- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Thursday, December 2, 20217:30 amAdvisory Council Roundtable [VIP only]Topic: Storing Vaccination Status and Compliance with HIPPA / PHIFounding Partner & Owner, Fischer Law, LLCRegistration Level:
- VIP / Exclusive
7:30 am - 8:10 amThis session is for SecureWorld Advisory Council members by invite only. Discussion moderated by Jordan Fischer.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 9:00 amLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:15 amAligning with the Business: Where Are We Going Wrong?ISSA Chapter Meeting - Open to all attendeesPresident, ISSA International; CISO, NeuEonHead of Information Security, Netflix DVDRegistration Level:- Open Sessions
8:15 am - 8:55 amMany in our profession now operate under a “business enablement” mindset. We recognize the fact that we must align security efforts with the needs of the business, or we will continue towards becoming irrelevant. But what does “aligning with the business” really mean? Some believe we may be misunderstanding this concept and applying it incorrectly within our organizations. Attend this panel discussion with the ISSA International leadership for an honest and possibly controversial take on aligning security with the business.
8:15 amTrends in Cybercrime: An Update from the FBIInfraGard Meeting: Washington State Chapter - Open to all attendeesSpecial Agent, FBI, Seattle Field OfficeRegistration Level:- Open Sessions
8:15 am - 8:55 amSpecial Agent Kevin Brennan will cover recent trends in cybercrime from the FBI’s perspective. He will also discuss responding to and reporting cyber incidents to the FBI, including business email compromises (BEC) and ransomware.
9:00 am[Opening Keynote] The New Guard: Securing Digital Transformation and a Culture of SecurityCISO / Executive Director, Cybersecurity, Collins AerospaceRegistration Level:- Open Sessions
9:00 am - 9:45 am9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:00 amLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amHow to Survive in the Modern Security World: Automate or DieVP and CISO, TrueBlue Inc.Registration Level:- Open Sessions
10:00 am - 10:30 amIn this presentation, Karen will cover:
- Getting the most from your security stack through inter-operability, automation, and orchestration
- reducing the security stack and extracting value
- rethinking and pursuing inter-operable security tools
10:00 amThe Implementation Journey of Zero Trust and SASE: Realizing the BenefitsVP, CSO - Cloud Security Transformation, NetskopeRegistration Level:- Open Sessions
10:00 am - 10:30 amMost organizations have a hybrid implementation of cloud and on-prem services. With the rapid adoption of business digitalization and expanding remote work force, how do we consolidate controls and enhance the security of the systems?
In this hybrid mode, enterprises need speed, visibility, security, and reliability without compromise. Enter the secure access service edge, better known as SASE. It’s inevitable that SASE implementations and Zero Trust implementations will provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?
In this session, James Christianson will discuss:
· How to migrate your security controls to take advantage of SASE
· Reducing cost while increasing your security posture
· Implementing a road map for SASE / Zero Trust10:00 amAligning Third-Party Risk Strategies Across Security, Privacy, Ethics, and ESGHead of CISO Center of Excellence, OneTrustRegistration Level:- Open Sessions
10:00 am - 10:30 amThird-party risk management (TPRM) is essential for companies now more than ever amid heightened privacy, security, ethics, and ESG concerns. As a result, businesses are rethinking how to embed these unique risk domains into their TPRM and procurement lifecycles to mitigate risk and drive companies. By collaborating across teams and disciplines, companies can drive long-term value while increasing transparency and accountability. In this session, we’ll outline how companies can align third-party risk strategies across security, privacy, ethics, and ESG to ensure a holistic approach to TPRM.
- Get actionable guidance to quickly align third-party risk strategies across risk domains and disciplines.
- Understand long-term changes you can make to set your business up for current and future success.
- Hear the latest advice and lessons learned from leading third-party risk experts.
10:00 amSecuring What You Can't SeeTechnical Account Manager, QualysRegistration Level:- Open Sessions
10:00 am - 10:30 amCan you find all the assets on your network, both those you know about and those you don’t? And once you do, can you see the details of each asset, such as their security and compliance posture? During our session, Qualys will discuss ways to reduce risk, automate asset management processes, and provide a solid foundation for IT Security and Risk Management—because you can’t secure what you can’t see.
10:30 amNetworking BreakRegistration Level:- Open Sessions
10:30 am - 10:45 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:45 amLaunching a Privacy Program in 12 MonthsCISO, Portland State UniversityRegistration Level:- Open Sessions
10:45 am - 11:15 am10:45 amThe Boulevard of Broken BucketsSr. Director, Chief Security Data Scientist, Rapid7Director of Research, Rapid7Registration Level:- Open Sessions
10:45 am - 11:15 amAre you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.
10:45 amManaging Insider Risk without Compromising Speed of BusinessSecurity Community Evangelist, Manager, Code42Registration Level:- Open Sessions
10:45 am - 11:15 amAs companies double down on time to innovation, time to market, and time to revenue, they are inherently introducing more risk from the inside. The more cloud-based, collaborative, and fast an organization becomes, the greater the Insider Risks posed to its people, technology, and data. The upside is that cloud collaboration tools make employees more productive. The downside is that these same tools make it easier to exfiltrate data.
Adding to the complexities of working from home and off the corporate network, more employees are routinely using unauthorized devices, tools, and cloud-based applications to share files and ideas with colleagues.
Join us to discuss the growing Insider Risk problem and how the right data protection methods can set security teams up for success, without slowing down company productivity.
10:45 amData Protection: Action and ReactionVP, Product Marketing, Encryption, Thales GroupRegistration Level:- Open Sessions
10:45 am - 11:15 amProtecting data is a critical component of any enterprise security strategy. We will discuss trends observed in a survey and presented in the 2021 Thales Data Threat Report. Ransomware has been a topic of significant concern recently, given the increasing number of targeted attacks. We’ll offer some recommendations to address this menace. Finally, we’ll go over the recent Executive Order in response to increasing security incidents, discuss sections of the executive order that pertain to data protection, and present Thales’ perspective to address it.
11:15 amNetworking BreakRegistration Level:- Open Sessions
11:15 am - 11:30 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:30 am3 Different Ways to Consider Cyber RiskAssociate Teaching Professor, The Information School, University of WashingtonRegistration Level:- Open Sessions
11:30 am - 12:00 pmRisk, uncertainty, and unpredictability are at the heart of cyber risk. Even as our technologies and tools have become more sophisticated, the coronavirus pandemic has caused significant changes in the manner in which firms operate. This session will consider three different aspects of our current situation: first, the underlying strain that cyber risks from technology platforms designed to accommodate meetings and group work bring to the forefront; second, the complexity of defending computers, servers, mobile devices, electronic systems, data, and networks from malicious attacks in the hybrid environment of Work From Home and Return to Office; and, finally, the hard work being done between CISA and the private sector to get out in front of cyber attacks.
11:30 amCyber Insurance: Driving the Future of Cybersecurity ImprovementsCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPConsultant, Cyber Risk Solutions Team, WTWDirector, Cyber Underwriting, Safety NationalRegistration Level:- Open Sessions
11:30 am - 12:00 pmWhat will drive the next big wave of information security improvements at U.S. organizations? Instead of regulation, it may be insurance. A two-pronged evolution is underway. Insurance policies are suddenly becoming more prescriptive for organizations, often requiring companies meet certain cybersecurity benchmarks before a policy can be written. At the same time, “InsureTech” is emerging on the scene. This involves a new breed of insurance company that provides cyber coverage and also scans the insured’s environment to constantly monitor for IT and cyber risk. Join this keynote panel as we discuss this evolution and look at future impacts of cyber insurance on security leaders and their teams.
Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)
11:30 amWhat You Need to Know About Security within Modern Application Development (MAD)Principal Security SME, Horizon3.aiRegistration Level:- Open Sessions
11:30 am - 12:00 pmToday’s software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they agree that their current software development models and release frequencies can no longer keep pace with demand. Clearly, MAD fundamentals and cloud-native approaches are imperative to ensure continued organizational viability.
As a result, leadership is now taking considerable measures to support and even promote MAD initiatives due to its benefits. However, most don’t realize the cultural changes and application security challenges that will also likely emerge.
Join this session to learn more about MAD and the:
- Promised benefits and expected outcomes
- Likely hurdles and bumps along the way
- Expanding risk landscape that surfaces
- Solutions and approaches needed to secure modern applications
11:30 am(Re)Gaining Control of Your Cybersecurity ProgramVP of Solutions Consulting, BitSightRegistration Level:- Open Sessions
11:30 am - 12:00 pmFrom growing risk introduced by supply chain partners to increased demands from the board and external stakeholders, security and risk leaders are seeking to (re)gain control of their cybersecurity programs and demonstrate effectiveness. What should they prioritize?
BitSight’s Evan Tegethoff will share why third party risk management, cyber risk quantification, and data-driven decision making are critical areas for leaders to focus on in the upcoming year.
12:00 pmNetworking BreakRegistration Level:- Open Sessions
12:00 pm - 12:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:15 pm[Lunch Keynote] Getting Your Security Strategy Right—and Left—from the StartCTO & Founder, SysdigRegistration Level:- Open Sessions
12:15 pm - 1:00 pm1:00 pmNetworking BreakRegistration Level:- Open Sessions
1:00 pm - 1:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmPrivacy and Cyber Law Landscape for 2022Founding Partner & Owner, Fischer Law, LLCRegistration Level:- Open Sessions
1:15 pm - 2:00 pmJoin this session to explore the latest evolutions in cybersecurity and privacy law. This includes the emerging trends and initiatives that are most likely to impact organizations in 2022. Plus, we’ll talk about a strategic approach to cut through the confusion and identify where to focus right now.
1:15 pmHuman + Machine: The Future of PasswordsVP of Product Management, Solutions, 1PasswordRegistration Level:- Open Sessions
1:15 pm - 2:00 pmBiometrics and other methods promise a passwordless future. But is the future of the password really so simple? How can you prepare for that future, whatever it holds? This session will cover:
- The passwordless future
- The rise of secret sprawl
- Building visibility into your platform
- Integrating with existing technologies
1:15 pm[Panel] Ransomware: Myths, Pitfalls, and New InsightsFounder & CEO, Remediant, Inc.CTO, MorphisecPrincipal Security Architect, GigamonRegistration Level:- Open Sessions
1:15 pm - 2:00 pmOne thing we have learned over the past 18 months is that ransomware is very lucrative. Backups and cyber insurance have you covered, right? Not so fast. Misinformation abounds around digital extortion. Join our panel of experts as they unpack some of the myths and pitfalls around ransomware and offer valuable insight on how to keep your company out of the headlines!
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:15 pmSecuring Business Implementations of BlockchainCISO, DeserveRegistration Level:- Open Sessions
2:15 pm - 3:00 pm2:15 pm[Panel] Cloud: Power and PerilCISO & C-Suite Advisor, Check Point Software TechnologiesField CISO, SnykSr. Security Engineer, AutomoxField CTO; VP, Product and Solution Architecture, RezilionRegistration Level:- Open Sessions
2:15 pm - 3:00 pmWe are making history now, in the cloud. Organizations are utilizing cloud at record levels, revealing its power like never before. However, much of this shift was forced, and fast, which increased risk. And attackers are shifting, too. Join this panel as we unpack the power of the cloud and also its peril: current challenges, threats, and pitfalls.
2:15 pm[Panel] Third-Party Risk: Managing Your PartnersSr. Product Marketing Manager, ReversingLabsThird-Party Risk Offering Manager, OneTrustPartner - Data Protection, Privacy & Security Group, K&L GatesRegistration Level:- Open Sessions
2:15 pm - 3:00 pmAt any given moment, a company could take a snapshot of its risk and stay busy trying to seal up all of its own holes (or accept them for what they are) in security. But what about the businesses that support you? How do you know that Fred’s band has a secure API for its clients? Does ACME really need access to our HR files? Why do we keep getting old invoices from ABC Parts Company? Dive into third-party risk, networking security with a focus on data exfiltration, and how Zero Trust could eliminate this costly issue.
3:00 pmNetworking BreakRegistration Level:- Open Sessions
3:00 pm - 3:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:15 pm[Closing Keynote] Cybersecurity at a Crossroads: Emerging Threats, Technologies, and Geopolitical Realities for 2022Fireside Chat with Moderator Bruce SussmanCybersecurity influencer, author, presidential appointee, and Georgetown University cyber facultyRegistration Level:- Open Sessions
3:15 pm - 4:00 pmCybersecurity is at a crossroads as we head into a new year. Join this fireside chat to explore the forks in the road and the technology, threats, and geopolitics that will influence where we go from here. Chuck Brooks has been named a Top 5 Cybersecurity Executive to Watch and a Top Tech Person to Follow by LinkedIn. He currently has close to 100,000 followers on social media platforms and is a subject matter expert on emerging technologies, cybersecurity, and future trends.
- 1PasswordBooth:
1Password is a privacy-focused password manager that keeps you safe online. 1Password is the world’s most-loved password manager. By combining industry-leading security and award-winning design, the company provides private, secure, and user-friendly password management to businesses and consumers globally. More than 80,000 business customers, including IBM, Slack, PagerDuty, and GitLab, trust 1Password as their enterprise password manager.
- Arctic Wolf NetworksBooth:
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- BitSightBooth:
BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. For more information, please visit www.bitsight.com, read our blog, or follow @BitSight on X.
- Check Point Software TechnologiesBooth:
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- Checkmarx Inc.Booth:
Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.
- CloudflareBooth:
Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications, and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.
Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations—from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.
Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest internet trends and insights at radar.cloudflare.com.
- Code42Booth:
Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.
- CorelightBooth:
Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com
- Cybercrime Support NetworkBooth:
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- Washington State InfraGardBooth:
InfraGard is a partnership of individuals representing businesses, academic institutions, state and local law enforcement agencies, and communities who are dedicated to collaborating and sharing information to prevent hostile acts against the United States.
The Evergreen InfraGard Members Alliance area of operation is Washington State and over 600 members. As part of the Western Region, we work closely with the IMAs in Los Angeles, San Diego, Oregon, and Idaho. Our chapter’s mission is, “To protect Washington State’s Infrastructure and critical services by providing a secure platform and trusted community to share experiences and information.”
- GigamonBooth:
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- IntSightsBooth:
IntSights is revolutionizing cybersecurity operations with the industry’s only all-in-one external threat protection platform designed to neutralize cyberattacks outside the wire. Our unique cyber reconnaissance capabilities enable continuous monitoring of an enterprise’s external digital profile across the open, deep, and dark web to identify emerging threats and orchestrate proactive response. Tailored threat intelligence that seamlessly integrates with security infrastructure for dynamic defense has made IntSights one of the fastest-growing cybersecurity companies in the world.
- ISC2 Seattle ChapterBooth:
Bringing like-minded professionals together in the Greater Puget Sound region to discuss current tactics, techniques, and procedures within cybersecurity.
- ISSA Puget Sound ChapterBooth:
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. Join today.
- MorphisecBooth:
Morphisec is the world leader in providing advanced security solutions for midsize to small enterprises around the globe. We simplify security and can automatically block modern attacks from the endpoint to the cloud. Unlike traditional security solutions relying on human intervention, our solutions deliver operationally simple, proactive prevention. We protect businesses around the globe with limited security resources and training from the most dangerous and sophisticated cyber attacks.
- NetskopeBooth:
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- OktaBooth:
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- OneTrustBooth:
OneTrust is the leading and fastest growing privacy management software platform used by hundreds of organizations globally to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and Privacy Shield.
- Qualys, Inc.Booth:
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
- Rapid7Booth:
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- RemediantBooth:
Founded in the heart of San Francisco, Remediant offers an industry leading Privileged Access Management (PAM) solution we call SecureOne. Our innovative and enterprise-class cybersecurity solution enables real-time monitoring, Zero Trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security/Cloud ecosystems. We protect organizations from stolen credentials being used against them, which is the number one attack vector across all breaches. To learn more, please visit: www.remediant.com
- ReversingLabsBooth:
ReversingLabs automatically detects and analyzes sophisticated file-based threats built to evade security controls from development to the SOC. Our hybrid-cloud Titanium Platform verifies binaries at the speed, accuracy, and scale required for software development, third-party software acceptance, and security operations teams to take confident action. Learn more at www.reversinglabs.com.
- RezilionBooth:
Rezilion’s automated DevSecOps platform allows organizations to effortlessly control and mitigate attack surface from dev to prod and across cloud infrastructures, applications, and IoT devices. It dramatically reduces the manual work security and engineering teams have to do, harmonizing previously-oppositional efforts, and empowering organizations to innovate faster.
- SiemplifyBooth:
The Siemplify team is comprised of cyber-security professionals, veterans of Israeli intelligence agencies. We bring rich experience in security analysis, management and operations and are backed by experts in data science and applied mathematics.
WE BELIEVE In the modern world of cyber threat analysis, investigation and management should be more holistic, intuitive and simple. Technology and data science should serve cyber security experts by providing all the relevant information about the threat in real-time and focus them in rapid decision making.
- SnykBooth:
Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.
- SysdigBooth:
The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud services. Only Sysdig has the deep visibility needed to see all threats, vulnerabilities and suspicious activity. With Sysdig you can secure the build pipeline, detect and respond to runtime threats, continuously validate compliance, and monitor and troubleshoot cloud infrastructure and services.
Sysdig is a SaaS platform, built on an open source stack that includes Falco and sysdig OSS, the open standards for runtime threat detection and response. Hundreds of organizations rely on Sysdig to secure containers, Kubernetes and cloud services.
- TechTargetBooth:
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThalesBooth:
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- ThreatConnectBooth:
Designed by analysts but built for the team, ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. To learn more about our TIP and SOAR solutions, visit www.ThreatConnect.com.
- WhiteSourceBooth:
WhiteSource is the pioneer of open source security and license compliance management. Founded in 2011, its vision is to empower businesses to develop better software by harnessing the power of open source. WhiteSource is used by more than 800 customers worldwide, from all verticals and sizes, including 23% of Fortune 100 companies, as well as industry leaders such as Microsoft, IBM, Comcast, and many more. For more information, please visit www.WhiteSourceSoftware.com.
- Women in CyberSecurity (WiCyS)Booth:
Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.
- Jordan Fischer, InstructorFounding Partner & Owner, Fischer Law, LLC
Jordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.
Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.
With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).
Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.
Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.
In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.
Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.
Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.
HONORS & RECOGNITIONS
Lawyer on the Fast Track, The Legal Intelligencer (2023)
Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
European Union ERASMUS Grant Recipient, 2020ASSOCIATIONS & MEMBERSHIPS
American Bar Association, Business Law Fellow, 2020-2022
American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
California Bar Association
New Jersey Bar Association
Forbes Business Council Member, 2022
International Association of Privacy Professionals (IAPP), Member
University of California, Berkeley, Cybersecurity Lecturer
former Thomas R. Kline School of Law, Drexel University, Law Professor
former Chestnut Hill College, Adjunct Professor
West Chester Friends School, Board Member
Appointed Fulbright Specialist in Cybersecurity and Data PrivacyCERTIFICATIONS
Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP) - Candy AlexanderPresident, ISSA International; CISO, NeuEon
Ms. Alexander has over 30 years of experience in the cybersecurity profession. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed corporate security programs. She is now working as a CISO and Cyber Risk Practice lead for NeuEon, Inc., assisting companies large and small to improve their cyber risk and security programs through effective business alignment.
Ms. Alexander is a leader within the cyber profession, where her contributions include being twice-elected as Information Systems Security Association's (ISSA) International President, chief architect for the Cyber Security Career Lifecycle, and a long-standing Director on the International Board. She is also the inaugural President and past Board Member of the ISSA Education and Research Foundation. She has been instrumental in establishing the annual ISSA/ESG research project to better understand challenges face by cybersecurity professionals worldwide.
- Jimmy SandersHead of Information Security, Netflix DVD
Jimmy has spent the better part of two decades securing data and systems from cyber threats. In addition to his duties at DVD.com, Jimmy has served as the San Francisco Bay Area chapter president of the Information Systems Security Association (ISSA) since 2014. He is also on the ISSA International Board of Directors. Furthermore, he has been a speaker at BlackHat, SecureWorld, InfoSec World, as well as other notable events. Prior to DVD.com, Jimmy has also held senior security management roles at organizations that include Samsung, Fiserv, and SAP. He is a Cyber Security Committee advisor for Merritt College, Ohlone College as well as on advisory board for other colleges and non-profit movements. Jimmy Sanders maintains the certifications of Certified Information Systems Security Professional (CISSP), Certified in Risk Information and Information Systems Control (CRISC), and Certified Information Systems Manager (CISM). He holds degrees in Psychology and Behavioral Science from San Jose State University.
- Kevin BrennanSpecial Agent, FBI, Seattle Field Office
FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.
- Alexandra HecklerCISO / Executive Director, Cybersecurity, Collins Aerospace
- Karen HolmesVP and CISO, TrueBlue Inc.
Karen Holmes is the Vice President and CISO at global staffing company TrueBlue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating an innovative atmosphere of "I have a crazy idea that just might work." Prior to taking on her role at TrueBlue, Karen gained experience at Recreational Equipment Inc. (REI), Carnival Corporation, Holland America Lines, and JP Morgan Chase. Karen also serves as a Director with Kitsap Credit Union. She is a CISA, CISM, CDPSE, and CIPM.
- James ChristiansenVP, CSO - Cloud Security Transformation, Netskope
James Christiansen is Netskope’s vice president of cloud security transformation and leader of the Global Chief Strategy Office. He is focused on enhancing Netskope’s global clients understand the challenges and solutions of cloud deployments by helping drive thought leadership in cloud security transformation.
James brings extensive expertise as a global leader in information security. Prior to joining Netskope, he was vice president CISO at Teradata where he led the global security, physical, and information security teams. Previously, James was vice president of information risk management at Optiv, chief information risk officer for Evantix, and CISO at Experian Americas, General Motors, and Visa International.
As a sought-after expert speaker on security, James has been featured at numerous prestigious events, including the Business Roundtable, Research Board, American Bar Association, American Banker, the RSA Conference, BankInfoSecurity, ISSA, ISACA, HIMSS, and MIS Training Institute. He has also been featured in The New York Times and quoted as an expert in USA Today, The Wall Street Journal, Reuters, United States Cybersecurity Magazine, Bloomberg, and Healthcare IT News.
James is a patent inventor and has received three innovation awards in cyber security, GRC, and cloud computing. He is the author of the Internet Survival Series and contributing author of CISO Essentials, as well as numerous industry papers.
- Justin HenkelHead of CISO Center of Excellence, OneTrust
Justin Henkel is an information security thought leader, subject matter expert, and Head of OneTrust's Security Center of Excellence. Justin has a proven track record planning, developing, building, and monitoring portfolios of work to secure IT infrastructure to meet federal and state cybersecurity standards, guidelines, and best practices. He has extensive experience communicating to senior leadership on business-aligned cybersecurity and incident response operations. In addition, Justin has 15 years of experience in vulnerability management, cyber intelligence, and risk remediation in government, the intelligence community, and financial sectors.
- Peter LiuTechnical Account Manager, Qualys
Peter Liu has been with Qualys in the Pre-Sales TAM role for over four years. He loves helping customers evaluate Qualys to make the decision to adopt Qualys as a security platform that allows you to tackle current security challenges such as vulnerability management or global IT asset management. Prior to Qualys, he spent six years in the digital forensic space, including endpoint detection and response along with e-discovery.
- Bob RudisSr. Director, Chief Security Data Scientist, Rapid7
Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Breach Investigations Report. Bob is a serial tweeter (@hrbrmstr), avid blogger (rud.is), R (#rstats) avunculur, author (Data-Driven Security), speaker, and regular contributor to the open source community.
- Tod BeardsleyDirector of Research, Rapid7
Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, Tod directs the myriad security research programs and initiatives at Rapid7. He can be uniquely identified at https://keybase.io/todb.
- Riley BruceSecurity Community Evangelist, Manager, Code42
Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with his pug Mimi.
- Krishna KsheerabdhiVP, Product Marketing, Encryption, Thales Group
Krishna has more than 25 years of experience leading Engineering and Business Strategy teams, including evaluating and integrating several key Thales acquisitions. Krishna has a Ph.D. in Computer Science and has worked on various topics, from compilers for supercomputers to operating systems for smart cards, leading skunkworks innovation projects to corporate entrepreneurship initiatives and M&A. He is currently responsible for marketing Thales’ Encryption products.
- Annie SearleAssociate Teaching Professor, The Information School, University of Washington
Annie teaches courses on risk management, cybersecurity, and information management at the University of Washington. She is founder and principal of ASA Risk Consultants, a Seattle-based advisory firm. She spent 10 years at Washington Mutual Bank, where for most of those years she chaired the crisis management team.
Annie is a member of the DHS Cybersecurity and Infrastructure Security Agency (CISA) Region 10 Regional Infrastructure Security Group. She was inducted in 2011 into the Hall of Fame for the International Network of Women in Homeland Security and Emergency Management. She writes a column monthly for ASA News & Notes and is the author of several books or book chapters, most recently "Risk Reconsidered, " a collection of articles and columns published in July 2018. She was a pro bono risk advisor to the Seattle Police Department from 2015-2019, and is a member of the emeritus board of directors for the Seattle Public Library Foundation.
- Shawn E. TumaCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Sean ScrantonConsultant, Cyber Risk Solutions Team, WTW
Cyber Liability National Practice Leader (current). IT Security / IT Auditor at RLI for eight years. Network / security consulting / auditor for financial institutions, government for nine years. Network / firewall administrator in healthcare for seven years. Designations: CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA.
- Steven H. AndersonDirector, Cyber Underwriting, Safety National
Steve is a cyber liability product leader and underwriter with almost 30 years of experience in both the insurance and technology sectors. In his current role Steve helps drive premium growth through leading operations, product development and underwriting at Safety National. Steve previously served as Chief Underwriting Officer at Measured Insurance and Vice President – Product Leader at QBE North America.
Steve is a subject matter expert and national speaker on the topic of cyber liability.
- Stephen GatesPrincipal Security SME, Horizon3.ai
Stephen Gates brings more than 15 years of information security experience to his role as Principal Security SME at Horizon3.ai. He is a subject matter expert with an extensive hands-on background in security and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and information that brings awareness to the security issues all organizations face.
- Evan TegethoffVP of Solutions Consulting, BitSight
Evan Tegethoff is Vice President of Solutions Consulting at BitSight. He previously held leadership roles in Risk and Compliance Practice Management at Optiv, Accuvant, and Forsythe Technologies. He has developed Third Party Risk approaches for numerous large organizations. Additionally, he led consulting teams focused on compliance, risk management, and third party risk assessment. He holds the CISSP certification and was previously an ISO 27001 Assessor and PCI QSA.
- Loris DegioanniCTO & Founder, Sysdig
Loris Degioanni is the Chief Technology Officer (CTO) and founder of Sysdig, the secure DevOps leader. He is also the creator of the popular open source troubleshooting tool, sysdig, and the open source container security tool, Falco. Prior to founding Sysdig, Loris co-created Wireshark, the open source network analyzer, which today has 20+ million users. Loris holds a PhD in computer engineering from Politecnico di Torino and lives in Davis, California.
- Jordan Fischer, InstructorFounding Partner & Owner, Fischer Law, LLC
Jordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.
Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.
With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).
Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.
Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.
In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.
Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.
Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.
HONORS & RECOGNITIONS
Lawyer on the Fast Track, The Legal Intelligencer (2023)
Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
European Union ERASMUS Grant Recipient, 2020ASSOCIATIONS & MEMBERSHIPS
American Bar Association, Business Law Fellow, 2020-2022
American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
California Bar Association
New Jersey Bar Association
Forbes Business Council Member, 2022
International Association of Privacy Professionals (IAPP), Member
University of California, Berkeley, Cybersecurity Lecturer
former Thomas R. Kline School of Law, Drexel University, Law Professor
former Chestnut Hill College, Adjunct Professor
West Chester Friends School, Board Member
Appointed Fulbright Specialist in Cybersecurity and Data PrivacyCERTIFICATIONS
Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP) - Tim KeelerFounder & CEO, Remediant, Inc.
Tim Keeler worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Tim moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences, and CardioDX. Tim is a GX-certified Security Incident Handler and earned his GX Security Leadership Certification (GSLC) from GIAC. Tim holds U.S. Department of Defense Level 3 8750 IAT and 8750 IAM Management certifications; CHFI (Computer Hacking Forensic Investigator) from EC-Council; and certification as a CCFE (Certified Computer Forensics Examiner) from IACRB. Tim was published in eForensics Magazine in 2013.
- Michael GorelikCTO, Morphisec
Morphisec CTO Michael Gorelik leads the malware research operation and sets technology strategy. He has extensive experience in the software industry and leading diverse cybersecurity software development projects. Prior to Morphisec, Michael was VP of R&D at MotionLogic GmbH, and previously served in senior leadership positions at Deutsche Telekom Labs. Michael has extensive experience as a red teamer, reverse engineer, and contributor to the MITRE CVE database. He has worked extensively with the FBI and US Department of Homeland Security on countering global cybercrime. Michael is a noted speaker, having presented at multiple industry conferences, such as SANS, Gartner, DefCon, RSA, and GovWare. Michael holds BSc and MSc degrees from the Computer Science department at Ben-Gurion University, focusing on sychronization in different OS architectures. He also jointly holds seven patents in the IT space.
- Greg MaplesPrincipal Security Architect, Gigamon
Greg Maples, CISSP, is Principal Security Architect for Gigamon. He has been involved in computer networking since his involvement in the original ARPANet project that became the Internet. He has been specializing in security protocols and web/DDOS issues for many years, and has more recently been focusing on threat detection in a Zero-Trust world.
- Shreyas KumarCISO, Deserve
Chief Information Security Officer Shreyas Kumar has spent more than 18 years in cybersecurity related roles. He most recently built the security program at Fintech startup Deserve, from the ground up. This follows previous roles which included securing Uber's global payments and the operational security and compliance of the Adobe Doc Cloud set of products and services. He is a member of the FBI's InfraGard and a partner of the San Francisco Economic Crimes Task Force (ECTF) run by the United States Secret Service. He is also a visiting Professor of Computer Science at San Jose State University. He holds multiple security certifications, an MS degree in Computer Science from Texas A&M University, and a Bachelor's degree from IIT Roorkee. He has spoken in multiple international conferences and has been an invited speaker at universities.
- Cindi CarterCISO & C-Suite Advisor, Check Point Software Technologies
Cindi Carter is a global, multi-industry Cybersecurity and Information Technology Executive who consistently seeks the optimal outcome for any endeavor. As a transformational leader from startups to enterprises, she excels at building cybersecurity practices in highly-regulated industries, turning strategic goals into actionable outcomes, and highly collaborative engagement across the organization for managing cyber risk.
At Check Point Software Technologies, Cindi is a Chief Information Security Officer in the Office of the CISO, leading Check Point's Healthcare Center of Excellence where human safety is essential to care.
Cindi is the founding President of Women in Security - Kansas City, was honored in SC Media magazine’s “Women to Watch in Cyber Security," and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.” She presents at conferences worldwide, holds several recognized IT, security, and project management certifications, and has a Master of Science degree in Information Technology.
- Steve KinmanField CISO, Snyk
Steve Kinman is a dedicated technology leader, with 20+ years of innovative, compliance-driven security strategy knowledge and the ability to deliver scalable, principle-based security and privacy programs focused on business requirements. Most recently, he led a security program transformation at Zalando SE in Berlin, Germany, joining as the first CISO for the now Dax listed publicly traded company in 2018 to help solve GDPR challenges. Steve is currently the Field CISO of Snyk, a developer-first security platform.
- Marina LiangSr. Security Engineer, Automox
Marina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, triaging alerts and performing deep dive investigations into customer incidents, and suggesting steps to enhance customer security posture.
- Curtis BarkerField CTO; VP, Product and Solution Architecture, Rezilion
Curtis has spent the past 10 years in technical sales and product management. Prior to Rezilion, Curtis spent 6 years at Symantec to manage their emerging mobile security products and went on to lead the Symantec product portfolio in their Asia Pacific region based in Singapore. Curtis transferred to Symantec HQ in Mountain View, California in 2016 to manage the introduction of emerging cloud security products. Curtis holds a Master's Degree in Electronic Communications Engineering (MEng) from the University of Sussex, UK.
- Jasmine NoelSr. Product Marketing Manager, ReversingLabs
Jasmine Noel is Senior Product Marketing Manager at ReversingLabs. Her career began as an industry analyst covering IT technologies. She then founded Ptak, Noel & Associates to provide research and marketing services to Fortune500 and startup technology firms. Prior to ReversingLabs, Noel also held product marketing roles in growth companies, including Veracode, Corvil, and NS1.
- Jaymin DesaiThird-Party Risk Offering Manager, OneTrust
Jaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficient and effective responses to data protection requirements. His team advises many of the world's leading organizations on General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and ePrivacy (Cookie Law) solution implementations with extensive experience building and scaling enterprise-level privacy programs. He holds a B.S. in Biomedical Engineering from the Georgia Institute of Technology.
- Jake Bernstein, Esq.Partner - Data Protection, Privacy & Security Group, K&L Gates
Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.
- Chuck BrooksCybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty
Named Top Tech Person To Follow by LinkedIn, Named Top 5 Cybersecurity Exec to Watch, Georgetown U Faculty, 2X Presidential Appointee, FORBES Contributor, Cybersecurity, Emerging Tech SME, Influencer
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes