Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, September 5, 20179:00 amSecureWorld PLUS - Using the NIST Cybersecurity Framework to Build and Mature an Information Security Program9 a.m. - 3 p.m. - Earn 12 CPEs!CISO, Uplight; Co-Host, Colorado = Security podcastRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: Lakeshore CManaging a successful Information Security Program requires a plan. In this hands-on workshop, participants will leverage the NIST Cybersecurity Framework as a guide to create or mature their security program. Regardless of industry, the framework provides an ideal platform for planning, communicating and validating your security approach.
- Wednesday, September 6, 20177:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amAdvisory Council Breakfast: (VIP / INVITE ONLY)Coffee / Breakfast ServedChairman and Founder, Ponemon InstituteRegistration Level:VIP / Exclusive
7:30 am - 8:30 amLocation / Room: Loring8:30 amRSA: Evolved Requirements: A Business-Driven Security Strategy for Threat Detection & ResponseField CTO, RSARegistration Level:Open Sessions
8:30 am - 9:15 amLocation / Room: Lakeshore CSecurity teams need to evolve to defend against the latest threats. Attackers continue to advance with sophisticated techniques to target and infiltrate organizations. They are evading preventative measures and infiltrating our perimeter-less infrastructures. In parallel, security teams suffer from a skills gap, and adding more and more security tools only adds to the noise for the limited staff trying to find truly significant attacks. Given these challenges, organizations must shift focus from preventative controls that promise to keep the bad guys out to an increased focus on rapid detection and response. To reduce the impact of attacks, security operations need to tie critical asset and identity information into both the detection and response capabilities—focusing their efforts on the threats that matter most.
8:30 amLearn How Behavior Monitoring Can Help Detect the Secret AttackChief Information Security Officer, Allianz LifeRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Lakeshore BMonitoring behavior is something done in many aspects of life to detect when someone is acting “strange”. In this session you will hear about how base-lining and monitoring system and user activity can provide indication of a potential secret attack.
8:30 amWhen the Levee Breaks – Fixing the Foundations of Your Information Security Program Before the FloodDirector, Threat Informed Defense, U.S. Bank Information Security ServicesRegistration Level:Conference Pass
8:30 am - 9:15 amLocation / Room: Keynote TheaterThis presentation will discuss what many of us in our profession consider the basic building blocks of an effective security program, in addition examining how current technologies can help create the stronger foundation all of us are seeking.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:30 amOPENING KEYNOTE: The Evolving Role of CISOs and Their Importance to the BusinessChairman and Founder, Ponemon InstituteRegistration Level:Open Sessions
9:30 am - 10:15 amLocation / Room: Keynote TheaterWhat is a CISO and what do they do? As the leader of cyber defense for an organization, the CISO is rapidly becoming indispensable for an organization’s survival. This presentation is based on interviews with senior level IT professionals at 184 companies in seven countries. The goal of the research is to better understand how CISOs work, what their concerns are, and how they are improving their effectiveness in managing risks to the enterprise.
10:15 amConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
10:15 am - 11:15 amLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
11:00 amAdvisory Council Roundtable: Ransomware - Breaking the Criminal Business Model – (VIP / Invite Only)Registration Level:VIP / Exclusive
11:00 am - 12:00 pmLocation / Room: Lakeshore C11:15 amThe Dreaded EmbeddedExamining issues with Med Devices and how we deal with them as part of an information security program.VP & CISO, Fairview Health ServicesRegistration Level:Conference Pass
11:15 am - 12:00 pmLocation / Room: Keynote TheaterHow do you make an inanimate object “smart”? You put a chip in it, and then you connect it to the global internet! These chips run what is typically called an embedded operating system – a Windows, unix or Linux variant, or something custom made. Because these chips are embedded in power grid equipment, medical equipment, appliances or even people, updates and patches are problematic. The Internet of Things (IoT) is growing at a rate 10-times that of standard computers. A typical hospital/clinic system may have 4-5 times as many smart connected medical devices as computers. The Dreaded Embedded refers to the proliferation of vulnerabilities associated with these devices. What are the security and privacy concerns of these devices? What about FDA and other regulatory compliance? And how do we deal with these devices as part of an information security program?
11:15 am[Trend Micro] Endpoint Is Not the Only BattlegroundPrincipal Engineer, Trend MicroRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Lakeshore BWe have seen extensive growth in protection capabilities at the endpoint but is that enough? In this session, we will discuss the terminology of “next generation” and explore true end-to-end threat intelligence, how machine learning is applicable, and what it truly means to create a Defense in Depth plan so that internal teams work together to provide a holistic approach to maintain a defensible environment.
11:15 amWombat: State of the Phish: Understanding End User Behaviors Towards PhishingChief Architect, Wombat Security, a division of ProofpointRegistration Level:Open Sessions
11:15 am - 12:00 pmLocation / Room: Lakeshore AHear direct feedback from infosec professionals on the latest phishing exploits and vulnerabilities in their organizations and how they are protecting themselves and, learn about the most devastating types of phishing emails used and how to prevent them.
12:15 pmLUNCH KEYNOTE: Where Crime-as-a-Service Meets Internet SafetyWe need to think differently as the Internet of Things creates physical safety issues.EVP & CISO, U.S. BankRegistration Level:Open Sessions
12:15 pm - 1:00 pmLocation / Room: Keynote TheaterOrganized crime has reached legendary levels of organization and funding. The business model for ransomware has become extremely popular, but has also had some unintended consequences as malware hit the “Internet of Things.” Learn more about the shift we’re starting to see towards discussing Internet Safety vs. Internet Security.
1:15 pmPanel: Phishing and Social Engineering ScamsRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Lakeshore APhishing continues to be the #1 attack vector for the bad guys. Why? Simply put: it works. These attacks keep getting more realistic and sophisticated. In the future we should expect nothing less. Criminals will do more homework on their potential victims and possible pose as business leads or clients to gain our trust. What sales person doesn’t want email from a potential client who wants a new solution? Or they may just lay in wait until they’ve collected enough information to strike. Will they actually come to your business and drop thumb drives like pen testers do? Use drones to do their dirty work? Our experts will discuss the current state of affairs and brainstorm possible new scenarios.
Panelists:
Dana Torgersen, Malwarebytes
Erich Kron, KnowBe4
David Sterz , baramundi
Moderator: Rick Leib, Three Square Market1:15 pmPanel: What Will They Think of Next (Emerging Threats)Registration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Keynote TheaterIt would seem the more we “build a better mousetrap” the better the threats become. Will machine learning and AI be used against us in the future? Will these and other innovations be hacked and used for gain? Will the Crime as a Business platform take off where business competitors are utilizing these attacks for the upper hand? Perhaps the cars that are being hacked will evolve into driverless vehicles that are hacking companies from inside there own parking lots. What about drones?
So many questions, let’s see what our experts say on this panel.
Panelists
Evan Glaser, Darktrace
Randy Armknecht, Protiviti
John Fahey, Comodo
Moderator: Bruce Sussman1:15 pmDarktrace: AI for Cyber DefenseAI for Cyber Defense: That Machine Fights BackCyber Security Account Executive, DarktraceRegistration Level:Open Sessions
1:15 pm - 2:15 pmLocation / Room: Lakeshore BFrom insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
In this session, learn:
• How new machine learning and mathematics are automating advanced cyber defense
• Why 100% network visibility allows you to detect threats as they happen, or before they happen
• How smart prioritization and visualization of threats allows for better resource allocation and lower risk
• Real-world examples of unknown threats detected by ‘immune system’ technology2:15 pmConference Break / Exhibitor Product DemonstrationRegistration Level:Open Sessions
2:15 pm - 3:00 pmLocation / Room: SecureWorld Exhibitor FloorReboot with coffee and infused water while visiting exhibitors on the exhibitor floor.
2:30 pmNetworking Break — Dash for Prizes and CyberHunt winners announcedRegistration Level:Open Sessions
2:30 pm - 2:45 pmLocation / Room: SecureWorld Exhibitor FloorBe sure to have your badge scanned with participating exhibitors throughout the day. Past prizes have included Kindles, Bose wireless headphones, gift cards, iPads, drones, and more! *Must be present to win.
3:00 pmbaramundi Software — Automating Endpoint Management: Patching, Deployment, and System Building Made EasyExecutive Manager, baramundi software USA, Inc.Registration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Lakeshore BWith increasing demands on IT managers, new ways for handling security and user requirements are needed. This seminar will show you how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures—inside and outside of your network.
3:00 pmGDPR – End-to-End ImpactPresident, Rimage Corporation; CSRO, Equus HoldingsRegistration Level:Conference Pass
3:00 pm - 3:45 pmLocation / Room: Lakeshore AReview of how GDPR will impact day-to-day operations and the support service. Direct impact to our ability to process in the EU.
3:00 pmCheck Point Software: The State of Cybersecurity – The Past, the Present, and How to Stay One Step Ahead For the FutureRegional Expert, Threat Prevention, Check Point Software Technologies, Inc.Registration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Lakeshore CThis presentation will take a brief look at the overall state of cybersecurity and what can be done to prevent attacks, and breaches in the future.
- NETSCOUT ArborBooth: 127
For 15 years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on NETSCOUT Arbor for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, NETSCOUT Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with NETSCOUT Arbor.
- baramundi software USA, Inc.Booth: 155
baramundi Software provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.
The baramundi Management Suite (bMS) combines all important features for Endpoint Management: Patch Management, Software Deployment, OS-Installation, Enterprise Mobility Management, Vulnerability Assessment, and more. bMS optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of the network and endpoints. In doing so, it relieves pressure on IT administrators and ensures that users always have the necessary rights and applications on all platforms and form factors; whether on PCs, servers, notebooks, mobile devices or Macs.
Over 3,000 customers around the world benefit from nearly two decades of experience and the easy-to-use software solution.
- Check Point Software TechnologiesBooth: TBD
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- DarktraceBooth: 115
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.
- EC-CouncilBooth: TBD
International Council of E-Commerce Consultants, also known as EC-Council, is the world’s largest cyber security technical certification body. We operate in 140 countries globally and we are the owner and developer of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Testing (Practical) programs, among others. We are proud to have trained and certified over 140,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide.
- F5Booth: 219
F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends
- FireEyeBooth: 100
FireEye (https://www.fireeye.com/) is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,100 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.
- GigamonBooth: 227
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- InfraGard MinnesotaBooth: TBD
- ISC2 Twin Cities ChapterBooth: TBD
Our mission is to create a safe environment where information security practitioners can openly share expertise and ideas, providing practical, relevant, useful and timely information that, when applied, will develop and promote the ISC2 CISSP CBK®. help support the Information Security and Cyber Security Communities of the Upper Midwest.
The objectives of this chapter are to:
• Educate: Provide low cost (or no-cost), high impact educational opportunities for both new and seasoned information security practitioners.
• Network: Create an environment that encourages relationship building and professional growth via networking and creating Mentorship opportunities
• Transform: Provide a forum for the free exchange of bold, innovative, transformative ideas to advance the perception and effectiveness of information security. - ISACA Minnesota ChapterBooth: TBD
With approximately 1,100 members from over 100 organizations, we are the premier organization for information technology audit and control professionals in Minnesota and surrounding areas.
Our aim is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help to further promote and elevate the visibility of the IT governance, IS audit, control and security profession throughout the state of Minnesota.
On our website, you will find a wealth of information about events and volunteer opportunities within our chapter including local job postings. Please be sure to visit the members-only pages for important information about your chapter, special members-only benefits.
- ISSA Minnesota ChapterBooth: TBD
The Minnesota Chapter of ISSA (MN ISSA) serves the Minneapolis / St. Paul twin cities area, greater Minnesota and western Wisconsin. Our membership, over 170 strong and growing, is drawn from the multitude of large corporations, small businesses, government entities and educational institutions in the area. They span all levels of career growth, from students and entry-level to senior management, and cover all industries – finance, medical, government, education, retail, technology, services, and more. This depth of experience and breadth of knowledge provides a dynamic networking environment and a cadre of great individuals to draw from for education, guidance and thought leadership.
- Ixia, a Keysight BusinessBooth: 150
We provide testing, visibility, and security solutions to strengthen applications across physical and virtual networks. Organizations use our tools and capabilities to test, secure and visualize their networks so their applications run stronger.
- LogRhythmBooth: 205
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
- Optiv-RSABooth: 112
- ReduxioBooth: 138
Reduxio delivers high-performance enterprise storage solutions with unique data management capabilities enabled by the Reduxio TimeOS™, a new storage operating system. Reduxio TimeOS™ puts data in the middle of its architecture and allows complete virtualization of all types of storage, delivering the most effective storage for the most demanding enterprise applications. Reduxio is backed by C5 Capital Cloud Partners, Jerusalem Venture Partners (JVP), Carmel Ventures, Intel (NASDAQ: INTC), and Seagate Technology PLC (NASDAQ: STX). Learn more at www.reduxio.com and follow us on Twitter and LinkedIn.
- TechTargetBooth: TBD
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- Trend MicroBooth: 120
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- TrustMAPPBooth: 109
TrustMAPP℠ was developed by a consulting firm on the ground floor of the information security field: Secure Digital Solutions (SDS). Founded in 2005, the firm was one of the first to recognize the strength of using process-level maturity models paired with CMMI maturity scoring, now the accepted best-practice in the industry.
SDS refined its Maturity Assessment, Profile, and Plan (MAPP) consulting approach over 10 years of real-world engagements. Its consultants first began building the visuals in TrustMAPP for a CIO client who asked for a “clear, quick picture” of his organization’s information security posture and future roadmap investments.
The highly refined assessment templates, scoring engine, and graphic summaries in TrustMAPP came from a decade of success with SDS clients.
TrustMAPP is helping security leaders maximize their time and resources while providing 1) fast, accurate assessment across large enterprises; 2) strategic program guidance based on costs and benefits; and 3) communication that resonates with executives and unites the chain of command.
- Wombat Security TechnologiesBooth: 105
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, and a library of simulated attacks and brief interactive training modules, to reduce employee susceptibility to attack, even phishing attacks, over 80%.
- ZscalerBooth: 104
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
- Alex WoodCISO, Uplight; Co-Host, Colorado = Security podcast
Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.
- Dr. Larry PonemonChairman and Founder, Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.
Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
- Laura MacDonaldField CTO, RSA
Laura MacDonald is a Field Chief Technology Officer with RSA, a Dell Technologies business. She is an extended member of the Dell Cyber Security Intelligence and Response Team (CSIRT), working to understand the latest threats in cyber espionage and attacks. With over 20 years’ experience in networking and information security, she consults and educates RSA customers on the evolving threat landscape. Her practitioner insights on advanced incident response teams have gained her trusted advisor status with over 100 RSA customers across many verticals.
- Douglas DeGroteChief Information Security Officer, Allianz Life
Senior Leader with 28+ years experience of delivering solutions and services in cyber security, risk management, enterprise architecture, business continuity, operations, development and program management.
- Michael Kearn, CISSP, NSA-IAMDirector, Threat Informed Defense, U.S. Bank Information Security Services
As Managing BISO for Community Banking and Consumer Banking lines of business, he regularly consults with technology, risk and business executives as an information security subject matter expert. Mr. Kearn also manages the relationship between Community and Consumer Banking technical leaders, their teams and ISS. Mr. Kearn brings more than nineteen years of varied experience in Information Technology to his current role. Prior to joining US Bank early in 2012, Mr. Kearn held several positions with Wells Fargo & Company, including roles as an IT Auditor, Application Developer, Application Architect and VP of Information Security (ISO). Mr. Kearn has been a featured speaker at many industry events and has taught at the graduate level for nearly ten years.
- Dr. Larry PonemonChairman and Founder, Ponemon Institute
Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in various industries. In addition to Institute activities, Dr. Ponemon is an adjunct professor for ethics and privacy at Carnegie Mellon University’s CIO Institute. He is a Fellow of the Center for Government Innovation of the Unisys Corporation.
Dr. Ponemon consults with leading multinational organizations on global privacy management programs. He has extensive knowledge of regulatory frameworks for managing privacy and data security, including financial services, healthcare, pharmaceutical, telecom, and internet. Dr. Ponemon was appointed to the Advisory Committee for Online Access & Security for the United States Federal Trade Commission. He was appointed by the White House to the Data Privacy and Integrity Advisory Committee for the Department of Homeland Security. He was also an appointed to two California State task forces on privacy and data security laws.
Dr. Ponemon earned his Ph.D. at Union College in Schenectady, New York. He has a Master’s degree from Harvard University, and attended the doctoral program in system sciences at Carnegie Mellon University. He earned his Bachelor's with Highest Distinction from the University of Arizona. He is a Certified Public Accountant and a Certified Information Privacy Professional.
- Barry CaplinVP & CISO, Fairview Health Services
Barry is the first CISO for Fairview Health Services. He has 35 years in technology/security, an MS in applied mathematics from Virginia Tech, and CISSP, ISSMP, CISA, and CISM certifications. Barry is a frequent speaker on a variety of security, safety and privacy topics. Follow him on Twitter @bcaplin and read his blog http://securityandcoffee.blogspot.com/
- Victor DevinePrincipal Engineer, Trend Micro
Victor Devine has been focused on IT Security for the last 10 years of his 20 year IT career. While playing a big role with securing data centers, endpoint protection and gateways; he joined Trend Micro as a Principle Engineer to expand client education on the importance of IT Security both in and out of the workplace. When he is not talking about security, you will most likely find him on a Disc Golf course.
- Kurt WescoeChief Architect, Wombat Security, a division of Proofpoint
As Chief Architect at Wombat Security, Kurt is responsible for ensuring Wombat's software and systems are built on a sound foundation. He brings over 10 years of experience in engineering, across multiple industries. He also serves as a faculty member in the School of Computer Science’s master’s program in e-Business at Carnegie Mellon University. Kurt earned his M.Sc. in E-Commerce from CMU, and a B.S. in Computer Engineering from the University of Pittsburgh.
- Jason WittyEVP & CISO, U.S. Bank
Jason Witty is the EVP, CISO at U.S. Bancorp, providing singular accountability for information security controls in the company. An award winning CISO, Jason has 23 years of information security and risk management experience and was recently named the 2017 SecureWorld Ambassador of the Year in addition to a “CISO Superhero” at I.S.E. North America in 2015. Jason simultaneously serves as the Vice-Chairman of the Board of Directors at the FS/ISAC, as well as being FBI’s Chicago Infragard Sector Chief for Finance Services.
- Craig KaplanCyber Security Account Executive, Darktrace
Craig Kaplan is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Financial Services to Healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Kaplan graduated with a bachelor’s degree from the University of Michigan and is based out of Darktrace’s Washington, DC office.
- Jonathan LangeExecutive Manager, baramundi software USA, Inc.
Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.
- Christopher RencePresident, Rimage Corporation; CSRO, Equus Holdings
Christopher is President and CEO of Rimage Corporation. He has more than 25 years of experience leading global security and technology transformation for Accenture, FICO, Digital River, and EQ Holdings, with deep expertise in governance and compliance, business continuity and disaster recovery, cloud architecture computing, and sustainability. GDPR, DPO, CIPPE, CRISC, CISO, MBCP
- Chris MorrisRegional Expert, Threat Prevention, Check Point Software Technologies, Inc.
Chris Morris is the Threat Prevention SME for Check Point's Central United States region. He has been in the IT industry for nearly 20 years, whose experiences include perimeter and endpoint security, network virtualization, disaster recovery, and network design.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes