Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, September 18, 20187:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amAdvisory Council Breakfast – (VIP / INVITE ONLY)Topic: How Mature is your Cybersecurity Incident Response Plan?Registration Level:VIP / Exclusive
8:00 am - 9:15 amLocation / Room: 1008:00 am[SecureWorld PLUS] Part 1 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkEarn 16 CPEs With This in-Depth 3-Part CourseSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 242The University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
8:00 amSecureWorld PLUS Part 1 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures SuccessEarn 16 CPEs With This in-Depth 3-Part CourseCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 232Every organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.
You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.
Part 1: Information Security Awareness Fundamentals and War Stories
What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.Part 3: Reinventing Your Information Security Awareness Program
So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing? Small group discussions, break-out Q/A as well as several successful toolkits are covered.8:30 amThe DNC Hack: A 100% Politics-Free Deep Dive Into What HappenedFounder and Principal Consultant, Portunus ConsultingRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: 230Drawing from up-to-the-minute reports, this presentation will bring together all the publicly available information to paint a complete picture of how threat actors gained access to the email system of the Democratic National Committee, exfiltrated the content, and released it. The presentation will filter out all the political noise and focus solely on the relevance of the attack to the practice of information security. 8:30 amWhen Forces Collide: The Intersection of Privacy and Cybersecurity in 2018Principal and Virtual CIO, UHY LLPRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: 2402018 is shaping up to be a critical year for cybersecurity and privacy in the United States. And cybersecurity professionals need to understand the impact privacy will have on them in 2019 and beyond. In this session we will analyze the forces causing cybersecurity and privacy to collide. Specifically, the European Union’s (EU’s) General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are forcing US companies to rapidly adopt privacy leading practices. And Facebook’s Cambridge Analytica scandal is likely accelerating the arrival of privacy regulations from the US government. Don’t miss this thought provoking session to understand the privacy implications on your cyber future and how to proactively adapt.
8:30 amForaging for Risk: Corporate Threat Hunting at ScaleVP, Segment & Technology Product Security, HumanaRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: 241What is Threat Hunting and how does it scale in a corporate environment? This presentation will dive into the latest buzz phrase “Threat Hunting” to discuss what it is, core program components, and measuring maturity. We will discuss our Threat Hunting program’s strategic journey and what’s ahead.
8:30 amHacking Back: What Are the Legalities and Implications?President, David Strom Inc.Registration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: 231Numerous governments are now considering introducing legislation to make hacking back more legal, to open up a new collection of tools for defenders. The issue is in attributing an attack to the right source, understanding the attacker’s intent, and developing the right red team skills.
9:00 amExhibitor Hall openRegistration Level:Open Sessions
9:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:30 amOPENING KEYNOTE: Ponemon Institute Research RoundupChairman and Founder, Ponemon InstituteRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote TheaterWhat is a CISO and what do they do? As the leader of cyber defense for an organization, the CISO is rapidly becoming indispensable for an organization’s survival. This presentation is based on interviews with senior level IT professionals at 184 companies in seven countries. The goal of the research is to better understand how CISOs work, what their concerns are, and how they are improving their effectiveness in managing risks to the enterprise.
10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council LUNCH RoundTable: (VIP / Invite Only)Topic: Prioritization of Top 20 Critical Security ControlsRegistration Level:VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: 100This session is for our Advisory Council members only.
11:15 amAre You Spending Your InfoSec Dollars in the Right Place?CISO, Veterans United Home LoansRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: 241Are you allocating your Infosec budget properly? This presentation will discuss how to evaluate whether you are increasing your security posture with your spending.
11:15 am[Radware] Cybersecurity Pushed to the LimitSystems Engineer, RadwareRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: 231Throughout 2018 mainstream headlines highlighted cyber-attacks and security threats that included possible interference in the U.S. presidential election, worldwide malware outbreaks and the Equifax data breach. These and other high-profile events spurred greater cyber-defense investment by everyone from nation states and global corporations to individuals purchasing anti-malware solutions for personal devices. Yet even as investments increase so do threats, hacks and vulnerabilities. This session will help you understand these complex and challenging dynamics. Based on findings from Radware’s research and a global industry survey, the session will show real attack data and customer stories to paint a picture of where we are and what security professionals can do.
Join the session to learn more about:
• The threat landscape deep dive—the who, what and why of attacks
• Potential impact on your business, including associated costs of different cyber-attacks
• Critical attacks in the midst: DNS, IoT and risks lurking in the cloud
• Emerging threats and how to protect against them
• A look ahead – predictions and what to prepare for11:15 am(ISC)2 Chapter Meeting and Guest Presentation (Open to all Attendees)Topic: Separating the Truth from the Myths in CybersecurityChairman and Founder, Ponemon InstituteRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: 230Ponemon Institute conducted the study on Separating the Truths from the Myths in Cybersecurity to better understand the security myths that can be barriers to a more effective IT security function and to determine the truths that should be consideredimportant for the overall security posture. In the context of this survey, cybersecurity truths are based on the actual experience of participants in this research. In contrast, cybersecurity myths are based on their perceptions, beliefs and gut feel.
11:15 amComodo — Re-Think Cyber: AI and the Human Touch Safeguarding Against Known and Unknown ThreatsCybersecurity Specialist, InfobloxRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: 240Today’s cybersecurity threat level remains at its highest in history: malware runs rampant, and organizations large and small are besieged by phishing, breaches, take-downs, and DDoS attacks. In this environment, cybersecurity presents the greatest challenges to IT organizations.
Join Comodo Cybersecurity experts and see how their patented auto-containment technology works defending against known and unknown malware signatures. In conjunction, they will talk to and demonstrate the visibility they have throughout their global customer footprint of nearly 89 million endpoint users. To conclude, Comodo will give a brief overview of its budding partner program and how they’re growing the Comodo Cybersecurity ecosystem.
12:00 pmAdvisory Council LUNCH Round Table - (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: 10012:15 pmLUNCH KEYNOTE: Trend Micro - From Bounties to Bureaucracy: The Hidden Market Factors of Exploit EconomicsDirector, Vulnerability Research, Trend MicroRegistration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote TheaterEven if you don’t participate in a bug bounty program, they impact you and the systems you defend. Bounty programs impact the exploit marketplace while disrupting exploit efforts of advanced threats. These programs have tracked the rise and fall of bug classes over the years, and they’ve tracked the rise and impact of government regulations in different regions of the globe. Join Zero Day Initiative Director Brian Gorenc as he covers the vulnerability economy and the role bug bounties play in shaping the exploit marketplace. Finally, he’ll show how effectively run programs have disrupted exploit usage in the wild. 1:15 pmPanel: What Will They Think of Next? (Emerging Threats)Registration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterIt would seem the more we “build a better mousetrap” the better the threats become. Will machine learning and AI be used against us in the future? Will these and other innovations be hacked and used for gain? Will the Crime as a Business platform take off where business competitors are utilizing these attacks for the upper hand? Perhaps the cars that are being hacked will evolve into driverless vehicles that are hacking companies from inside there own parking lots. What about drones? So many questions, let’s see what our experts say on this panel.
PANELISTS:
Kristi Thiele, IXIA
Bryan Lares, Sparkcognition
TJ Adamowicz, Mimecast
Brian Gorenc, Trend Micro
Mike Kiser, SailPoint
Moderator: Jon Stitzel, Lead Analyst, Ameren2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
3:00 pmEvolution of Privacy Requirements: A Global UpdateSTAR Program Director, Cloud Security AllianceRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 240Whether you noticed or not, Privacy is very much back on the agenda globally. From the European General Data Protection Regulation (GDPR), to Qatar’s new personal data privacy law, and everything in between, when doing business globally, privacy and a holistic approach to data governance is an increasingly important consideration as there is no privacy without security. During this session, we will take you through the evolution of privacy, the major changes around the world, and delve in to GDPR and how it may impact you, and provide some predictions of upcoming trends. Closer to home, we will discuss the current privacy landscape and why Privacy Shield “adequacy” remains the overwhelmingly relevant question, and the impact of what looks like a retraction of agreement by the UK.
3:00 pmTeaching the Human: Security Awareness Program Design and DiscussionAmericas Lead for Human Cyber Risk and Education, EYRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 231At any given moment in their work day, a person will make a security decision that will impact your organization. Have you enabled your workforce with the knowledge to make the right one? Generational and cultural differences, as well as learning styles, will all impact the design of a security awareness program. Learn about these factors and how social engineering is the greatest threat your workforce faces in this session.
3:00 pmSimplicity > ComplexityAsst. Director, Cybersecurity & Technology / CISO, Missouri State Highway PatrolRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 230This presentation will present the argument that we can’t continue to fight complex problems with complex solutions. Countless case studies prove that we cannot engineer or purchase our way to effective security. Instead, the organizations and countries that adopt a back-to-basics approach to today’s most complex problems will be those most effective in our cyber future.
3:00 pmRe-thinking Our Talent Shortage: Planning for the Future Began YesterdayPartner, JobplexRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 241All too often, breaches or attacks on organizations are the result of an otherwise trustworthy employee’s negligence. Whether it’s using a company device on a public wifi or ignoring password updates to confidential data, it’s human nature to error. So…how do we mitigate that? Can we pre-screen for that? This expert presentation will discuss little-known tactics deployed to avoid potential hiring risks, while also integrating non-security professionals into a highly secure environment. 3:00 pm[SecureWorld PLUS] Part 2 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkSecureWorld PLUS Registrants ONLYSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: 242The University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
3:00 pmSecureWorld PLUS Part 2 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures SuccessSecureWorld PLUS Registrants ONLYCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:SecureWorld Plus
3:00 pm - 4:30 pmLocation / Room: 232Every organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.
You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.
Part 1: Information Security Awareness Fundamentals and War Stories
What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.Part 3: Reinventing Your Information Security Awareness Program
So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing? Small group discussions, break-out Q/A as well as several successful toolkits are covered.3:45 pmHappy Hour ReceptionJoin us for happy hour and trivia, compliments of MimecastRegistration Level:Open Sessions
3:45 pm - 5:00 pmLocation / Room: Keynote Theater - Wednesday, September 19, 20187:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 am[SecureWorld PLUS] Part 3 - Designing and Building a Cybersecurity Program based on the NIST Cybersecurity FrameworkSecureWorld PLUS Registrants ONLYSr. Cybersecurity Consultant, Wilson CyberRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 242The University of Massachusetts has developed a 6 hour SecureWorld Plus training class that instructs attendees on the best practices for designing, building, and maintaining a Cybersecurity Program based on the NIST Cybersecurity Framework. Organizations who currently use the Framework or are planning to use the Framework for their cybersecurity program will benefit from this course.
This innovative education and training program includes the following key elements:
- An introduction to the key components of the NIST Cybersecurity Framework
- How to use the Framework to support business strategy, technology strategy, and cyber-risk strategy
- An approach for adopting the framework to build and sustain secure and resilient infrastructure, secure and resilient networks, secure and resilient applications
- How to use the framework to protect critical information assets
- A Controls Factory Model that organizations use to create an Engineering Program, a Technical Program and a and Business / Management Program
- A methodology for developing a Cybersecurity Strategy, System Security Plan (SSP), Risk Assessment, Plan of Action and Milestones (POA&M) and Executive Report
The class will help individuals and organizations acquire knowledge, skills and abilities to:
- Develop a strategy to apply the NIST Cybersecurity Framework (NCSF) to their environment
- Create a comprehensive System Security Plan (SSP) based on the NIST Cybersecurity Framework
- Conduct a Risk Assessment to compare the current profile with the target profile and identify any gaps that need to be addressed
- Develop a Plan of Action and Milestones (POA&M) to mitigate the highest priority gaps
- Establish an Executive Report to measure and communicate current profile, target profile, POA&M and program plan / roles and responsibilities to remediate identified gaps
- Identify required workforce skills and develop career pathways for improving skills and experience
About the Instructor – Larry Wilson:
- Larry Wilson is the former CISO for UMass President’s Office from 2009 to 2017
- Prior to UMass, Larry developed and managed the Global Infrastructure Services (GIS) Security Program for State Street Corporation
- Larry has been teaching cybersecurity courses based on the NIST Cybersecurity Framework at SecureWorld events for the past 5 years
- Larry has conducted over 20 consulting engagements, helping organizations design and build cybersecurity programs based on the NIST Cybersecurity Framework
The program and its author have won the following industry awards:
- Security Magazine’s Most Influential People in Security, 2016
- SANS People Who Made a Difference in Cybersecurity Award, 2013
- Information Security Executive (ISE) North America Program Winner for Higher Education, 2013
8:00 amSecureWorld PLUS Part 3 - How to Build and Maintain a Game-Changing Security Awareness Program That Measures SuccessSecureWorld PLUS Registrants ONLYCSO, Security Mentor; Former CISO, State of MichiganRegistration Level:SecureWorld Plus
8:00 am - 9:30 amLocation / Room: 232Every organization seeks a security-aware culture, but how can you build an effective information security awareness program that addresses compliance and motivates changes in employee behavior for the better? People are the greatest asset and the weakest link in securing intellectual property and protecting sensitive data within every enterprise; therefore, a well-organized security awareness program is essential.
You will learn how an effective program that offers lasting solutions requires the right mix of skills, knowledge, executive support and resources. This hands-on workshop will teach you what you need to know to implement just such a program. Offering award-winning case studies, interactive discussions and group participation in exercises, this session will enable you to hit the ground running with a customized plan that meets your organization’s needs when you head back to the office.
Part 1: Information Security Awareness Fundamentals and War Stories
What important building blocks, resources and communication strategies are essential to successfully implement your program? How can you reduce the risk of a data breach or other unwanted outcomes using a comprehensive approach to information security awareness? What best practices and examples have succeeded that can be emulated?Part 2: Building and Maintaining Your Organization’s Information Security Awareness Plan
After several checklists and overall program templates are presented in detail, the second part of this workshop will include peer interactions and discussions that can be used to tailor your specific plan to implement a customized security awareness program. Depending on the size and complexity of your organization, participants will either build their plan or create the outline of their information security awareness program – with details to be inserted later.Part 3: Reinventing Your Information Security Awareness Program
So you already have an Information Security Awareness Program, but it’s not working. Is it time to start-over or tweak the plan? What strategies work to get executive buy-in? What are your missing? What are some common mistakes to avoid? How can you improve what you’re already doing? Small group discussions, break-out Q/A as well as several successful toolkits are covered.8:30 amComplying with the Federal Government's Control of Unclassified Information (CUI) RequirementDirector of Technology Risk Advisory Services, Mueller ProstRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: 240This session will focus on how organizations that do business with the Federal Government comply with the National Institute of Standards and Technology (NIST) 800-171 Guidance, ‘Protecting Controlled Unclassified (CUI) Information in Nonfederal Systems and Organizations’. What does the organizations CISO need to know, and how to implement and comply with the NIST 800-171 guidance. This session will also focus on downstream organizations that may be supplying goods or services to organizations that do business with the Federal Government.
8:30 amHow to Succeed with DLPCSO & Founder, CSO4Less (a cfw1 company)Registration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: 231This session will examine the key points when evaluating DLP products. What is a DLP program, prerequisites to a successful DLP program, myths associated with DLP, and the ever-expanding DLP footprint and heuristics (aka Text Clustering, LDI, LDA, Oh My!). 8:30 amCybersecurity Threat Intelligence and the Dark WebDirector of Cybersecurity, BKD CPAs & AdvisorsRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: 230This session will cover current threats and trends in cybersecurity. Discuss options for cyber threat intelligence by understanding the extent of PII, PHI, credit card information, and intellectual property stolen from organizations that are now available through the dark web.
8:30 amInfraGard Chapter Meeting and Guest Presentation - Open to all AttendeesTopic: Cybersecurity CareersRegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: Keynote TheaterJoin InfraGard for their chapter meeting and guest presentation. This session is for InfraGard members and all attendees interested in the local association. This is also a great networking opportunity.
Presentation:
Everyone has an opinion on what certification is best and what degree is or is not essential in cybersecurity. Alan will provide insight on cybersecurity roles, the security certifications that matter for many of these roles, what type of training is truly valued by hiring managers and what key skills matter.9:00 amExhibitor Hall openRegistration Level:Open Sessions
9:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:30 amOPENING KEYNOTE: Leveraging SDN Technology to Improve Enterprise SecurityVice President, Marketing and Business Development, Pluribus NetworksRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote TheaterWith increasing numbers of high profile breaches, focusing on securing the perimeter is no longer sufficient. New traffic types and the proliferation of diverse end-points along with increased mobility and wireless access fuels a dramatic increase in untrusted traffic entering the network. In addition, the growth of multi-cloud environments and cloud services requiring access to Enterprise resources pose additional challenges. As mixed-use networks continue to grow and Internet of Things (IoT) traffic is introduced to the network, security organizations need a more dynamic approach to secure the increases of unsecure and untrusted traffic. Imagine being able to build a simple, automated and secure network overlay that empowers the enterprise with cloud-scale, elasticity and adaptability and enables independence from network operations. This session will discuss the evolution of Software-Defined Networking (SDN) technologies and explore how to leverage a dynamic SDN architecture to enable dynamic traffic segmentation, distributed policy enforcement, shared security services and increased operational intelligence to reduce risk, contain infiltrations and prevent attack proliferation.
10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council Round Table: (VIP / INVITE ONLY)Topic: Privacy Versus Security (CCPA, GDPR, DevOpsSec)Registration Level:VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: 10011:15 amHow Ready Is Your Cybersecurity Incident Response Team? (Maturity Assessment Techniques)Sr. Manager, Enterprise Holdings Inc.Registration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: 231An effective cybersecurity Incident Response Team will be ready when the “Big One” knocks on your SOC’s front door. This presentation will review methods to self-assess your incident response effectiveness, building an attainable maturity plan, the importance of implementing a continuous improvement mindset, and how trending will help focus energy and costs to mature the service where it matters. 11:15 amPenetration Testing: The Good, Bad, and the Ugly of Vendor Management, Reporting, and Risk (or lack thereof)Manager, IBM Cloud - Penetration Testing, IBMRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: 240Penetration testing has become a vast sub-industry of the Information Security industry. This presentation will be an overview of true risk in testing reports, separation of vulnerability management and penetration testing, and a deep dive on vendor management and vendor engagement. 11:15 am[Trend Micro] Hybrid Cloud Security in the Age of DevOpsTechnical Engineer, Trend MicroRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: 241We live in a new world of automation, where monolithic applications have become microservices, and isolated groups have given way to production-aligned, agile, multi-disciplinary teams. Investments span existing data centers, products, processes, and services, as well as technology innovations that directly face business units and scale seamlessly into the cloud. From physical and virtual servers to VDI, cloud instances, containers, and serverless, there has never been a more challenging environment for security professionals. Learn from the industry leader in hybrid data center security how to integrate protection for any vintage of application seamlessly as code into your deployment pipelines. 11:15 amEstablishing Academic Programs and Career Pathways for the Cyber WorkforceSr. Cybersecurity Consultant, Wilson CyberRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: 230As the former CISO for the University of Massachusetts, I have had many opportunities to interact with IT professionals, IT managers, business leaders and other management / operations personnel who would benefit with a baseline knowledge, skills and abilities in the Cybersecurity field. As we continue to move to a more digital / cloud based world, the need for advanced skills in cybersecurity will only increase. This presentation will focus on developing academic curriculum that meets the changing workforce needs as well as establishing career pathways for individuals who are interested in a career in cybersecurity. 12:00 pmAdvisory Council LUNCH Round Table - (VIP / Invite Only)Topic: Zero Trust, What’s the Big Deal?Registration Level:VIP / Exclusive
12:00 pm - 1:00 pmLocation / Room: 10012:15 pmLUNCH KEYNOTE — Going Digital: Building Your Strategic Roadmap for the Next Wave of Digital TransformationThe Bald Futurist, Former Chief Evangelist and Futurist, IntelRegistration Level:Open Sessions
12:15 pm - 1:15 pmLocation / Room: Keynote TheaterThe next major wave of digital transformation will integrate the physical parts of your business even more intimately with the digital world, using sensors, analytics, artificial intelligence, robotics, augmented reality, 5G networking, and blockchain technology. In this talk, former Intel futurist Steve Brown presents a fast-paced, fun exploration of what it will mean to “go digital” in the next decade, and reviews the business and security strategies we will need to navigate the road ahead.
Hear from Steve as he gives a preview of what he will cover in his keynote: https://youtu.be/Er1spVCyzS8
1:30 pmPanel: Stopping the Attacks (Incident Response)Registration Level:Open Sessions
1:30 pm - 2:15 pmLocation / Room: Keynote TheaterSecurity teams are struggling to keep up with the myriad of attack vectors that exist. Future InfoSec professionals will take a more adversarial approach to incident response. Will we have artificial intelligence helping threat hunters squash attacks before they can do any significant damage on the network while alerting the authorities in real time? Can a true partnership form between organizations and law enforcement to share information? Join our experts as they discuss challenges modern security teams face and how we can build a better plan for tomorrow.
PANELISTS:
Steve Shalita, Pluribus Networks
John Fahey, Comodo
John DiMaria, BSI Group
Vinny Troia, Night Lion Security
Moderator: Bob Brown, CISO, Busey2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
2:30 pmDash for Prizes & CyberHuntRegistration Level:Open Sessions
2:30 pm - 2:45 pmLocation / Room: SecureWorld Exhibitor FloorBe sure to have exhibitors scan your badge for a chance to win prizes. Past prizes have included Kindles, Bose headphones, gift cards, iPads, iPods and more! *Must be present to win
3:00 pmBuilding a Secure Foundation out of Other People's LogsAssociate Director, IT Security & Compliance, St. Louis Community CollegeRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 231Plan for the future by understanding the present. Your organization’s IT logs are critical at all stages of the cyber security framework. Log data is leveraged both operationally, and to adapt the security program for the future. Getting those logs from your IT peers can be a challenge. Use a combination of strategies to walk a more enlightened path when collecting and storing your organization’s IT logs. 3:00 pmCybersecurity Collaboration in Critical InfrastructureCybersecurity Risk Management Lead, AmerenRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 230Information sharing between US government agencies and private sector companies has been acknowledged as one missing element in US efforts to provide greater cybersecurity resilience. With this in mind, on August 1st the Department of Homeland Security announced the latest attempt to foster peer and cross-sector cybersecurity information sharing and collaboration. We’ve all seen this before, and although some progress has been made, the communication gap still seems as large as ever. How can cybersecurity professionals within critical infrastructure sectors progress beyond just talking about better communication? This presentation will provide some ideas and potential steps forward toward a more active partnership between public and private sectors, and among critical infrastructure peers.
3:00 pmMachine Learning-Based Software Defined Networking Security: Current and Future ChallengesCybersecurity Engineer, CISSP, MS, MCS, MA, U.S. Department of Health and Human ServicesRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: 240Machine Learning (ML) is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software-Defined Networking (SDN) emerge. From the application layer, ML-based security models can automatically defend an SDN network with speed and flexibility. However, nothing is perfect. Through the examination of ML/SDN specific vulnerabilities accompanied by a successful sample attack, several recommendations can be made for both solution designers and potential buyers on how to build or choose a future-proof ML-based SDN security solution. - Thursday, September 20, 20189:00 amSecureWorld PLUS - How to Build the Future: A Deep Dive into Artificial Intelligence, Blockchain, and Preparing Your Organization for 5-10 Years Ahead9 a.m. - 3 p.m. - Earn 6 additional CPEs after the conference!The Bald Futurist, Former Chief Evangelist and Futurist, IntelRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: Washington University - Room 510In this workshop, you will learn about two of the most important technologies shaping our future, Artificial Intelligence and Blockchain technology. You will then learn how to use the Futurecasting process to model, plan, and build future experiences, including some that are a built around AI and Blockchain. While it does discuss some technical topics at a high level, this workshop is open and accessible to anyone and everyone. Sign up today to boost your knowledge on both AI and Blockchain, and to learn new techniques that will enable you to imagine, plan and build the future.
Hear from Steve as he gives a preview of what he will cover in this PLUS course: https://youtu.be/eN-wYrdPyjs
AGENDA
8:00-8:15 a.m. Introductions
8:15-9:45 a.m. Artificial Intelligence: How AI will reshape every business, including yours (1.5 hours)
Artificial intelligence (AI) is a profoundly important set of technologies that are already shaping the way we live our lives, and the ways that businesses operate. As the second era of computing, AI will have as profound of an effect on business and society as did electrification and traditional digital computers. Over the next decade, AI will transform all our lives and will reshape every industry. AI will power autonomous vehicles, smart robots, drones, virtual assistants, and chatbots. It will manage our smart cities, power sentient factories, and oversee our smart energy grids. AI will turbo-charge medical diagnosis, revolutionize customer service, and aid in the discovery of new materials and new pharmaceuticals. AI will reshape every business process, and could reshape the structure of every team. The HR Director and CIO of every company will need to become best friends as IT and HR co-own a blended human-machine labor force. Every IT person needs to understand the capabilities, limitations, and implications of artificial intelligence, no matter their level of technical acumen. This session explains what Artificial Intelligence is and how it can be used. Attendees will then review the main concepts of AI: artificial neural networks, deep learning, supervised learning, unsupervised learning, reinforcement learning, and generative adversarial networks. Finally, the session will explore how AI may develop in the future, and how it will require a rethinking of every workflow, and every workplace.
9:45-10:00 a.m. BREAK
10:00-11:30 a.m. Blockchain beyond crypto-currencies: Your foundation to create new business value (1.5 hours)
Crypto-currencies like Bitcoin are just one of the many applications that can be built on top of Blockchain technology. Blockchain has rapidly become a valuable platform for new value creation across a wide range of industries. Heavyweights like IBM, Walmart, Accenture, Intel, and Bank of America are all placing big bets in this area. Over the last thirty years, we have moved from the client-server era, through the cloud computing era, and now with Blockchain to the era of distributed applications. Blockchain technology removes the need for central authorities, creates trust in a trestles world, reduces transaction costs, and dramatically improves traceability. In this session, you’ll cover Blockchain basics, understand why Blockchain technology is so disruptive, and learn how distributed applications (dApps) enable a new innovation paradigm that brings with it new funding and collaboration models. You’ll then look at examples of how Blockchain is already being used to solve problems in a wide range of industries, from real-estate to supply chain, and healthcare to energy. Be sure that you are prepared to take full advantage of the increased levels of trust, privacy, traceability, and data security made possible by Blockchain technology. Every IT person needs to understand the implications of this technology to their business.
11:30-1:00 p.m. LUNCH
1:00-4:00 p.m. Futurecasting Workshop (3 hours)
In this workshop, you’ll learn all the main steps of the Futurecasting process, a proven foresights process developed by futurist, Brian David Johnson. You will then practice each of these major steps—trend synthesis, personas, rapid futurecasting, science fiction prototyping, and backcasting—and start to develop some plans for the future. Some of these plans will build upon what you learned during the two morning sessions focused on AI and Blockchain. In addition to using Rapid Futurecasting to design simple experiences that you may wish to create, you will also consider the investments, partnerships, R&D effort, and talent plans you might need to succeed. “The best way to predict the future is to design it”. So said engineer, inventor, and futurist Buckminster Fuller. Similar statements have been credited to Alan Kay, Peter Drucker, and even Abraham Lincoln. The bottom line is that in order to seize a leadership position in any market, a company needs to take an active role in defining the future that they want to build, and then develop a comprehensive plan to build that imagined future. Attend this workshop to learn how to deploy the Futurecasting process at your company, or perhaps in your own life, as a way to help you model, plan, and then build the future that you want.
4:00 p.m. CLOSE
- CA TechnologiesBooth: 620
CA Technologies helps customers succeed in a future where every business— from apparel to energy— is being rewritten by software. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live— from the data center to the mobile device.
Our business management software and solutions help our customers thrive in the new application economy by delivering the means to deploy, monitor and secure their applications and infrastructure. Our goal is to help organizations develop applications and experiences that excite and engage and, in turn, open up money-making opportunities for their businesses.
- Comodo CybersecurityBooth: 450
In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity delivers an innovative cybersecurity platform that renders threats useless, across the LAN, web and cloud. The Comodo Cybersecurity platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers globally.
- C1Booth: 410
C1 is transforming the industry by creating connected experiences that make a lasting impact on customers, our teams and our communities. More than 10,000 customers use C1 every day to help them build meaningful connections through innovative and secure experiences. Our NPS of 80, placing us in the World Class category for the fourth consecutive year, is a testament to our ability to provide customers with the highest level of customer satisfaction, responsiveness, and deep domain expertise. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- CrowdStrikeBooth: 620
CrowdStrike sets the standard for cybersecurity in the cloud era. The CrowdStrike Falcon® platform protects and enables the people, processes, and technologies that drive modern enterprise, delivering superior protection, better performance, reduced complexity, and immediate time-to-value. CrowdStrike secures the most critical areas of enterprise risk—endpoints and cloud workloads, identity, and data—to keep organizations ahead of today’s adversaries and stop breaches.
- EC-CouncilBooth:
International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.
- ECTFBooth:
As a result of the amalgamation of advanced technology and the Internet, both the quantity and sophistication of cybercrimes targeting U.S. financial institutions and critical infrastructure have increased. Today, criminal trends show an increased use of phishing emails, account takeovers, malicious software, hacking attacks and network intrusions resulting in significant data breaches. To protect the nation’s financial infrastructure from cyber and financial criminals, the Secret Service has adopted a multipronged approach.
- Express ScriptsBooth: CyberLounge (160)
Headquartered in St. Louis, Express Scripts is a healthcare technology company providing integrated pharmacy benefit management services. We put medicine within reach of eighty-three million people by aligning with plan sponsors, taking bold action and delivering patient-centered care to make better health more affordable and accessible. It’s more than what you think. As an organization that deals with highly sensitive patient information, we are committed to protecting the clients, patients, and companies we serve from security breaches and cyber-attacks. Our cyber defenders are challenged and trusted with maintaining our secure infrastructure day in and day out, while leveraging internal and external threat intelligence to continuously improve our security posture.
- GuidePoint Security LLCBooth: 620
GuidePoint Security LLC provides innovative and valuable cyber security solutions and expertise that enable organizations to successfully achieve their mission. By embracing new technologies, GuidePoint Security helps clients recognize the threats, understand the solutions, and mitigate the risks present in their evolving IT environments. Headquartered in Herndon, Virginia, GuidePoint Security is a small business, and classification can be found with the System for Award Management (SAM). Learn more at: http://www.guidepointsecurity.com
- IBM ResilientBooth: 110
In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem that leverages AI, cloud, orchestration and collaboration to help clients improve compliance, stop threats and grow their businesses securely. Our strategy reflects our belief that today’s defenses will not suffice tomorrow. It challenges us to approach our work, support our clients and lead the industry, allowing you to be fearless in the face of cyber uncertainty.
- InfraGard St. Louis Members AllianceBooth:
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
- ISACA St. LouisBooth:
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the region.
Meetings are generally held the 3rd Wednesday of the month between September and May.
- ISC2 St. Louis ChapterBooth:
As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.
- Ixia, a Keysight BusinessBooth: 150
We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.
- CyberUpBooth:
Our mission is to close the cybersecurity skills gap by training the workforce of today and inspiring the workforce of tomorrow.
- MimecastBooth: 440
Mimecast empowers our customers to help mitigate risk and manage complexities across a threat landscape driven by cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.
- NETSCOUT ArborBooth: 120
For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.
- Pluribus NetworksBooth: 650
Pluribus Networks delivers a programmable software-defined security fabric with a distributed architecture to integrate and orchestrate multiple security functionalities for internal security protections. The Fabric enables establishing a transparent and secure control layer to segment and control all traffic across the enterprise independent of the underlying physical network infrastructure. The Fabric enables network virtualization and segmentation with adaptive security policies, enables security service insertion and provides real-time visibility to identify emerging threats and speed cyber incident response.
- Professional Education Technology & Leadership CenterBooth:
- RadwareBooth: 300
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- SailPointBooth: 130
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint’s open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint’s customers are among the world’s largest companies in a wide range of industries.
- SparkCognitionBooth: 310
SparkCognition is a global leader in cognitive computing analytics. A highly awarded company recognized for cutting-edge technology, SparkCognition is successfully deploying a cognitive, data-driven analytics platform for clouds, devices, and the Internet of Things industrial and security markets by applying patented algorithms that deliver out-of-band, symptom-sensitive analytics, insights, and security. For more information on the company, its technology and team, please visit http://www.sparkcognition.com.
- SplunkBooth: 620
Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.
- Saint Louis University Workforce CenterBooth: 400
The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber Security, Project Management, Agile, Analytics, Software Engineering and more.
- TechTargetBooth:
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- TenableBooth: 620
Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
- Trend MicroBooth: 430
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Kurt AubuchonFounder and Principal Consultant, Portunus Consulting
Kurt is a computer forensics and incident response consultant and an Assistant Professor of Cybersecurity at Maryville University. He has been in the IT field for nearly 20 years, with the last 11 focused on information security.
- David HartleyPrincipal and Virtual CIO, UHY LLP
Dave Hartley serves as a ‘Virtual CIO’ and ‘Virtual CISO’ helping clients with technology strategy and projects including strategic roadmap development, third party risk management including SOC reports, cyber risk assessments and cybersecurity programs, and digital transformation including cloud, mobile, etc. Dave joined UHY in 2015 following six years serving as the VP/Chief Information Officer for Arch Coal, the 2nd largest publicly traded coal company in the US, and 20 years of Big 4 consulting and auditing experience. Dave’s experience as a public-company CIO combined with a background as a CPA, CISA and auditor enables him to bring unique insights into today’s technology, cybersecurity and business challenges. He is a frequent speaker at technology and cybersecurity conferences and seminars.
- James Norberg, ModeratorVP, Segment & Technology Product Security, Humana
James Norberg was formerly the Information Risk Management Director at Express Scripts and has been in the Technology field since 2002. His areas of responsibility include the Security Operations Center, Incident Response, eDiscovery, and Cyber Threat Intel & Hunting. He earned his undergrad from Drury University and MBA from Texas A&M. Currently James and his family reside in the St. Louis area.
- David StromPresident, David Strom Inc.
David Strom is one of the leading experts on network and Internet technologies and has written and spoken extensively on topics such as VOIP, convergence, email, cloud computing, network management, internet applications, wireless, and Web services for more than 30 years. He was the founding editor-in-chief of Network Computing magazine, writes for Network World, SearchSecurity.com, and SecurityIntelligence.com, and curates the Inside Security email newsletter.
- Dr. Larry PonemonChairman and Founder, Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.
Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Joe OlerichSystems Engineer, Radware
Joe Olerich is a Systems Engineer for Radware. He works on the front lines designing cutting-edge security solutions to aid organizations in defending against the growing threat landscape. Over his 15 years of experience, Joe has engaged in a variety of roles, from designing networks and managing infrastructure, to running network and application security for a healthcare SaaS organization. He has a degree in Management Information Systems from Kansas State University, and can be found cheering loudly during any Wildcat sporting event.
- Dr. Larry PonemonChairman and Founder, Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.
Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
- John FaheyCybersecurity Specialist, Infoblox
John Fahey is a technical consultant with over 25 years of experience in infrastructure and security solutions. John’s career spans healthcare, telecommunications, and software manufacturers such as EMC, Intel Security, McAfee and Splunk prior to his current role as Product Security Specialist with Infoblox’s BloxOne Threat Defense solution. John has spent the last decade focused on helping to improve the lives of security analysts and security operations teams using software solutions, data analytics and automation. Today, John focuses on DNS as the real perimeter of security and on helping to improve security posture by automating DNS data for visibility, threat detection and as a mitigating control.
- Brian GorencDirector, Vulnerability Research, Trend Micro
Brian Gorenc is the Director of Vulnerability Research with Trend Micro. In this role, Brian leads the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world. The ZDI works to expose and remediate weaknesses in the world's most popular software. Brian is also responsible for organizing and adjudicating the ever-popular Pwn2Own hacking competitions.
Brian has been with ZDI since 2012, continually working on discovering new vulnerabilities, analyzing attack techniques, and identifying vulnerability trends. His work has led to the discovery and remediation of numerous critical vulnerabilities in Microsoft, Adobe, Oracle, open source, SCADA systems, and embedded devices. He has presented at numerous security conferences, such as Black Hat, DEF CON, Breakpoint, Ruxcon, PacSec, REcon, and RSA. More recently, Brian led the team that was awarded the Microsoft Mitigation Bypass Bounty and Blue Hat Bonus for Defense Bounty, which resulted in $125,000 being donated to STEM programs. During his leadership, the Zero Day Initiative program has coordinated the disclosure of over 3,000 Zero Day vulnerabilities.
- John DiMariaSTAR Program Director, Cloud Security Alliance
John DiMaria has 30 years of successful experience in Standards and Management System Development, including Information Systems, Business Continuity, and Quality. John was one of the innovators and co-founders of the CSA STAR program for cloud providers, a contributing author of the American Bar Association’s Cybersecurity Handbook, and a working group member and key contributor to the NIST Cybersecurity Framework. He currently manages all facets of the CSA STAR Program which includes security, privacy, continuous monitoring, and development of new solutions.
- Alexandra PanaretosAmericas Lead for Human Cyber Risk and Education, EY
With a background in broadcasting and operational security, Alex specializes in secure communications and education, awareness program development, the psychology of social engineering, human-based risk mitigation, and behavior analytics. She has over 12 years of experience developing and implementing security awareness, communication, and education strategies in Fortune 50/100 companies and other global enterprises. Alex is OPSEC Manager II Certified by the U.S. Army and the Joint Information Operations Warfare Center (JIOWC). She volunteers with local law enforcement agencies educating parents, community groups, and youth organizations on information security and social media safety in her free time.
- Patrick WoodsAsst. Director, Cybersecurity & Technology / CISO, Missouri State Highway Patrol
Patrick J. Woods serves as the Chief Information Security Officer for the Missouri State Highway Patrol (MSHP) and the Assistant Director for Cybersecurity & Technology in the Patrol's Criminal Justice Information Services (CJIS) Division. In this capacity, Patrick directs the Patrol's cybersecurity and technology efforts to include network, data center, PC Support as well as the Cybersecurity Operations, Audit and Intelligence units. He currently serves on the FBI's Advisory Policy Board, Security and Access Subcommittee where he leads a task force aimed at addressing issues with law enforcement's use of the cloud. Patrick holds a Bachelor of Science degree in Criminal Justice, a Master of Science Degree in Cybersecurity and is a Doctoral Candidate awaiting publication of his dissertation of the defense of U.S. State and Local Law Enforcement agencies against the negative impacts of hacktivist attacks.
- Tighe BurkePartner, Jobplex
Tighe Burke is a Partner and Cybersecurity Practice Lead with Jobplex Inc. in Denver, securing the next-generation of leaders on behalf of technology clients around the globe. Tighe has developed powerful domain expertise executing searches for InfoSec functional roles as well as on behalf of security providers.
He previously spent 5 years as a search consultant in Silicon Valley, and is regularly sought out by the brightest minds in technology to conduct hard-to-fill positions across the security landscape. Tighe has deep experience working with both early-stage and public companies to identify their current and future security leaders.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Happy Hour
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Dan LohrmannCSO, Security Mentor; Former CISO, State of Michigan
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. In 2017, Dan was awarded the cybersecurity breakthrough CISO of the year for global security products and services companies.
He led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO), and Chief Information Security Officer (CISO) roles in Michigan.
Dan currently serves as the CSO and Chief Strategist for Security Mentor, Inc., where he leads the development and implementation of Security Mentor’s industry-leading cyber training, consulting, and workshops for end-users, managers, and executives in the public and private sectors. He has advised senior leaders at the White House, National Governor’s Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses, and non-profit institutions.
Dan has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.
He is the author of two books: "Virtual Integrity: Faithfully Navigating the Brave New Web" and "BYOD For You: The Guide to Bring Your Own Device to Work." He is the co-author of the upcoming (November 2021) Wiley book, "Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering from the Inevitable."
Dan holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.
- Timothy GraceDirector of Technology Risk Advisory Services, Mueller Prost
Timothy M. Grace, CIA, CISA, CISM, CRISC, Director of Technology Risk Advisory Services - As the Technology Risk Advisory Services leader for Mueller Prost. Tim brings more than 30 years of business experience delivering solutions that drive business innovation, optimization, and change within world class organizations. He is a leader in the fields of cybersecurity, information technology, internal audit, privacy, compliance, and risk management. Tim has brought best practices to global organizations and helped drive solutions that strengthen and enhance current technology practices. Through innovation and process improvement, Tim has been able to drive change to ensure organizations remain focused on key business issues. His deep information technology background and deep understanding of business processes allowed him to bring technology and business processes together.
- Christine WantaCSO & Founder, CSO4Less (a cfw1 company)
Over 35 years of security, technology, and business leadership experience with expertise in delivering complete, effective, and strategic security solutions across a breadth of industries, including those with regulatory requirements as well as Secret/Top Secret environments. Proven expertise in DLP solutions across industries including global deployments and product integrations (300K+ endpoints in multiple geographic regions/200+ policy across multiple detection scope), developed and transitioned teams with vertical and horizontal strategies, developed DLP as a Service programs, compliance and regulatory requirement assurances and deliverables that align metrics to business goals. Actively developed user groups, hack- and install-fests and other technology-based outreach projects. Indecisive between battle royale and last player standing.
- Rex JohnsonDirector of Cybersecurity, BKD CPAs & Advisors
Rex is a strategic and technical leader with more than 25 years of experience in security and privacy, enterprise risk management, security management and operations, IT governance, application development, internal and external audit, regulatory compliance, and controls assurance. He has served as the lead executive with responsibility for planning, budgeting, execution and delivery of cybersecurity assessments, process control assessments, enterprise security roadmaps, incident response, IT governance, IT performance, IT risk assessment, penetration testing and diagnostics. Rex is a retired Army Lieutenant Colonel with the following certifications: CISSP, CISA, CIPT, PCI QSA, and PMP.
- Steven ShalitaVice President, Marketing and Business Development, Pluribus Networks
Steven Shalita has 20+ years of technology experience across the Enterprise, Cloud and Service Provider technology segments. He has market and technology expertise spanning across Cybersecurity, network security, forensics, SDN/NFV, and IT infrastructure. He has spent a considerable amount of time in the performance monitoring marker and was a key evangelist for adapting network monitoring technology for security use cases to identify zero-attacks. Steven is currently Vice President at Pluribus Networks and is a frequent featured speaker at leading industry events. He has held senior technology marketing leadership positions at NetScout, Check Point Software Technologies, Alcatel-Lucent, Cisco, and HP Networking.
- David J. HarrierSr. Manager, Enterprise Holdings Inc.
David has been a cybersecurity leader for 12+ years at various global Fortune 100 companies with responsibilities ranging from strategic and tactical planning, architecture, engineering, operational support, process improvements, automation to consulting. He enjoys decomposing complex problems into implementable and sustainable solutions.
- Justin BaumanManager, IBM Cloud - Penetration Testing, IBM
JJustin is currently a leader in Information Security for IBM Cloud and Watson Platform. With a background in red teaming and blue teaming over the past ten years, multiple degrees in his field, and SIEM and hacking certifications, he has affected positive change in securing some of the largest environments and cloud deployments in the world today.
- Nick FerrellTechnical Engineer, Trend Micro
Nick Ferrell has been helping Trend Micro customers across the world solve security challenges since 2011 as a senior engineer and professional services consultant. A primary focus of this work has been assisting enterprise organizations achieve a unified, automated, and effective set of security controls across diverse cloud and data center environments that mitigates risk, achieves compliance, and removes manual processes. Each year, Nick speaks to audiences at industry events about the latest in hybrid data center security, best practices, and use cases; bringing Trend Micro's wealth of innovation and experience to bear on real-world security problems.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Steve BrownThe Bald Futurist, Former Chief Evangelist and Futurist, Intel
Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.
Steve is passionate about helping people to imagine and build a better future. Whether talking about the future of work in a post-automation world, doing a deep dive on artificial intelligence, or discussing the future of flying cars, Steve inspires his audiences to think beyond the current status quo and to reimagine their businesses, and their lives, for the better.
Steve speaks and writes in plain language on how continued advances in computing will intersect business, cultural and human trends to create both new opportunities and new challenges. His new book, Hacking Reality, will be published later this year. Steve has been featured on BBC, CNN, Bloomberg TV, ABC News, Wired, WSJ:Digits, CBS, and many other media outlets.
- Matthew GioiaAssociate Director, IT Security & Compliance, St. Louis Community College
Matthew Gioia is Associate Director for IT Security & Compliance at St. Louis Community College where he works with students, faculty, and staff to secure student and employee data. Matthew believes the community is best served with an education partner focused on helping every student establish and work towards achievable goals, and that developing a culture around protecting data and privacy enables this trusted community leader to realize its vision. Matthew has established the information security program at STLCC. He has held his CISSP certification since 2010 and holds a bachelor’s degree in Computer Science from DePaul University.
- Jon StitzelCybersecurity Risk Management Lead, Ameren
Jon Stitzel is the Lead Analyst for Cybersecurity Risk Management at Ameren. He is responsible for driving cybersecurity and risk management strategy for business and industrial control system environments, in addition to leading IT and Cybersecurity controls compliance. Jon has over 30 years of experience in the IT industry, including more than 20 years in cybersecurity. He has served as a system administrator, manager, analyst, and consultant in many diverse industries during his cybersecurity career, including energy, manufacturing, financial services, telecommunications, and DOD.
- Tam NguyenCybersecurity Engineer, CISSP, MS, MCS, MA, U.S. Department of Health and Human Services
Tam Nguyen is an IEEE and ACM peer-reviewed cybersecurity researcher whose with recent publications on Software Defined Network's security (CSNet - Paris, France), and instructional design evaluation of CEH v10 Online Course (IC4E - Tokyo, JP). Tam's research interests include large-scale cyber threat modeling, cyber behavioral science, and applications of quantum computing in cybersecurity. Tam is a CISSP and is working for the Federal Reserve Bank at Cleveland.
- Steve BrownThe Bald Futurist, Former Chief Evangelist and Futurist, Intel
Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.
Steve is passionate about helping people to imagine and build a better future. Whether talking about the future of work in a post-automation world, doing a deep dive on artificial intelligence, or discussing the future of flying cars, Steve inspires his audiences to think beyond the current status quo and to reimagine their businesses, and their lives, for the better.
Steve speaks and writes in plain language on how continued advances in computing will intersect business, cultural and human trends to create both new opportunities and new challenges. His new book, Hacking Reality, will be published later this year. Steve has been featured on BBC, CNN, Bloomberg TV, ABC News, Wired, WSJ:Digits, CBS, and many other media outlets.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes