of innovation and solve our customers’ toughest challenges through disruptive technologies, like edge computing, AI, blockchain, machine learning, Kubernetes, and more.

  • Washington State InfraGard
    Booth: 540

    InfraGard is a partnership of individuals representing businesses, academic institutions, state and local law enforcement agencies, and communities who are dedicated to collaborating and sharing information to prevent hostile acts against the United States.

    The Evergreen InfraGard Members Alliance area of operation is Washington State and over 600 members. As part of the Western Region, we work closely with the IMAs in Los Angeles, San Diego, Oregon, and Idaho. Our chapter’s mission is, “To protect Washington State’s Infrastructure and critical services by providing a secure platform and trusted community to share experiences and information.”

  • WiCyS Western Washington Affiliate
    Booth: 520
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Doug Drewry
    Director of IT, CISO, Blueprint
  • speaker photo
    Jenny Moshea
    CIO / CISO, Sellen Construction

    My magic spans numerous industries where I've led teams to new worlds. I speak tech and love geeks. I'm the bridge between business and technology. I eat risk for breakfast yet am passionate to the pixel. I inspire new thinking and brand everything. Experts seek me out and people want to be part of what I create. I forged the role of CIO where it hadn't existed and I spark joy in the hearts of many.

  • speaker photo
    Andy Stewart
    ISSA-PS Board Secretary; Division Cybersecurity Officer, PNW, CommonSpirit Health
  • speaker photo
    Thanh Thai
    CISO, VP, Constellis

    As a technology leader with 15 years of experience, Thanh develops IT strategic plans, creates governance frameworks and processes, and aligns IT organization priorities with business strategy. He leads digital transformation to create innovative business models, optimize technology capabilities, and develop competitive advantages. His deep expertise in executing complex IT projects enables him to design and execute roadmaps that modernize legacy technology and maximize business performance.

  • speaker photo
    Bryce Matsuoka, Moderator
    Outreach Director, ISSA Puget Sound
  • speaker photo
    Jake Bernstein, Esq., Moderator
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP

    Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.

  • speaker photo
    Sabino Marquez
    Chief Trust Officer, Pantheon.io

    Sabino Marquez is the Chief Trust Officer at Pantheon.io, a premier provider of WebOps solutions for Drupal and WordPress sites globally. His approach to leading cybersecurity as a ‘Trust Product Practice’ has led to substantial returns on security investments, higher value-generation velocity, and enhanced equity valuations. Sabino leads the Trust Product organization as a go-to-market leader, working alongside the productive business to enable and defend value, and transforming stakeholder Trust into a powerful tool for competitive differentiation. Within his key areas of focus, Sabino ensures robust protection mechanisms are in place for stakeholder interests while also leveraging organizational Trust as a distinct advantage in a competitive market landscape. His work has not only brought him recognition as ‘2023 C100 Winner’, but he is also an esteemed thought leader who frequently shares insights in Security Magazine, The Wall Street Journal, and Cyber Security Tribe.

  • speaker photo
    Alexander Salazar Jr.
    Cybersecurity Advisor, Region 10, DHS CISA
  • speaker photo
    Ronald Watters
    Regional Cybersecurity Advisor, Region 10, DHS CISA

    Ron Watters currently serves as the Region X (WA, OR, AK, ID) Cybersecurity Advisor for the Stakeholder Engagement and Cyber Infrastructure Resilience Division of the Office of Cybersecurity and Communications (CS&C) National Protection and Programs Directorate (NPPD). Based in Seattle, WA, he supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation's critical infrastructure. His program coordinates cyber preparedness, risk mitigation and incident response, and provides cyber security resources, including assessments, to the nation's sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities. Prior to joining DHS, Watters served 27 years with the U.S. Navy and Naval Reserve as a Submarine Sonar Technician and Diver, retiring from the US Navy in 2007. Recalled to Active duty following 9/11, he was offered a position as the Deputy, Information Systems Management Officer with the 4th Marine Corps recruiting District in New Cumberland, PA. He rose to the position of S-6 before leaving in 2009 to take a position as the Chief, Information Assurance Division, Network Enterprise Center Ft Irwin, CA. Watters remained in that position until leaving to become the Branch Manager of the Cybersecurity Branch of the Puget Sound Naval Shipyard in March of 2016 and, soon after, as the Region X Cybersecurity advisor in June of 2017, which he currently holds.

  • speaker photo
    Michael Bacon
    Managing Partner, Rezolvrizk LLC; Former CSO, Wells Fargo

    Michael is the Founder and Managing Partner at Rezolvrizk (pronounced “resolve risk”), a boutique risk management firm specializing in assisting companies in resolving their physical security, information security, investigative, and conduct management risks. Rezolvrizk clients span a wide range of businesses and industries to include brand name industry leading organizations, fortune 500 organizations, start-ups, biomedical, financial, high-tech, healthcare, legal, logistics, and software.

    For the last eight years, Michael has also proudly served as a preferred subcontractor and Senior Security Consultant for Washington-based Premier Risk Solutions LLC.

    Michael specializes in assessing physical security and related risk management programs such as information technology/cyber (Computer Incident Response Plans & Teams - CIRT) and then collaborating with organizations in the development and implementation of security program components and service provider solutions which both minimize risks and add real business value to the organization.

    Michael is a vetted member of the International Association of Professional Security Consultants, and he maintains certifications as a Certified Information Systems Security Professional - CISSP, Certified Protection Professional - CPP, Senior Professional in Human Resources and Society for Human Resources Management Senior Certified Professional. He has a Bachelors in Criminology and Criminal Justice from the University of Texas at Arlington and a Master of Science in Business from the University of Maryland University College.

  • speaker photo
    Jenifer Clark, Moderator
    Information Security & Compliance Engineer, Costco Wholesale

    Experienced Information Security Professional with a demonstrated history of working in the retail industry. Skilled in Operations Management, Sales, Management, Point of Sale (POS) / Fuel Systems, and Inventory Control. Strive to find ways information security can enable and support business and operations teams with solutions. Actively support public/private partnerships with local and federal agencies with emphases on infrastructure, cyber security and community outreach.

  • speaker photo
    Rachelle
    Threat Research Analyst, Team Cymru

    Rachelle joined the S2 Team having been a senior threat intelligence researcher analyst at one of the world's biggest retail brands, Nike. She specializes in e-crime and Russian threat actor tracking. In her free time, she enjoys frustrating baddies as a member of the Cryptolaemus group.

  • speaker photo
    James Christiansen
    VP, CSO - Cloud Security Transformation, Netskope

    James Christiansen is Netskope’s vice president of cloud security transformation and leader of the Global Chief Strategy Office. He is focused on enhancing Netskope’s global clients understand the challenges and solutions of cloud deployments by helping drive thought leadership in cloud security transformation.

    James brings extensive expertise as a global leader in information security. Prior to joining Netskope, he was vice president CISO at Teradata where he led the global security, physical, and information security teams. Previously, James was vice president of information risk management at Optiv, chief information risk officer for Evantix, and CISO at Experian Americas, General Motors, and Visa International.

    As a sought-after expert speaker on security, James has been featured at numerous prestigious events, including the Business Roundtable, Research Board, American Bar Association, American Banker, the RSA Conference, BankInfoSecurity, ISSA, ISACA, HIMSS, and MIS Training Institute. He has also been featured in The New York Times and quoted as an expert in USA Today, The Wall Street Journal, Reuters, United States Cybersecurity Magazine, Bloomberg, and Healthcare IT News.

    James is a patent inventor and has received three innovation awards in cyber security, GRC, and cloud computing. He is the author of the Internet Survival Series and contributing author of CISO Essentials, as well as numerous industry papers.

  • speaker photo
    Randy Lariar
    Practice Director, Big Data & Analytics, Optiv
  • speaker photo
    Andy Baker, Moderator
    Regional Director, Optiv

    Andrew Baker built a base of skills starting with the earliest implementations of 4th Generation Languages, originator of operator company wide voice mail systems, to seeing the product development and deployment of the first off switch Home Location Register and Authentication Center (HLR/AC) which dramatically improved AT&T’s call handling and significant reduction in early cell phone fraud. Andy’s entrepreneurial skills were honed by co-founding a small start-up in the mid 1990’s whose primary focus was the distribution and least cost routing of corporate fax traffic via internal WAN technology.

    Over the past 15 years, he brought disruptive technologies to market such as the first E911 system deployed nationwide at Sprint in support of the E911 location mandate. That experience earned him the reputation of being a location based services expert where he was able to consult with a number of start-ups using location for various commercial endeavors. Most recently, he adapted his technical and selling skills to the fast growing area of Cyber Threat Intelligence systems executing the go to market strategy at Narus Inc. (a Boeing Company). Success in sales through out the last 15 years put him in the top percentile of revenue generators for his companies and gave him access to many executive level individuals within the Telecommunications and internet industries.

  • speaker photo
    Jake Bernstein, Esq.
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP

    Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.

  • speaker photo
    Lana DeMaria
    Head of Data Governance and Privacy, Alaska Airlines

    Lana is a motivated and results-oriented leader with 20+ years of international experience.

    She is experienced in supervising and training teams, building global enterprise-wide programs from the ground up, and leading, planning & executing projects in a variety of industries, ranging from aviation to software, to manufacturing, to telecom and education. She has over 23 years of team management and technology experience, with 19 years of strong contributions to the privacy, security and risk management space at Alaska Airlines Group, Microsoft and Ernst & Young, and with 18 years of training, communications and marketing experience at Alaska Airlines, Microsoft, Ernst & Young, Boeing, PacifiCorp and SCS.

    She has earned and been awarded the Six Sigma, CIPP, CIPM, CISA and ITIL Foundations certifications, and is a member of the Digital Marketing Association, Institute of Internal Auditors, the International Association of Privacy Professionals, as well as the IT Compliance Institute. She has an MBA in International Business.

  • speaker photo
    Naimah J. Duporte, Esq.
    Incident Response & Data Privacy Compliance Attorney

    Experienced Data Privacy and Compliance Attorney, with a focus on Incident Response, and data analysis and classification standards. Background in criminal law, European Union law, and international law.

  • speaker photo
    Alexander Vitruk
    Sr. Associate Attorney, BakerHostetler

    Alex Vitruk advises clients in complex data privacy and cybersecurity matters, offering practical solutions to help companies comply with rapidly evolving privacy and data protection laws and defending class actions in this cutting-edge space. Alex advises and defends clients across different industries on multifaceted issues such as biometric privacy, artificial intelligence, pixel-related technologies and HIPAA compliance. He has secured positive outcomes for clients pre-litigation, as well as in federal and state courts on a wide range of dispositive motions and class action issues, at both trial and appellate levels. Alex also has substantial experience defending clients in securities, consumer protection, ERISA and employment class actions.

    Alex is experienced in managing cases through all phases of litigation and arbitration, authoring key briefs and motions, arguing motions in court, taking and defending depositions and negotiating settlements. Alex keeps client interests at the forefront of his practice, and clients look to Alex for creative solutions to complex legal questions, often in matters of first impression or involving splits of authority.

    As a Certified Information Privacy Professional (CIPP/US, E), Alex combines his knowledge of data privacy and cybersecurity laws with relevant litigation experience to help clients navigate the multifaceted legal issues concerning the privacy and security of their users’ information and content.

  • speaker photo
    Pari Sarnot
    Risk Advisory Practice - Cyber Privacy and Risk, Grant Thornton LLP (US)

    Privacy Consulting Director with Blueprint Technologies- Over 10 years of international consulting and industry experience, with Fortune 500 clients across US and Europe. Consulting Practice Lead including Managed Services for Strategy and Risk, focused on clients in Technology, Retail and Payment sectors.

    Possess a strong understanding of cross-service linkages between business strategy, processes, controls & technology, with experience advising CPOs of several Fortune 500 clients.

  • speaker photo
    Grant Asplund
    Growth Technologies Evangelist, Check Point Software Technologies

    For more than 20 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his passionate and relational storytelling at conferences like RSA and Next100 CIOs and numerous media interviews. Grant’s wide range of cyber security experience informs his talks, having served in diverse roles ranging from sales, marketing, business development, and senior management for Dome 9, Blue Coat Systems, Neustar, and Altor Networks. As CEO of MetaInfo, he led its acquisition by Neustar. Grant is the host of the CISO Secrets podcast (cp.buzzsprout.com) and the Talking Cloud Podcast (www.talkingcloudpodcast.com) on Cloud security.

  • speaker photo
    Tom Cline
    VP, Cyber Risk, Skybox Security

    15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include - designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO's.

  • speaker photo
    Jessica Labouve
    Sales Engineer, Cymulate

    Jessica LaBouve, eCPPTv2, CEH, has spent her entire career specializing in offensive security. She started as a penetration tester performing application, network-level assessments, and social engineering. This experience ultimately led her to become a Solutions Architect at Bishop Fox, where she helped facilitate the scoping and sale of offensive security services to a variety of industries and organizations. Jessica is currently a Sales Engineer at Cymulate, a Series C startup with an extended security management platform that enables companies to challenge, assess, and optimize their cybersecurity posture continuously.

  • speaker photo
    Jeffrey Jones, Moderator
    CISO, Milliman

    Jeff Jones is the Chief Information Security Officer (CISO) for Milliman, Inc., an actuarial consulting and solutions firm headquartered in Seattle. Jeff is responsible for managing the information security program that encompasses 130 Practices in 80 cities, and supports over 8000 clients and more than 500M participants worldwide. Jeff was a CISO finalist at the 2023 Seattle Orbie Awards, featured in Profile Magazine in December 2022, and is a Founding Board member at the University of WA Information School.

    Jeff joined Milliman in 2016 and has demonstrated innovative skills advising practices internally, managing cybersecurity and incident response, and representing Milliman’s information security interests with major clients, auditors, and vendors. Jeff came to Milliman following a consulting engagement with Nordstrom. Prior to Nordstrom, Jeff was the Senior Information Security Manager at Black Knight Financial Services, where he managed the internal risk management team and developed information security policies.

    Early in his career, Jeff served honorably in the United States Air Force. Jeff brings over thirty years of IT, software development, risk management, and cybersecurity experience to the CISO role, including tenures at IBM, AT&T, ADP, and First American CoreLogic.

    Among his four degrees, Jeff earned a Bachelor of Science degree in Computer Science & Engineering from the University of California, Davis, and a Master of Science in Information Technology from Golden Gate University. Jeff has a passion for serving in his community, is a former VP of the 100 Black Men of Sacramento, a non-profit that mentors young men in underserved communities, and he continues to volunteer in the Seattle area.

  • speaker photo
    David Balcar
    Security Strategist, VMware Carbon Black

    Balcar has over 18 years of experience in security and extensive knowledge of security research, network penetration testing, incident response and computer forensics. At VMware, he is responsible for the activities of the VMware Carbon Black portfolio, including EDR, App Control, Cloud Endpoint, Cloud Enterprise EDR, Cloud Audit and Remediation and Cloud Managed Detection. He is also a featured speaker at global security conferences, presenting on subjects including security trends, penetration testing, top threats and network security hardening. Balcar is a member of the High Technology Crime Investigation Association.

  • speaker photo
    Mary Greenlee, Moderator
    Field CTO & Principal Solutions Engineer, Okta

    Mary Greenlee serves as a Field CTO and Principal Solutions Engineer at OKTA, where she leads programs to mitigate the security risks of large-scale integrations of enterprise applications. Her multifaceted expertise in databases, networking protocols, and server systems coupled with her business acumen allows her to address today’s unique cybersecurity challenges holistically and strategically. Mary joined OKTA through its Auth0 acquisition, where she was instrumental in growing its user base and streamlining a significant expansion to its volume of enterprise integrations.

  • speaker photo
    Mike Costello
    Strategic Planning & Design Manager, State of Washington

    Mike Costello is a strategic planning & design manager based in Olympia, WA. Mike oversees solution architecture, systems engineering, and capacity management to develop effective IT strategies. His expertise in networking, computing, and security allows him to harmonize and integrate diverse infrastructure technologies into comprehensive design solutions. Mike is particularly proud of his role as an innovator in architecting and deploying the state's "highway to the clouds," which bridges on-premise and cloud-based resources. Prior to his work in Washington, Mike successfully served as district chief information officer for the Seattle District Army Corps of Engineers, where he played a key role in maintaining and enhancing critical IT systems.

  • speaker photo
    Andrew Johnson
    Solutions Architect, State of Washington

    Andrew Johnson is a solutions architect based in Olympia, WA, responsible for the State's adoption of SD-WAN technology and interconnecting state government with cloud-based resources and external business partners. Andrew spearheaded the development of the state's SD-WAN strategy, oversaw proof of concept efforts, and designed solutions that have enabled the state government to leverage cutting-edge technology in serving the residents of Washington State. Additionally, he modernized the state's DNS system, transitioning it to a hybrid DNS solution that handles both on-premise and cloud-based queries.

  • speaker photo
    Tim Gallo
    Mandiant Principal Architect, Google Cloud

    Tim Gallo leads the Google Global Solutions Architecture Team that covers Security Risk Solutions, including Cyber Threat Intelligence, traditional Intelligence Operations, Managed Detection and Response, Security Controls Validation, and Attack Surface Management and asset discovery. He Joined Google Cloud through the acquisition of Mandiant by Google in 2022, he had spent 5 years at Mandiant prior to the acquisition in a variety of field facing roles covering the aforementioned topics. Before joining Mandiant, Tim leveraged his over 20 years’ experience in information security and intelligence operations to aid in the development and deployment of a number of solutions. Including building client and organizational expertise in Intelligence Guided Cyber Network Defense (IGCND). This included the development and product management of some of the first cyber intelligence solutions ever brought to market. These solutions have included threat and vulnerability management tools, IOC prediction algorithms, intelligence services, and strategic intelligence consulting. Today he spends his days helping clients understand the importance of Intelligence as a guiding principle for building out effective security processes and operations and helping clients and vendors find ways to leverage technologies responsibly to build their cyber defense centers and security operations practices. Every once in a while he can be found out in the desert, sometimes on his Harley with a flamethrower, sometimes with just a flamethrower.

  • speaker photo
    Kelly Robertson
    Principal Security Practitioner, Horizon3.ai

    Over 30 years of professional information security experience in 30 countries across various disciplines, technical areas and market segments. Holds key industry certifications including CISSP #409644, F5 and Imperva WAF, Microsoft ISA, CheckPoint, CSI Encryption, and WhiteHat web security analyst. Also serves on the board of Silicon Valley ISSA and participated in several industry consortiums.

    Previously worked at leading companies including SAIC, Nokia, Juniper Networks and White Hat Security before transitioning into security consulting for various startups with Zisher Infosec, which became part of SEC Consult America in 2017. SEC Consult was subsequently acquired by Atos in late 2021. Founded secureCENTRX, a boutique information security consultancy focused on serving Managed Service Providers. Currently Principal Security Practitioner with Horizon3.ai focused on elevating customers and the product.

  • speaker photo
    Ariel Weil
    VP, GTM Strategy, Cyera

    With more than 20 years of cross-functional knowledge and experience focusing on data security, compliance, risk management, cloud adoption, digital transformation, and modern application architectures, Ariel (Ari) Weil leads Cyera’s go-to-market (GTM) efforts as the Vice President of GTM Strategy. As a hands-on executive, Ari brings his knowledge and expertise across multiple operational disciplines to Cyera’s customers as they navigate the evolving landscape of data risk and governance.

  • speaker photo
    William Lidster, Moderator
    CISO, AAA Washington

    William serves as the leader of AAA Washington’s information security and compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.  William has been with AAA Washington since August of 2017. Other roles that William serves in the company includes coordinating business continuity program activities and leading the company through emerging privacy legislation management.

    In the evenings, William instructs graduate and undergraduate cybersecurity courses at the University of Washington and The Penn State University.
    William completed his Bachelor of Science in Computer Science from the US Military Academy at West Point. He subsequently earned a Masters in Management Information Systems and an MBA from the University of Maryland. In December of 2018, he completed his Doctorate of Philosophy in Cybersecurity and Information Assurance from Capella University.

    Prior to William starting at AAA Washington, he served five years as the Manager of IT Security Engineering at Puget Sound Energy. Prior to that he also served as the regional Chief Information Security Officer for Providence Health and Services. He has also served in similar positions with Alaska USA Federal Credit Union, Chugach Electric Association, and the State of Alaska, Department of Public Safety.

    William served in the US Army from 1990 to 1996 as an officer in the Infantry and is a combat veteran for Operation Desert Storm.

  • speaker photo
    David Sigman
    Cortex Systems Engineer, Palo Alto Networks

    David Sigman has spent the last 20 years working with enterprise customers to make informed decisions about their cybersecurity challenges. He is a passionate cybersecurity evangelist and likes working closely with customers on turning endless alerts into actions through the power of automation. When not working, David likes to spend time playing guitar or exploring the Pacific Northwest with his family and four-legged friends.

  • speaker photo
    Cynthia Damian
    CISO, Valon
  • speaker photo
    Marie Olson
    Deputy Chief Privacy Officer (CPO), Boeing
  • speaker photo
    Elaine Doyle
    VP, Data Security Architecture, Salesforce
  • speaker photo
    Joan Ross
    Cybersecurity Technologist, CISO, and Threat Intelligence Professional

    Joan Ross is a respected industry thought leader who develops advanced security strategies, publishes and speaks on implementing threat intelligence. Joan is a former Chief Security Officer for two technology companies, coming up the security ranks as an encryption engineer and cloud security architect. As an early CISSP holder from back in the 1990’s, she maintains a number security and privacy certifications and earned her Masters of Science degree in design and engineering focusing on incident response with the U.S. Coast Guard.

  • speaker photo
    Brittany Weinstein, Moderator
    Manager, Cybersecurity, KPMG
  • speaker photo
    Mike Sheward
    Head of Security, Xeal

    Mike Sheward is Head of Security at Xeal, an EV Charging hardware startup. Mike has around 18 years experience building security programs. Originally from the UK where he worked mostly in penetration testing and digital forensics, Mike moved to the US in 2011, where he has been focused on running security teams for SaaS companies ever since. Mike has written a mixture of fiction and non-fiction books, including the InfoSec Diaries series, which features stories based on real life digital forensics cases, pen tests and security incidents, as well as the non-fiction titles, "Security Operations in Practice" and "Hands-on Incident Response and Digital Forensics".

  • speaker photo
    Tony Steffe, CISSP
    Regional Systems Engineer, Illumio

    Tony is a trusted technical advisor with more than two decades engaged in network and Internet security, with an emphasis on increasing business interconnectedness for enterprise customers.

  • speaker photo
    Cliff Steinhauer
    Director, Information Security & Engagement, National Cybersecurity Alliance

    Cliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the Cybersecurity program for NCA. Cliff enjoys sharing the message of securing your digital life, protecting information systems and the people that run them, and mentoring young folks to promote interest in the field.​

  • speaker photo
    Zabrina McIntyre, Host
    President, WiCyS Western Washington Affiliate
  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Jerry Petru, CISSP, CISM, FBCS, CITP
    President, Washington State InfraGard Chapter

    Mr. Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Chartered Institute for IT. He is an innovative, and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background in development and implementation, he has authored more than forty-seven different courses based on AIX, Encryption, Linux, Networking, Security, and Virtualization technologies, teaching to an audience of tens of thousands around the world for the past twenty-five years. Mr. Petru has spent more than two years in Ukraine over the past 20 years and has seen much change. Equipped with a proven track record of success in designing and implementing system and policy based on Confidentiality, Integrity, and Availability, to meet business continuity and disaster recovery for long-range strategic plans of Fortune 100 Companies. Mr. Petru is armed with stellar qualifications in all facets of project lifecycle development, from initial analysis and conceptual design to implementation, quality review, and enhancement to optimize operational efficiencies that improve business and IT operations.

  • speaker photo
    Craig Spiezle, Moderator
    Founder & President, AgeLight Advisory & Research Group

    Craig Spiezle is the Founder and President of AgeLight Advisory & Research Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mindset to stewardship. Craig is the Charmain emeritus of the Online Trust Alliance, an initiative of the Internet Society. He frequently briefs international policy makers driving awareness of best practices by both the public and private sectors and importance of internet governance. Craig has championed security best practices to help protect consumers while promoting innovation and the role of meaningful self-regulation. Prior to OTA, Craig spent over a decade at Microsoft focused on security and privacy enhancing technologies and standards. Craig chairs the Online Trust & Integrity Council and is on the board of the Identity Theft Council, editorial board of SC Magazine and a member of InfraGard, the IAPP and the APWG.

  • speaker photo
    Steve Naphy
    CIO, Morgan, Lewis & Bockius LLP

    Steve Naphy serves as Morgan Lewis's Chief Information Officer. In his role, Steve concentrates on leveraging data analytics and process to drive efficiency and effectiveness in both business operations and the delivery of legal services. He has over 20 years of experience working in information technology (IT), including previously running information security at the firm for six years. Prior to joining Morgan Lewis, Steve held significant InfoSec roles in the retail and distribution industry. He holds an M.S. in information systems from Widener University and a B.S. from Drexel University.

  • speaker photo
    Philip Conrod, Moderator
    CEO, Kidware Software LLC

    Philip Conrod has served in various IT leadership roles (Manager, Director, ISO, CISO & SVP/CIO) during his 35-year career for companies like Raytheon Technologies (Sundstrand), Safeco Insurance, CRU (FamilyLife), Kenworth Truck Company, PACCAR, and Darigold. Philip has been a CISM since 2003. Philip currently serves as the CEO of Kidware Software. He has authored, co-authored, and edited more than two dozen Information Technology textbooks. Philip holds a Bachelor's Degree in Computer Information Systems and a Master's certificate in the Essentials of Business Development from Regis University.

  • speaker photo
    Brian Shea
    BISO, Salesforce

    Brian is an IT Executive with 29 years of experience from Security Operations and Support, Compliance, Risk Management, Technology Innovation, IT Operations and Supportand. Currently, Brian is a Business Information Security Officer (BISO) supporting multiple business units at Salesforce, delivering security and compliance across our people, process, technology, and data. In addition to this, he has worked in Security and GRC at Starbucks, Microsoft, and Bank of America as well as served as a Cybersecurity Advisor for CREATE.ORG, sat on the Board of Technical Advisors for NODUS technologies, served as an alternate to the PCI-DSS Customer Advisory Council, held CISSP and CISM certifications, and has published 2 books and 3 industry papers on security.

  • speaker photo
    Oren Koren
    Co-Founder & CPO, Veriti

    Oren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings 19 years of experience in cybersecurity, advanced threat analysis, and product management,. Prior to founding Veriti, Oren was a Senior Product Manager at Check Point Software Technologies, where he led AI-based innovations and advanced data analytics projects redefining threat hunting and SIEM applications. Before Check Point, Oren served for 14 years at the prestigious 8200 unit and was responsible for different cybersecurity activities and research. Oren won the Israeli Security Award and 3 MOD awards for cutting-edge innovations in cyber security.

  • speaker photo
    Glen Sorensen, Moderator
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Patryk Stachowiak
    Chief Product Evangelist, Tenfold Security

    Patryk has years of experience in technical support, presenting IT solutions, and sales in a global IT market. He enjoys traveling, meeting, and interacting with different people all around the world. He is highly customer service-driven and likes to build strong relationships with clients.

  • speaker photo
    Ronald Watters
    Regional Cybersecurity Advisor, Region 10, DHS CISA

    Ron Watters currently serves as the Region X (WA, OR, AK, ID) Cybersecurity Advisor for the Stakeholder Engagement and Cyber Infrastructure Resilience Division of the Office of Cybersecurity and Communications (CS&C) National Protection and Programs Directorate (NPPD). Based in Seattle, WA, he supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation's critical infrastructure. His program coordinates cyber preparedness, risk mitigation and incident response, and provides cyber security resources, including assessments, to the nation's sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities. Prior to joining DHS, Watters served 27 years with the U.S. Navy and Naval Reserve as a Submarine Sonar Technician and Diver, retiring from the US Navy in 2007. Recalled to Active duty following 9/11, he was offered a position as the Deputy, Information Systems Management Officer with the 4th Marine Corps recruiting District in New Cumberland, PA. He rose to the position of S-6 before leaving in 2009 to take a position as the Chief, Information Assurance Division, Network Enterprise Center Ft Irwin, CA. Watters remained in that position until leaving to become the Branch Manager of the Cybersecurity Branch of the Puget Sound Naval Shipyard in March of 2016 and, soon after, as the Region X Cybersecurity advisor in June of 2017, which he currently holds.

  • speaker photo
    Steve Curtis
    Chief Cyber Business Officer, CYGNVS

    Steve is a global cybersecurity executive helping organizations prevent, prepare for, and respond to a cyberattack. Over 20 years in cybersecurity, Steve has worked with the leaders in cybersecurity including Palo Alto Networks, Accenture, and PwC. He has served hundreds of organizations around the world, envisioned, and launched multiple new cybersecurity businesses, and led over 2,000 cyber professionals to grow their careers in cybersecurity.

  • speaker photo
    Scott M. Giordano
    VP, Corporate Privacy, and General Counsel, Spirion

    Scott M. Giordano is an attorney with more than 25 years of legal, technology, and risk management consulting experience. IAPP Fellow, CISSP, CCSP, Scott is also former General Counsel at Spirion LLC, where he specialized in global data protection, tech, compliance, investigations, governance, and risk. Scott is a member of the bar in Washington state, California, and the District of Columbia.

  • speaker photo
    Ian Moore
    Cybersecurity State Coordinator/Advisor, Region 10, State of WA, DHS CISA

    Ian serves as the Cybersecurity State Coordinator for the State of Washington for CISA, based in Olympia, WA. He supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.

    His program coordinates cyber preparedness, risk mitigation, and incident response, and provides cybersecurity resources, including assessments, to the state, local, tribal, and territorial government entities and the nation’s 16 critical infrastructure sectors. As the Cybersecurity State Coordinator for Washington State, Ian works with state agencies, counties, and cities/towns to help them shore up their cybersecurity by partnering with them on assessments and offering CISA technical services. Through these partnerships he builds and cultivates relationships and trust throughout the state.

    Prior to joining DHS and CISA, Ian worked in both IT and cybersecurity for over 25 years. He started as an Intelligence Specialist in the U.S. Navy, right out of high school and then transitioned to the University of Washington, Bothell, and earned his B.S. in Computing and Software Systems in 2002. Upon graduating college he got a commission in the U.S. Air Force and worked as a Communication Officer at Offutt AFB in Nebraska. After separating from the Air Force in 2006, Ian took a civilian job doing cybersecurity, software development, and cyberspace planning for USSTRATCOM. During his time at USSTRATCOM, Ian earned his master’s degree in Cybersecurity from Bellevue University in Bellevue, Nebraska. Ian was the first student to graduate from Bellevue University’s Masters in Cybersecurity program in 2012. In 2015, Ian and his family decided to move home to the Northwest and took a job at the Puget Sound Naval Shipyard as a Cybersecurity Engineer. After a promotion and a year of working as the Platform IT (Operational Technology) Branch Manager, he accepted a position as a Cybersecurity Advisor position within CISA. After a year of interviews, security checks and waiting, he was brought on as the Cybersecurity State Coordinator for the state of Washington in March of 2021.

    Ian maintains his Certified Information Systems Security Professional (CISSP) certification, since 2014.

  • speaker photo
    Marie Olson
    Deputy Chief Privacy Officer (CPO), Boeing
  • speaker photo
    Kevin Murphy, Moderator
    Business Information Security Officer (BISO), T-Mobile USA

    Kevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT security certifications.

  • speaker photo
    Oded Hareven
    CEO & Co-Founder, Akeyless
  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Kip Boyle, Moderator
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Anne Purtell
    Community Manager, CREST USA

    An experienced professional transitioning from a successful career in occupant protection engineering to technical community management, Anne blends technical expertise with exceptional communication and leadership skills. Her unique background in ensuring the safety and effectiveness of critical civilian and military equipment now informs my approach to building and nurturing resilient, dynamic communities at CREST International.

    Leveraging both private industry and government sector experience in disciplines spanning, design & development, test & evaluation, contract management, and research and development, Anne fosters engaging, collaborative environments where synergetic ideas thrive. Her primary focus is on:

    • Creating and sustaining an inclusive, informed community dialogue around our latest technologies and initiatives.
    • Utilizing technical insights to provide relatable, credible guidance and support to community members.
    • Driving engagement through innovative community programs, balancing technical depth with accessibility.
    • Ensuring consistent, transparent communication between CREST International and our diverse user base.

  • speaker photo
    Stefan Braicu
    Customer Success Manager, Outshift by Cisco
  • speaker photo
    Biagio DeSimone
    Enterprise Solutions Architect, Aqua Security

    Biagio DeSimone is an experienced Solutions Architect with a history of working in the cloud native application space. Skilled in Kubernetes, Containers, Cloud Platforms and Pre-Sales, Biagio is currently an Enterprise Solutions Architect at Aqua Security. In his role, Biagio works to educate organizations on the importance of container and cloud security, and improve their development workflows with DevSecOps.

  • speaker photo
    Robert Kraczek
    Global IAM Strategist, One Identity

    Robert Kraczek, Global Strategist with One Identity, has more than three decades of security experience, with a specialization in Identity Security. Over the years, Robert has worked with, implemented solutions, and advised customers in all major industries as well as local, state and federal governments. Robert’s responsibilities include working with customers to develop a strategy to solve their security challenges as well as helping set the future direction of the One Identity portfolio.

  • speaker photo
    Frank Simorjay, Moderator
    Distinguished Fellow, ISSA

    Frank Simorjay (CISSP, ISSA Distinguished Fellow) is a cloud security and compliance subject matter expert. Frank works for Microsoft Azure global ecosystem organization as the Lead PM of the Azure automation Blueprint program, that includes the PCI automation blueprint. Frank has written an extensive library of papers, and blogs (http://cloudntech.blogspot.com).

  • speaker photo
    Glen Sorensen
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Craig Spiezle
    Founder & President, AgeLight Advisory & Research Group

    Craig Spiezle is the founder and managing partner of AgeLight Advisory Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mindset to stewardship. Craig is the Charmain emeritus of the Online Trust Alliance, an initiative of the Internet Society. He frequently briefs international policy makers driving awareness of best practices by both the public and private sectors and importance of internet governance. Craig has championed security best practices to help protect consumers while promoting innovation and the role of meaningful self-regulation. Prior to OTA, Craig spent over a decade at Microsoft focused on security and privacy enhancing technologies and standards. Craig chairs the Online Trust & Integrity Council and is on the board of the Identity Theft Council, editorial board of SC Magazine and a member of InfraGard, the IAPP and the APWG.

  • speaker photo
    Jared Pfost
    Independent Consultant

    Jared is a builder and leader of information security teams and products with more than 20 years of learnings. From startups to global enterprises, he's worked across multiple industries with expertise in secure development, risk management, visual story-telling, and consulted across all InfoSec domains. Over the past few years, he's invested in team dynamics and management. Ask him about resources such as Multipliers or Brave New Work! Jared's past work roles include Security Assurance Director at The Walt Disney Company.

  • speaker photo
    Chris Boykin
    Software Engineering Director, CyCognito

    Chris Boykin joined CyCognito in 2022, his first job on the vendor side, after spending over 20 years on the VAR side. Starting his career at NASA as an electronics technician, he eventually worked his way into computer networking, where he obtained the coveted CCIE certification. He has spent the last 15 years focusing on cybersecurity, where he led teams of highly skilled consultants to provide solutions to enterprises across the globe. Prior to CyCognito, he was the Chief Technology Officer at Future Com from 2010-2022, which acquired the Houston based company Chris founded in 2002, Got Net Security. He regularly speaks and sits on expert panels at industry conventions and trade shows.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes