- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, September 14, 202212:00 pm[PLUS Course] CIS Top 18 Critical ControlsAdjunct Professor, Cybersecurity, Washington University in St. LouisRegistration Level:
- SecureWorld Plus
12:00 pm - 2:00 pmLocation / Room: Room 105An in-depth review of the top 18 security controls from the Center for Internet Security (CIS): https://www.cisecurity.org/controls
Two-hour course offering two CPE credits. Purchase a PLUS Pass for $400, which includes full conference access (Conference Pass).
Learning Objectives:
- Understanding the CIS Critical Security Controls and Maturity levels
- Understanding how to self-assess your Cybersecurity Maturity Baseline
- Understanding how to define your Cybersecurity Maturity roadmap
- The hidden benefits of Cybersecurity Maturity Metrics
- Thursday, September 15, 20227:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 4:30 pmLocation / Room: Registration LobbyCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amInfraGard Chapter Meeting [Open to all attendees]Special screening of the FBI film "Made in Beijing"Registration Level:- Open Sessions
8:00 am - 8:50 amLocation / Room: Keynote TheaterChapter meeting will include a screening of the FBI film, “Made in Beijing: The Plan for Global Market Domination.” More details to come.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Global Cybersecurity Senior Manager, MarsRegistration Level:- VIP / Exclusive
8:00 am - 8:50 amLocation / Room: Room 105Moderated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:00 am[Breakfast Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret ServiceFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceCybersecurity Specialist, Missouri Information Analysis Center, Missouri Office of Homeland SecurityAssistant to the Special Agent in Charge, United States Secret Service - St. Louis Field OfficeVP, Chief Information Security Officer, Sound PhysiciansRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote Theater9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amHow to Build an Effective Security Awareness ProgramManager, Cybersecurity Engineering, Leonardo DRSRegistration Level:- Conference Pass
10:15 am - 11:00 amLocation / Room: Room 23010:15 am[Panel] The Current Threat LandscapeSr. Product Marketing Manager, AutomoxSr. Product Manager – Email Threat Protection, OpenText CybersecurityDirector, Threat Research & Intelligence, ProofpointSr. Security Consultant, Critical StartSystems Engineer, https://www.linkedin.com/in/askiahowell/Instructor - Cybersecurity, Webster UniversityRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: Room 240If we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
10:15 amThreat Analysis Report: LockBit 2.0 - 3.0 — All Paths Lead to RansomChannel Sales Engineer, CybereasonRegistration Level:- Open Sessions
10:15 am - 11:00 amLocation / Room: Room 231A deep dive into the tools and techniques utilized in specific case studies involving the Lockbit ransomware group. A general discussion around the current state of ransomware with a focus on Lockbit; advanced techniques being utilized, data exfiltration, data extortion, and evolving tools. Suggestions for defensive stance, next steps for ransomware protection, and resources to stay informed and up to date.
11:10 amCybersecurity Insurance: Have You Thought About…CISO | Manager, IT Operations, Missouri Employers MutualRegistration Level:- Conference Pass
11:10 am - 11:55 amLocation / Room: Room 24111:10 amThe Coming Cyberspace Cold War with RussiaChief Security Advisor, SentinelOneRegistration Level:- Open Sessions
11:10 am - 11:55 amLocation / Room: Room 231There’s a very good reason Russia has not deployed their latest cyber weapons against Ukraine. They’re saving them for the United States in what may be the beginning of a modern cold war played out in cyberspace. NATO has declared cyber to be an operational domain, and subject to Article 5 in case of a “massive” cyber attack. But what does “massive” mean? Russia will play the fringes in the gray space of policy to conduct low-intensity warfare, using their tools and tactics refined against adversaries like Ukraine. The result? Unrestricted warfare against our critical infrastructure, espionage operations targeting the software supply chain, and new cyberweapons.
12:00 pm[Lunch Keynote] Demystifying Zero Trust and Its Role in CybersecurityCyber Hero, ThreatLockerRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThe Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
12:00 pmAdvisory Council Roundtable Lunch – (VIP / Invite Only)Reporting to the Board from an InfoSec POVAdjunct Professor, Cybersecurity, Washington University in St. LouisRegistration Level:- VIP / Exclusive
12:00 pm - 12:45 pmLocation / Room: Room 105Roundtable discussion moderated by Andrew Wilder. For Advisory Council members only.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pm[Panel] Cloud: Doing More with LessSenior Regional Security Principal, InsightHead of Research, Threat Intelligence Division, RadwarePrincipal Architect, Sales Engineering, ImpervaVice President of Security, Code42CISO, Navvis HealthcareRegistration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: Room 240The cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.
1:15 pm[Panel] Incident Response!Service Sales Manager, BlackBerryDirector, Incident Response, SemperisSenior Sales Engineer, MimecastSVP of Engineering, FastlyDirector, Security Operations, NTPRegistration Level:- Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterSecurity teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.
2:30 pmNature of Hybrid Workforce CISO PanelSr. Director, BISO, EquifaxCISO, Navvis HealthcareSVP, Information Security, CitiBankRegistration Level:- Open Sessions
2:30 pm - 3:15 pmLocation / Room: Room 2402:30 pmHow Cybersecurity Is Helping Solve Business ProblemsCISO, Veterans United Home LoansRegistration Level:- Open Sessions
2:30 pm - 3:15 pmLocation / Room: Room 230Budgets are tight, attackers are plentiful. What’s a cybersecurity professional to do in these challenging times? We will talk about where cybersecurity started and how we got to this point in history. Then we will talk about how cybersecurity professionals are working to solving business problems. When you come to this session, be prepared to share one quick story of how you have helped solve a business problem at your organization. Let’s share and learn from each other!3:15 pmHappy Hour & CasinoSponsored by Automox, Keysight, and Critical StartRegistration Level:- Open Sessions
3:15 pm - 4:30 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beer, wine, and soda. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.
Enjoy the competitive fun at blackjack and craps tables!
Generously sponsored by:
3:15 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pm[Closing Panel] Demystifying Cybersecurity in the BoardroomAssociate CISO, Washington University in St. LouisVP & CISO, QuickbaseCISO, Forrest T. Jones & CompanyDirector, IT Security, Caleres, Inc.Registration Level:- Open Sessions
3:45 pm - 4:30 pmLocation / Room: Keynote TheaterHave you ever walked into your company’s board room to give an update and feel like you’re speaking a different language? You probably are–to them. Unfortunately, this is a common occurrence many cybersecurity professionals face along with their day-to-day InfoSec tasks and challenges. Join us for a panel discussion where local InfoSec leaders will share their experiences reporting to the board, different tactics they’ve used that have been successful when communicating risk, and tips for making your security team stand out amongst other business units. Open to all levels of professionals.
- ACFE St. Louis ChapterBooth: N/A
The Greater St. Louis Area Chapter was formed in 2002. A group of local area CFE’s petitioned the National ACFE Headquarters with an official request for chapter designation. The National ACFE organization granted the request. The Greater St. Louis Area Chapter #105 became incorporated in March 2003. Our chapter consists of fraud detection and prevention professionals in the St. Louis area. While many of our members hold the Certified Fraud Examiner (CFE) designation, it certainly is not a requirement for chapter membership. We welcome anyone who works in the field or is interested in fraud investigation and prevention. The ACFE is the world’s largest anti-fraud organization and premier provider of anti-fraud training and education. Together with more than 85,000 members, the ACFE is reducing business fraud worldwide and inspiring public confidence in the integrity and objectivity within the profession.
- Arctic Wolf NetworksBooth: 710
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- Armis, IncBooth: 400
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
- AutomoxBooth: 750
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- BlackBerry CybersecurityBooth: 740
BlackBerry Cybersecurity is a leader in endpoint security, endpoint management, encryption, and embedded systems, protecting enterprises and governments around the world. Our end-to-end approach is deeply rooted in Cylance® AI and machine learning, providing continuous preventative protection, detection, and instant response. We extend protection for your organization against current and future cyberthreats by combining network and endpoint telemetry and by delivering innovative solutions in the areas of cybersecurity, safety, and data privacy.
- Code42Booth: 320
Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.
- Critical StartBooth: 230
Critical Start Managed Cyber Risk Reduction solutions deliver continuous security cyber risk monitoring and mitigation enabling strong protection against threats. Combined with a team of expert risk mitigators, our platform provides maturity assessments, posture and event analytics, response capabilities, comprehensive threat intelligence, and security workload management capabilities. We help you achieve the highest level of cyber risk reduction for every dollar invested, leading to increased confidence in reaching your desired level of security posture.
- CybereasonBooth: 620
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- CyberUpBooth: N/A
Our mission is to close the cybersecurity skills gap by training the workforce of today and inspiring the workforce of tomorrow.
- FastlyBooth: 510
Expectations for websites and apps are at an all-time high. If they aren’t fast, secure, and highly personalized, users take their business elsewhere. But today’s most innovative companies are thriving by meeting this challenge head on: they’re choosing Fastly and an investment in their developers.
With Fastly’s powerful edge cloud platform, developers get the tools they need to build the most groundbreaking apps — all optimized for speed, security, and scale — so businesses can effectively transform to compete in today’s markets. Together, we’re building the future of the web.
- Gateway Cyber Fraud Task Force (CFTF)Booth: N/A
Cyber Fraud Task Forces (CFTFs), the focal point of U.S. Secret Service cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- ImpervaBooth: 520
Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.
- InfraGard St. Louis Members AllianceBooth: 700
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
- InsightBooth: 130
Insight is a comprehensive solutions integrator that helps organizations transform technology, operations, and service delivery to meet challenges and future-proof the business. With a client-focused approach to delivery, we recommend the most appropriate solutions to drive digital transformation and modernization for innovation. As clients look for ways to optimize data for better business, empower speed and scale of service, and drive next-gen security, Insight delivers expertise that is grounded, unbiased, and refreshingly straightforward.
- ISC2 St. Louis ChapterBooth: 310
As a regional chapter of ISC2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB ISC2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.
- KeysightBooth: 110
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- MimecastBooth: 330
Mimecast empowers our customers to help mitigate risk and manage complexities across a threat landscape driven by cyberattacks, human error, and technology fallibility. Our advanced solutions provide the proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.
- OktaBooth: 600
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- Carbonite and Webroot, OpenText Security SolutionsBooth: 120
Carbonite and Webroot, OpenText Security Solutions, provide comprehensive cyber resilience solutions so businesses can stay up and running in the face of cyberattacks and data loss. Together we offer security, data backup and recovery, and threat intelligence services used by leading vendors worldwide. Learn more at carbonite.com and webroot.com.
- Palo Alto NetworksBooth: 100
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
- ProofpointBooth: 410
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- RadwareBooth: 730
Radware® (NASDAQ: RDWR) is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers (SDDC). Our award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection, and availability services to enterprises globally. Our solutions are deployed by, among others, enterprise customers, carriers, and cloud service providers.
- Recorded FutureBooth: 140
Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.
- Red CanaryBooth: 530
Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.
- RiskReconBooth: 720
RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
enabling organizations to efficiently operate scalable, third-party risk management programs for
dramatically better risk outcomes. Request a demo to learn more about our solution. - SemperisBooth: 220
Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.
- SentinelOneBooth: 210
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- SonatypeBooth: 300
Every day, developers rely on millions of third party and open source building blocks – known as components – to build the software that runs our world. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations don’t have to make the tradeoff between going fast and being secure. More than 120,000 organizations use Sonatype’s Nexus solutions to support agile, Continuous Delivery, and DevOps practices globally
- Saint Louis University Workforce CenterBooth: 500
The Workforce Center was established in 2013 to address the skill needs of our modern and fast-paced workplaces. Powered by top-ranked Saint Louis University, the Workforce Center provides premier training solutions to corporations and individuals nationwide. With a mission to fulfill the needs of modern organizations, the Center offers a range of training topics including Cyber Security, Project Management, Agile, Analytics, Software Engineering and more.
- TechTargetBooth: N/A
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThreatLockerBooth: 630
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WiCyS St. Louis Metropolitan AffiliateBooth: 610
- Andrew Wilder, ModeratorAdjunct Professor, Cybersecurity, Washington University in St. Louis
Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.
- Brian Lourie, ModeratorGlobal Cybersecurity Senior Manager, Mars
Brian supports a wide variety of business units like Mars Wrigley, Kind, VetSource, and Blue Pearl, to name a few. Prior to joining Mars, Brian spent 20 years with General Electric as the Global DR Leader for GE Capital RE and running their VM program. He spent five years as a board member on the St. Louis Scott/AirForce ISC2 regional chapter and was president for three of those years. Brian is also a member of InfraGard and the St. Louis FBI citizens academy.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Angela RobinsonCybersecurity Specialist, Missouri Information Analysis Center, Missouri Office of Homeland Security
- Brian CockrillAssistant to the Special Agent in Charge, United States Secret Service - St. Louis Field Office
I have been with the Secret Service for 20 years and am currently assigned to the St. Louis Field Office where I manage our cyber-enabled financial crime investigations and Gateway Cyber Fraud Task Force (CFTF). CFTFs are the focal point of Secret Service cyber-investigative efforts and were developed to increase the resources, skills, and vision by which state, local, and federal law enforcement agencies partner with prosecutors, private industry and academia to optimize a unified effort to combat cybercrime and enhance cyber-attack responses.
In this role, I coordinate Secret Service-sponsored cybercrime training for our state and local task force officers and direct the joint operations budget that supports task force operations. I’m also responsible for coordinating CFTF outreach events which bring together our law enforcement and public and private sector partners for information sharing and training.
Prior to this assignment, I served on the Presidential Protective Division in Washington, DC. In this capacity, I lead advance teams in building the physical security plans for foreign and domestic trips of the First Family.
- Moderator: Jericho Simmons, CISMVP, Chief Information Security Officer, Sound Physicians
Jericho has provided technology and security services within the education, government and healthcare industries for the last 19 years.
His aspiration is to shift the mindsets of people to “Security in Practice”. Which in turn will significantly reduce the distraction of malicious actors so the organization may focus on positive business outcomes.
“Start with People – Wisdom, Understanding, Counsel, Strength and Knowledge are critical to make an impact”
- Diego MaldonadoManager, Cybersecurity Engineering, Leonardo DRS
Cybersecurity professional with over 30 years of experience with the U.S. Naval Service, Federal Civil Service serving in several roles as an IT Specialist, Information Systems Security Program Manager, Chief Information Security Officer (CISO) and Privacy Officer; In the Commercial space with IBM, The Newberry Group and other technology related companies in various roles covering the Program and Project Management, Datacenter operations, Network & Systems Engineering & Integration, Research & Development.
Currently serving as Manager Cybersecurity engineering @Leonardo DRS supporting the U.S. Defense industry in the engineering, integration, testing and delivery of cybersecurity compliant solutions.
Diego is Project Management and CISSP credentialed. - Gina GeiselSr. Product Marketing Manager, Automox
Gina is a Product Marketing Manager at Automox with over 20 years' experience in cybersecurity, endpoint management, and data storage. Gina develops messaging and content that resonates directly with our customers' challenges and is constantly seeking new ways to communicate how technology can make their lives easier.
- Roger BrassardSr. Product Manager – Email Threat Protection, OpenText Cybersecurity
Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he and his team are focused on quality and efficacy to continuously evolve our Advanced Email Threat Protection and Email Continuity Service solutions, equipping customers and partners with security solutions that are needed in today's continuously evolving threat landscape.
- Brian RoyeSr. Security Consultant, Critical Start
Cybersecurity professional with 20+ years of experience in solutioning and supporting across operations, client delivery, architecture, sales engineering, and management. Focus has been around security services, especially managed services and consulting as delivered from the provider. Experiences in working with clients from all industries and organizational sizes spanning small, medium, and enterprise. Currently, leveraging skills and knowledge as a Senior Security Consultant at Critical Start in support of client pre-sales technical solution and design needs, with an emphasis on Managed Detection and Response services.
- Askia HowellSystems Engineer, https://www.linkedin.com/in/askiahowell/
Before joining Palo Alto Networks, Askia graduated from MIT with a Bachelor's in Electrical Engineering in 2004. Since then, Askia has executed roles as an Account Manager, Sales Engineer, Systems Engineer, and a Consultant. Askia is an IEEE Member, CISSP certified since 2015, and has earned several technical certifications from multiple manufacturers including Palo Alto Networks, Cisco, HPE/Aruba, and Brocade.
As a bootstrapped founder of his consulting company in 2013, Askia led a team that built and secured Next Generation Networks and Zero Trust Networks by integrating multiple technologies for a variety of public and private organizations across the United States.
In his personal time, Askia enjoys spending time with his wife and children, watching or playing sports, and fishing.
- Doug Menendez, ModeratorInstructor - Cybersecurity, Webster University
After retiring in 2019 with nearly 40 years of industry experience, Doug joined the faculty at Webster University as a fulltime instructor in Webster’s National Center of Academic Excellence in Cyber Defense (CAE-CD).
Doug is a dedicated teaching professional with demonstrated success in on-line, hybrid and in-person classroom techniques using a variety of delivery modalities. Working to promote diversity, equity and inclusion in the cybersecurity space and committed to providing a powerful, transformative student experience. Passionately advancing the next generation of cybersecurity, IT audit and risk management professionals.
He is on the Board of Directors of CyberUp, A St. Louis-based nonprofit organization that focuses on cybersecurity apprenticeships and youth education programs. Doug is also on the Executive Committee of GHECC, the Gateway Higher Education Cybersecurity Consortium. He holds an MBA from Saint Louis University, and is a Certified Internal Auditor (CIA) and Certified Information Systems Auditor (CISA).
- Adam GatesChannel Sales Engineer, Cybereason
With over 25 years of experience in technology, Adam Gates serves as a technical member of Cybereason Sales Engineering Team providing support for customers and partners in North America. Prior to Cybereason, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, Malwarebytes, and Mimecast. Adam lives in Dallas, TX, with his teenage son and squirrel obsessed Golden Retriever who has 28 dog years in perimeter security experience.
- Tim MyersCISO | Manager, IT Operations, Missouri Employers Mutual
Tim is currently serving as the CISO and IT Operations Manager at Missouri Employers Mutual. He is a seasoned professional with over 25 years’ experience in the Security and IT Operations space. His experience includes roles in the energy sector, consulting, wholesale/retail, and the insurance industry. Tim is a proponent of a defense in depth strategy that starts with a standard that is relevant to your industry. He is active in his local cyber security peer group and in the St Louis Cybersecurity Collaboration Forum.
- Morgan WrightChief Security Advisor, SentinelOne
Morgan is an internationally recognized expert on cybersecurity strategy, cyberterrorism, national security and intelligence. He currently serves as Chief Security Advisor for SentinelOne, Senior Fellow at The Center for Digital Government, and is the chief technology analyst for Fox News and Fox Business. Morgan's landmark testimony before Congress on Healthcare.gov changed how the government collected personally identifiable information. Previously Morgan was a Senior Advisor in the US State Department Antiterrorism Assistance Program, the Senior Law Enforcement Advisor for the 2012 Republican National Convention, taught behavioral analysis at the National Security Agency and spent a year teaching the FBI how to conduct internet investigations. In addition to 18 years in state and local law enforcement as a highly decorated state trooper and detective, Morgan has developed solutions in defense, justice and intelligence for the largest technology companies in the world including Cisco, SAIC, Unisys and Alcatel-Lucent/Bell Labs.
- Chad MaskillCyber Hero, ThreatLocker
Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infinity Ward, as well as numerous municipalities throughout the U.S. and countless SMBs. Previously, he worked with local government in designing and sourcing emergency apparatus and can still parallel park a Ladder Truck.
- Andrew Wilder, ModeratorAdjunct Professor, Cybersecurity, Washington University in St. Louis
Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security Executive Education Program. He believes that Cybersecurity should offer usable solutions to meet business needs, in order to be a business enabler. As a leader, he supports the continuous development of his teams while removing roadblocks.
- Daniel SmithHead of Research, Threat Intelligence Division, Radware
Daniel is the Head of Research for Radware’s Threat Intelligence division. He helps produce actionable intelligence to protect against botnet-related threats by working behind the scenes to identify network and application-based vulnerabilities. Daniel brings over ten years of experience to the Radware Threat Intelligence division. Before joining, Daniel was a member of Radware’s Emergency Response Team (ERT-SOC), where he applied his unique expertise and intimate knowledge of threat actors’ tactics, techniques, and procedures to help develop signatures and mitigate attacks proactively for customers.
- Luke BabarindePrincipal Architect, Sales Engineering, Imperva
Luke Babarinde is a Principal Solutions Architect at Imperva with over 15 years of experience in cybersecurity. He is passionate about building effective solutions to assist organizations seeking to holistically address data challenges of which security is critical.
- Tommy ToddVice President of Security, Code42
Tommy Todd is Vice President of Security at Code42 with over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, Tommy served in security roles at Symantec, Ionic Security, and Optiv, as well as many other firms. Throughout his career, he has acted as a leader, mentor, engineer, architect, and consultant to solve difficult data protection challenges. Tommy is passionate about data—both consumer and commercial—and strives to improve the security posture in organizations he works with.
- Montez FitzpatrickCISO, Navvis Healthcare
Montez is Chief Information Security Officer at Navvis Healthcare. With nearly two decades of cybersecurity experience, Montez has worked across numerous industries including healthcare, finance, gaming, and non-profit. Montez also helps shape young minds coming up as the next generation of cybersecurity experts through public speaking and community outreach.
- Jeff WichmanDirector, Incident Response, Semperis
Jeff Wichman has over 20 years of experience in information security, primarily focused on the Digital Forensics and Incident Response (DFIR) lifecycle. He has worked hundreds of incident response investigations, from relatively small business email compromises (BEC) to large-scale ransomware incidents.
- Brad AllenSenior Sales Engineer, Mimecast
Brad has been married to his wife Mary for 17 years, and they have three boys: Carter age 15, Sam age 13, and Miles age 11. Brad and his family are an adventurous bunch, having flown and camped all over the US and several other countries as they love to travel and experience other cultures. Brad’s love for travel started when he joined the U.S. Air Force in 1999, where he was stationed in Aviano, Italy, for 3.5 years, and in Sembach, Germany, for 1.5 years. He has over 20 years of experience working in just about every facet of the IT field, and he’s excited to open a new chapter in his career by joining Mimecast as a sales engineer.
- Laura ThomsonSVP of Engineering, Fastly
Laura Thomson is the vice president of engineering at Fastly, makers of an edge cloud platform. She ended up in this position after a 12-plus-year stint at Mozilla, where she rose through the ranks and ended up as the senior director of engineering for Firefox engineering operations. She also worked as a lecturer at RMIT University and co-founded a web design agency, where she worked for eight years. Laura has written several best-selling software development books and is on the board of trustees at the Internet Society.
- Matt Fagala, ModeratorDirector, Security Operations, NTP
Matt Fagala has over 20 years of experience in IT Operations. The majority of his career has been spent working for financial institutions and small to medium sized businesses in the St. Louis region. Like many, his career started at an early age with an interest in computer games and tinkering with computer hardware. After starting his first technical support role in college, he quickly moved on to engineering roles and eventually into cyber security. In recent years his passion has been defending small to midsize organizations and their staff from attacks. Matt believes in both continuous awareness training and an ever evolving layered defense strategy to meet the needs of the quickly evolving attack surface of today's organizations.
Matt is the Director of Security Operations at NTP Cyber Security where he manages the Security Operations Center team. NTP utilizes their custom designed ARGISS platform to offer a range of managed security services to organizations nationwide.
- Michelle SickbertSr. Director, BISO, Equifax
Michelle is the Business Information Security Officer.
- Montez FitzpatrickCISO, Navvis Healthcare
Montez is Chief Information Security Officer at Navvis Healthcare. With nearly two decades of cybersecurity experience, Montez has worked across numerous industries including healthcare, finance, gaming, and non-profit. Montez also helps shape young minds coming up as the next generation of cybersecurity experts through public speaking and community outreach.
- John NewcomerSVP, Information Security, CitiBank
John Newcomer is currently Senior Vice President of Information Security at CitiBank, a top-10 national mortgage lender. He has eight years of experience in the information security field, with 17 years prior in IT.
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Happy Hour
- Kevin HardcastleAssociate CISO, Washington University in St. Louis
Kevin Hardcastle, Chief Information Security Officer (CISO) for Washington University in St. Louis, is a member of the CIO Leadership team and serves a key role in University leadership, working closely with senior administration, academic leaders and the campus community. The CISO is responsible for the development and delivery of a holistic information security strategy to optimize the security posture through collaboration with campus-wide resources, facilitate information security governance, advise senior leadership on security direction and direct program functions of risk and incident management, compliance, information security operations, and information security policy development and education.
- Rebecca HarnessVP & CISO, Quickbase
Rebecca Harness is VP & Chief Information Security Officer for Quickbase. Rebecca has an established 25-year career in information technology with the past twelve years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technology startups over the course of her career, and serves as President of ISACA St. Louis. Rebecca is an alumnus of Hastings College, holds several technology and security certifications, and recently received a Master of Science in Information Security Engineering (MSISE) from SANS Technology Institute.
- Shawn HeckmasterCISO, Forrest T. Jones & Company
Shawn Heckmaster, Chief Information Security Officer for Forrest T. Jones & Company in Kansas City, MO has over 30 years of progressive information technology and security experience. He has worked across multiple private and government sectors, from the Department of the Army, Department of Defense, Black & Veatch and the Jones family of companies. He is experienced in security program establishment and building, with focuses on ISO, FedRAMP, NIST, Insider Threat Program Management and Third Party Vendor Management.
- Tami Spellman, ModeratorDirector, IT Security, Caleres, Inc.
Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes