Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, December 2, 2021
    7:30 am
    Advisory Council Roundtable [VIP only]
    • session level icon
    Topic: Storing Vaccination Status and Compliance with HIPPA / PHI
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:10 am

    This session is for SecureWorld Advisory Council members by invite only. Discussion moderated by Jordan Fischer.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 9:00 am
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Virtual booths feature demos, resources downloads, and staff ready to answer your questions. Look for participating Dash For Prizes and CyberHunt sponsors to be entered to win prizes.

    8:15 am
    Aligning with the Business: Where Are We Going Wrong?
    • session level icon
    ISSA Chapter Meeting - Open to all attendees
    speaker photo
    President, ISSA International; CISO, NeuEon
    speaker photo
    Head of Information Security, Netflix DVD
    Registration Level:
    • session level iconOpen Sessions
    8:15 am - 8:55 am

    Many in our profession now operate under a “business enablement” mindset. We recognize the fact that we must align security efforts with the needs of the business, or we will continue towards becoming irrelevant. But what does “aligning with the business” really mean? Some believe we may be misunderstanding this concept and applying it incorrectly within our organizations. Attend this panel discussion with the ISSA International leadership for an honest and possibly controversial take on aligning security with the business.

    8:15 am
    Trends in Cybercrime: An Update from the FBI
    • session level icon
    InfraGard Meeting: Washington State Chapter - Open to all attendees
    speaker photo
    Special Agent, FBI, Seattle Field Office
    Registration Level:
    • session level iconOpen Sessions
    8:15 am - 8:55 am

    Special Agent Kevin Brennan will cover recent trends in cybercrime from the FBI’s perspective. He will also discuss responding to and reporting cyber incidents to the FBI, including business email compromises (BEC) and ransomware.

    9:00 am
    [Opening Keynote] The New Guard: Securing Digital Transformation and a Culture of Security
    • session level icon
    speaker photo
    CISO / Executive Director, Cybersecurity, Collins Aerospace
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:00 am
    How to Survive in the Modern Security World: Automate or Die
    • session level icon
    speaker photo
    VP and CISO, TrueBlue Inc.
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:30 am

    In this presentation, Karen will cover:

    • Getting the most from your security stack through inter-operability, automation, and orchestration
    • reducing the security stack and extracting value
    • rethinking and pursuing inter-operable security tools
    10:00 am
    The Implementation Journey of Zero Trust and SASE: Realizing the Benefits
    • session level icon
    speaker photo
    CSO & VP, Cloud Security Transformation, Netskope
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:30 am

    Most organizations have a hybrid implementation of cloud and on-prem services. With the rapid adoption of business digitalization and expanding remote work force, how do we consolidate controls and enhance the security of the systems?

    In this hybrid mode, enterprises need speed, visibility, security, and reliability without compromise. Enter the secure access service edge, better known as SASE. It’s inevitable that SASE implementations and Zero Trust implementations will provide a more comprehensive security capability to truly support digital transformation. How can your organization best position itself for the transition?

    In this session, James Christianson will discuss:
    ·  How to migrate your security controls to take advantage of SASE
    ·  Reducing cost while increasing your security posture
    ·  Implementing a road map for SASE / Zero Trust

    10:00 am
    Aligning Third-Party Risk Strategies Across Security, Privacy, Ethics, and ESG
    • session level icon
    speaker photo
    Head of CISO Center of Excellence, OneTrust
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:30 am

    Third-party risk management (TPRM) is essential for companies now more than ever amid heightened privacy, security, ethics, and ESG concerns. As a result, businesses are rethinking how to embed these unique risk domains into their TPRM and procurement lifecycles to mitigate risk and drive companies. By collaborating across teams and disciplines, companies can drive long-term value while increasing transparency and accountability. In this session, we’ll outline how companies can align third-party risk strategies across security, privacy, ethics, and ESG to ensure a holistic approach to TPRM.

    • Get actionable guidance to quickly align third-party risk strategies across risk domains and disciplines.
    • Understand long-term changes you can make to set your business up for current and future success.
    • Hear the latest advice and lessons learned from leading third-party risk experts.
    10:00 am
    Securing What You Can't See
    • session level icon
    speaker photo
    Technical Account Manager (TAM), Pre-Sales, Qualys
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:30 am

    Can you find all the assets on your network, both those you know about and those you don’t? And once you do, can you see the details of each asset, such as their security and compliance posture? During our session, Qualys will discuss ways to reduce risk, automate asset management processes, and provide a solid foundation for IT Security and Risk Management—because you can’t secure what you can’t see.

    10:30 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 10:45 am

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:45 am
    Launching a Privacy Program in 12 Months
    • session level icon
    speaker photo
    CISO, Portland State University
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:15 am
    10:45 am
    The Boulevard of Broken Buckets
    • session level icon
    speaker photo
    Sr. Director, Chief Security Data Scientist, Rapid7
    speaker photo
    Director of Research, Rapid7
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:15 am

    Are you moving your business processes and mission-critical data to the cloud? If so, you will want to hear what our research team found when they looked at 121 publicly reported data exposure incidents that were disclosed throughout 2020. Join Rapid7’s research team, Tod Beardsley and Bob Rudis, in our latest conversation as we discuss the 2021 Cloud Misconfigurations Report. Expect to hear firsthand about the research that documents the commonalities and patterns associated with the leaks and breaches and discover what you can do to avoid making the same missteps as you move to the cloud.

    10:45 am
    Managing Insider Risk without Compromising Speed of Business
    • session level icon
    speaker photo
    Security Community Evangelist, Manager, Code42
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:15 am

    As companies double down on time to innovation, time to market, and time to revenue, they are inherently introducing more risk from the inside. The more cloud-based, collaborative, and fast an organization becomes, the greater the Insider Risks posed to its people, technology, and data. The upside is that cloud collaboration tools make employees more productive. The downside is that these same tools make it easier to exfiltrate data.

    Adding to the complexities of working from home and off the corporate network, more employees are routinely using unauthorized devices, tools, and cloud-based applications to share files and ideas with colleagues.

    Join us to discuss the growing Insider Risk problem and how the right data protection methods can set security teams up for success, without slowing down company productivity.

    10:45 am
    Data Protection: Action and Reaction
    • session level icon
    speaker photo
    VP, Product Marketing, Encryption, Thales Group
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:15 am

    Protecting data is a critical component of any enterprise security strategy. We will discuss trends observed in a survey and presented in the 2021 Thales Data Threat Report. Ransomware has been a topic of significant concern recently, given the increasing number of targeted attacks. We’ll offer some recommendations to address this menace. Finally, we’ll go over the recent Executive Order in response to increasing security incidents, discuss sections of the executive order that pertain to data protection, and present Thales’ perspective to address it.

    11:15 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 11:30 am

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    11:30 am
    3 Different Ways to Consider Cyber Risk
    • session level icon
    speaker photo
    Associate Teaching Professor, The Information School, University of Washington
    Registration Level:
    • session level iconOpen Sessions
    11:30 am - 12:00 pm

    Risk, uncertainty, and unpredictability are at the heart of cyber risk.  Even as our technologies and tools have become more sophisticated, the coronavirus pandemic has caused significant changes in the manner in which firms operate. This session will consider three different aspects of our current situation: first, the underlying strain that cyber risks from technology platforms designed to accommodate meetings and group work bring to the forefront; second, the complexity of defending computers, servers, mobile devices, electronic systems, data, and networks from malicious attacks in the hybrid environment of Work From Home and Return to Office; and, finally, the hard work being done between CISA and the private sector to get out in front of cyber attacks.

    11:30 am
    Cyber Insurance: Driving the Future of Cybersecurity Improvements
    • session level icon
    speaker photo
    Co-Chair, Cybersecurity & Data Privacy Practice Group, Spencer Fane LLP
    speaker photo
    Cyber Liability National Practice Leader, RLI Insurance Company
    speaker photo
    Chief Underwriting Officer, Measured Analytics and Insurance
    Registration Level:
    • session level iconOpen Sessions
    11:30 am - 12:00 pm

    What will drive the next big wave of information security improvements at U.S. organizations? Instead of regulation, it may be insurance. A two-pronged evolution is underway. Insurance policies are suddenly becoming more prescriptive for organizations, often requiring companies meet certain cybersecurity benchmarks before a policy can be written. At the same time, “InsureTech” is emerging on the scene. This involves a new breed of insurance company that provides cyber coverage and also scans the insured’s environment to constantly monitor for IT and cyber risk. Join this keynote panel as we discuss this evolution and look at future impacts of cyber insurance on security leaders and their teams.

    Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)

    11:30 am
    What You Need to Know About Security within Modern Application Development (MAD)
    • session level icon
    speaker photo
    Security Evangelist & Sr. Solution Specialist, Checkmarx Inc.
    Registration Level:
    • session level iconOpen Sessions
    11:30 am - 12:00 pm

    Today’s software-driven organizations must continue to innovate, and due to the pressures of digital transformation, they agree that their current software development models and release frequencies can no longer keep pace with demand. Clearly, MAD fundamentals and cloud-native approaches are imperative to ensure continued organizational viability.

    As a result, leadership is now taking considerable measures to support and even promote MAD initiatives due to its benefits. However, most don’t realize the cultural changes and application security challenges that will also likely emerge.

    Join this session to learn more about MAD and the:

    • Promised benefits and expected outcomes
    • Likely hurdles and bumps along the way
    • Expanding risk landscape that surfaces
    • Solutions and approaches needed to secure modern applications
    11:30 am
    (Re)Gaining Control of Your Cybersecurity Program
    • session level icon
    speaker photo
    VP of Solutions Consulting, BitSight
    Registration Level:
    • session level iconOpen Sessions
    11:30 am - 12:00 pm

    From growing risk introduced by supply chain partners to increased demands from the board and external stakeholders, security and risk leaders are seeking to (re)gain control of their cybersecurity programs and demonstrate effectiveness. What should they prioritize?

    BitSight’s Evan Tegethoff will share why third party risk management, cyber risk quantification, and data-driven decision making are critical areas for leaders to focus on in the upcoming year.

    12:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:15 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    12:15 pm
    [Lunch Keynote] Getting Your Security Strategy Right—and Left—from the Start
    • session level icon
    speaker photo
    CTO & Founder, Sysdig
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:15 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    Privacy and Cyber Law Landscape for 2022
    • session level icon
    speaker photo
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Join this session to explore the latest evolutions in cybersecurity and privacy law. This includes the emerging trends and initiatives that are most likely to impact organizations in 2022. Plus, we’ll talk about a strategic approach to cut through the confusion and identify where to focus right now.

    1:15 pm
    Human + Machine: The Future of Passwords
    • session level icon
    speaker photo
    VP of Product Management, Solutions, 1Password
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    Biometrics and other methods promise a passwordless future. But is the future of the password really so simple? How can you prepare for that future, whatever it holds? This session will cover:

    • The passwordless future
    • The rise of secret sprawl
    • Building visibility into your platform
    • Integrating with existing technologies
    1:15 pm
    [Panel] Ransomware: Myths, Pitfalls, and New Insights
    • session level icon
    speaker photo
    Founder & CEO, Remediant, Inc.
    speaker photo
    CTO, Morphisec
    speaker photo
    Principal Security Architect, Gigamon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    One thing we have learned over the past 18 months is that ransomware is very lucrative. Backups and cyber insurance have you covered, right? Not so fast. Misinformation abounds around digital extortion. Join our panel of experts as they unpack some of the myths and pitfalls around ransomware and offer valuable insight on how to keep your company out of the headlines!

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:15 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:15 pm
    Securing Business Implementations of Blockchain
    • session level icon
    speaker photo
    CISO, Deserve
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:15 pm
    [Panel] Cloud: Power and Peril
    • session level icon
    speaker photo
    CISO, Check Point Software Technologies
    speaker photo
    Field CISO, Snyk
    speaker photo
    Sr. Security Engineer, Automox
    speaker photo
    Field CTO; VP, Product and Solution Architecture, Rezilion
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm

    We are making history now, in the cloud. Organizations are utilizing cloud at record levels, revealing its power like never before. However, much of this shift was forced, and fast, which increased risk. And attackers are shifting, too. Join this panel as we unpack the power of the cloud and also its peril: current challenges, threats, and pitfalls.

    2:15 pm
    [Panel] Third-Party Risk: Managing Your Partners
    • session level icon
    speaker photo
    Sr. Product Marketing Manager, ReversingLabs
    speaker photo
    Third-Party Risk Offering Manager, OneTrust
    speaker photo
    Partner - Data Protection, Privacy & Security Group, K&L Gates LLP
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm

    At any given moment, a company could take a snapshot of its risk and stay busy trying to seal up all of its own holes (or accept them for what they are) in security. But what about the businesses that support you? How do you know that Fred’s band has a secure API for its clients? Does ACME really need access to our HR files? Why do we keep getting old invoices from ABC Parts Company? Dive into third-party risk, networking security with a focus on data exfiltration, and how Zero Trust could eliminate this costly issue.

    3:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:15 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    3:15 pm
    [Closing Keynote] Cybersecurity at a Crossroads: Emerging Threats, Technologies, and Geopolitical Realities for 2022
    • session level icon
    Fireside Chat with Moderator Bruce Sussman
    speaker photo
    Cybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm

    Cybersecurity is at a crossroads as we head into a new year. Join this fireside chat to explore the forks in the road and the technology, threats, and geopolitics that will influence where we go from here. Chuck Brooks has been named a Top 5 Cybersecurity Executive to Watch and a Top Tech Person to Follow by LinkedIn. He currently has close to 100,000 followers on social media platforms and is a subject matter expert on emerging technologies, cybersecurity, and future trends.

Exhibitors
  • 1Password
    Booth:

    1Password is a privacy-focused password manager that keeps you safe online. 1Password is the world’s most-loved password manager. By combining industry-leading security and award-winning design, the company provides private, secure, and user-friendly password management to businesses and consumers globally. More than 80,000 business customers, including IBM, Slack, PagerDuty, and GitLab, trust 1Password as their enterprise password manager.

  • Arctic Wolf Networks
    Booth:

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • BitSight
    Booth:

    BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. For more information, please visit www.bitsight.com, read our blog or follow @BitSight on Twitter

  • Check Point Software Technologies Inc.
    Booth:

    Check Point Software Technologies Inc. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Checkmarx Inc.
    Booth:

    Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers and security teams. As the AppSec testing leader, we deliver the unparalleled accuracy, coverage, visibility, and guidance our customers need to build tomorrow’s software securely and at speed.

  • Cloudflare
    Booth:

    Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

    Secure your websites, APIs, and Internet applications.
    Protect corporate networks, employees, and devices.
    Write and deploy code that runs on the network edge.

  • Code42
    Booth:

    Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

  • Corelight
    Booth:

    Corelight makes powerful network security monitoring solutions that transform network traffic into rich logs, extracted files, and security insights for incident responders and threat hunters. Corelight Sensors run on open-source Zeek (formerly called “Bro”) and simplify Zeek deployment and management while expanding its performance and capabilities. https://www.corelight.com

  • Cybercrime Support Network
    Booth:

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • Evergreen InfraGard Members Alliance
    Booth:

    InfraGard is a partnership of individuals representing businesses, academic institutions, state and local law enforcement agencies, and communities who are dedicated to collaborating and sharing information to prevent hostile acts against the United States.

    The Evergreen InfraGard Members Alliance area of operation is Washington State and over 600 members. As part of the Western Region, we work closely with the IMAs in Los Angeles, San Diego, Oregon, and Idaho. Our chapter’s mission is, “To protect Washington State’s Infrastructure and critical services by providing a secure platform and trusted community to share experiences and information.”

  • Fortinet
    Booth:

    Fortinet secures the largest enterprise, service provider, and government organizations around the world. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 300,000 customers trust Fortinet to protect their businesses.

  • Gigamon
    Booth:

    Gigamon is the first company to deliver unified network visibility and analytics on all information-in-transit, from raw packets to apps, across physical, virtual and cloud infrastructure. We aggregate, transform and analyze network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation. Gigamon has been awarded over 75 technology patents and enjoys industry-leading customer satisfaction with more than 3,000 organizations, including over 80 percent of the Fortune 100. Headquartered in Silicon Valley, Gigamon operates globally. For the full story on how Gigamon can help you to run fast, stay secure and innovate, please visit www.gigamon.com.

  • IntSights
    Booth:

    IntSights is revolutionizing cybersecurity operations with the industry’s only all-in-one external threat protection platform designed to neutralize cyberattacks outside the wire. Our unique cyber reconnaissance capabilities enable continuous monitoring of an enterprise’s external digital profile across the open, deep, and dark web to identify emerging threats and orchestrate proactive response. Tailored threat intelligence that seamlessly integrates with security infrastructure for dynamic defense has made IntSights one of the fastest-growing cybersecurity companies in the world.

  • (ISC)2 Seattle Chapter
    Booth:

    Bringing like-minded professionals together in the Greater Puget Sound region to discuss current tactics, techniques, and procedures within cybersecurity.

  • ISSA Puget Sound Chapter
    Booth:

    ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

    The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members. Join today.

  • Morphisec
    Booth:

    Morphisec is the world leader in providing advanced security solutions for midsize to small enterprises around the globe. We simplify security and can automatically block modern attacks from the endpoint to the cloud. Unlike traditional security solutions relying on human intervention, our solutions deliver operationally simple, proactive prevention. We protect businesses around the globe with limited security resources and training from the most dangerous and sophisticated cyber attacks.

  • Netskope
    Booth:

    The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

  • Okta
    Booth:

    Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.

  • OneTrust
    Booth:

    OneTrust is the leading and fastest growing privacy management software platform used by hundreds of organizations globally to comply with data privacy regulations across sectors and jurisdictions, including the EU GDPR and Privacy Shield.

  • Qualys, Inc.
    Booth:

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.

  • Rapid7
    Booth:

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Remediant
    Booth:

    Founded in the heart of San Francisco, Remediant offers an industry leading Privileged Access Management (PAM) solution we call SecureOne.  Our innovative and enterprise-class cybersecurity solution enables real-time monitoring, Zero Trust protection of privileged accounts and Just-In-Time Administration (JITA) across IT/Security/Cloud ecosystems. We protect organizations from stolen credentials being used against them, which is the number one attack vector across all breaches. To learn more, please visit: www.remediant.com

  • ReversingLabs
    Booth:

    ReversingLabs automatically detects and analyzes sophisticated file-based threats built to evade security controls from development to the SOC. Our hybrid-cloud Titanium Platform verifies binaries at the speed, accuracy, and scale required for software development, third-party software acceptance, and security operations teams to take confident action. Learn more at www.reversinglabs.com.

  • Rezilion
    Booth:

    Rezilion’s automated DevSecOps platform allows organizations to effortlessly control and mitigate attack surface from dev to prod and across cloud infrastructures, applications, and IoT devices. It dramatically reduces the manual work security and engineering teams have to do, harmonizing previously-oppositional efforts, and empowering organizations to innovate faster.

  • Siemplify
    Booth:

    The  Siemplify  team is comprised of cyber-security professionals, veterans of Israeli intelligence agencies. We bring rich experience in security analysis,  management  and operations and are backed by experts in data science and applied mathematics.

    WE BELIEVE In the modern world of cyber threat analysis, investigation and management should be more holistic, intuitive and simple. Technology and data science should serve cyber security experts by providing all the relevant information about the threat in real-time and focus them  in  rapid decision making.

  • Snyk
    Booth:

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • Sysdig
    Booth:

    The Sysdig Secure DevOps Platform provides security to confidently run containers, Kubernetes and cloud services. Only Sysdig has the deep visibility needed to see all threats, vulnerabilities and suspicious activity. With Sysdig you can secure the build pipeline, detect and respond to runtime threats, continuously validate compliance, and monitor and troubleshoot cloud infrastructure and services.

    Sysdig is a SaaS platform, built on an open source stack that includes Falco and sysdig OSS, the open standards for runtime threat detection and response. Hundreds of organizations rely on Sysdig to secure containers, Kubernetes and cloud services.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales
    Booth:

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatConnect
    Booth:

    Designed by analysts but built for the team, ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. To learn more about our TIP and SOAR solutions, visit www.ThreatConnect.com.

  • WhiteSource
    Booth:

    WhiteSource is the pioneer of open source security and license compliance management. Founded in 2011, its vision is to empower businesses to develop better software by harnessing the power of open source. WhiteSource is used by more than 800 customers worldwide, from all verticals and sizes, including 23% of Fortune 100 companies, as well as industry leaders such as Microsoft, IBM, Comcast, and many more. For more information, please visit www.WhiteSourceSoftware.com.

  • Women in CyberSecurity (WiCyS)
    Booth:

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law

    Jordan Fischer leads Beckage's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

  • speaker photo
    Candy Alexander
    President, ISSA International; CISO, NeuEon

    Ms. Alexander has over 30 years of experience in the cybersecurity profession. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed corporate security programs. She is now working as a CISO and Cyber Risk Practice lead for NeuEon, Inc., assisting companies large and small to improve their cyber risk and security programs through effective business alignment.

    Ms. Alexander is a leader within the cyber profession, where her contributions include being twice-elected as Information Systems Security Association's (ISSA) International President, chief architect for the Cyber Security Career Lifecycle, and a long-standing Director on the International Board. She is also the inaugural President and past Board Member of the ISSA Education and Research Foundation. She has been instrumental in establishing the annual ISSA/ESG research project to better understand challenges face by cybersecurity professionals worldwide.

  • speaker photo
    Jimmy Sanders
    Head of Information Security, Netflix DVD

    Jimmy has spent the better part of two decades securing data and systems from cyber threats. In addition to his duties at DVD.com, Jimmy has served as the San Francisco Bay Area chapter president of the Information Systems Security Association (ISSA) since 2014. He is also on the ISSA International Board of Directors. Furthermore, he has been a speaker at BlackHat, SecureWorld, InfoSec World, as well as other notable events. Prior to DVD.com, Jimmy has also held senior security management roles at organizations that include Samsung, Fiserv, and SAP. He is a Cyber Security Committee advisor for Merritt College, Ohlone College as well as on advisory board for other colleges and non-profit movements. Jimmy Sanders maintains the certifications of Certified Information Systems Security Professional (CISSP), Certified in Risk Information and Information Systems Control (CRISC), and Certified Information Systems Manager (CISM). He holds degrees in Psychology and Behavioral Science from San Jose State University.

  • speaker photo
    Kevin Brennan
    Special Agent, FBI, Seattle Field Office

    FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.

  • speaker photo
    Alexandra Heckler
    CISO / Executive Director, Cybersecurity, Collins Aerospace
  • speaker photo
    Karen Holmes
    VP and CISO, TrueBlue Inc.

    Karen Holmes is the Vice President and CISO at global staffing company TrueBlue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating an innovative atmosphere of "I have a crazy idea that just might work." Prior to taking on her role at TrueBlue, Karen gained experience at Recreational Equipment Inc. (REI), Carnival Corporation, Holland America Lines, and JP Morgan Chase. Karen also serves as a Director with Kitsap Credit Union. She is a CISA, CISM, CDPSE, and CIPM.

  • speaker photo
    James Christiansen
    CSO & VP, Cloud Security Transformation, Netskope

    James Christiansen is Netskope’s vice president of cloud security transformation and leader of the Global Chief Strategy Office. He is focused on enhancing Netskope’s global clients understand the challenges and solutions of cloud deployments by helping drive thought leadership in cloud security transformation.

    James brings extensive expertise as a global leader in information security. Prior to joining Netskope, he was vice president CISO at Teradata where he led the global security, physical, and information security teams. Previously, James was vice president of information risk management at Optiv, chief information risk officer for Evantix, and CISO at Experian Americas, General Motors, and Visa International.

    As a sought-after expert speaker on security, James has been featured at numerous prestigious events, including the Business Roundtable, Research Board, American Bar Association, American Banker, the RSA Conference, BankInfoSecurity, ISSA, ISACA, HIMSS, and MIS Training Institute. He has also been featured in The New York Times and quoted as an expert in USA Today, The Wall Street Journal, Reuters, United States Cybersecurity Magazine, Bloomberg, and Healthcare IT News.

    James is a patent inventor and has received three innovation awards in cyber security, GRC, and cloud computing. He is the author of the Internet Survival Series and contributing author of CISO Essentials, as well as numerous industry papers.

  • speaker photo
    Justin Henkel
    Head of CISO Center of Excellence, OneTrust

    Justin Henkel is an information security thought leader, subject matter expert, and Head of OneTrust's Security Center of Excellence. Justin has a proven track record planning, developing, building, and monitoring portfolios of work to secure IT infrastructure to meet federal and state cybersecurity standards, guidelines, and best practices. He has extensive experience communicating to senior leadership on business-aligned cybersecurity and incident response operations. In addition, Justin has 15 years of experience in vulnerability management, cyber intelligence, and risk remediation in government, the intelligence community, and financial sectors.

  • speaker photo
    Peter Liu
    Technical Account Manager (TAM), Pre-Sales, Qualys

    Peter Liu has been with Qualys in the Pre-Sales TAM role for over four years. He loves helping customers evaluate Qualys to make the decision to adopt Qualys as a security platform that allows you to tackle current security challenges such as vulnerability management or global IT asset management. Prior to Qualys, he spent six years in the digital forensic space, including endpoint detection and response along with e-discovery.

  • speaker photo
    Sean McKay
    CISO, Portland State University
  • speaker photo
    Bob Rudis
    Sr. Director, Chief Security Data Scientist, Rapid7

    Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Breach Investigations Report. Bob is a serial tweeter (@hrbrmstr), avid blogger (rud.is), R (#rstats) avunculur, author (Data-Driven Security), speaker, and regular contributor to the open source community.

  • speaker photo
    Tod Beardsley
    Director of Research, Rapid7

    Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, Tod directs the myriad security research programs and initiatives at Rapid7. He can be uniquely identified at https://keybase.io/todb.

  • speaker photo
    Riley Bruce
    Security Community Evangelist, Manager, Code42

    Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with his pug Mimi.

  • speaker photo
    Krishna Ksheerabdhi
    VP, Product Marketing, Encryption, Thales Group

    Krishna has more than 25 years of experience leading Engineering and Business Strategy teams, including evaluating and integrating several key Thales acquisitions. Krishna has a Ph.D. in Computer Science and has worked on various topics, from compilers for supercomputers to operating systems for smart cards, leading skunkworks innovation projects to corporate entrepreneurship initiatives and M&A. He is currently responsible for marketing Thales’ Encryption products.

  • speaker photo
    Annie Searle
    Associate Teaching Professor, The Information School, University of Washington

    Annie teaches courses on risk management, cybersecurity, and information management at the University of Washington. She is founder and principal of ASA Risk Consultants, a Seattle-based advisory firm. She spent 10 years at Washington Mutual Bank, where for most of those years she chaired the crisis management team.

    Annie is a member of the DHS Cybersecurity and Infrastructure Security Agency (CISA) Region 10 Regional Infrastructure Security Group. She was inducted in 2011 into the Hall of Fame for the International Network of Women in Homeland Security and Emergency Management. She writes a column monthly for ASA News & Notes and is the author of several books or book chapters, most recently "Risk Reconsidered, " a collection of articles and columns published in July 2018. She was a pro bono risk advisor to the Seattle Police Department from 2015-2019, and is a member of the emeritus board of directors for the Seattle Public Library Foundation.

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Cybersecurity & Data Privacy Practice Group, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Sean Scranton
    Cyber Liability National Practice Leader, RLI Insurance Company

    Cyber Liability National Practice Leader (current).
    IT Security / IT Auditor at RLI for 8 years.
    Network / security consulting / auditor for financial institutions, government for 9 years.
    Network / firewall administrator in healthcare for 7 years.

    Designations - CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA

  • speaker photo
    Steven Anderson
    Chief Underwriting Officer, Measured Analytics and Insurance
  • speaker photo
    Stephen Gates
    Security Evangelist & Sr. Solution Specialist, Checkmarx Inc.

    Stephen Gates brings more than 15 years of information security experience to his role as Security Evangelist and Senior Solution Specialist at Checkmarx. He is an SME with an extensive hands-on background in security and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and information that brings awareness to the security issues all organizations face.

  • speaker photo
    Evan Tegethoff
    VP of Solutions Consulting, BitSight

    Evan Tegethoff is Vice President of Solutions Consulting at BitSight. He previously held leadership roles in Risk and Compliance Practice Management at Optiv, Accuvant, and Forsythe Technologies. He has developed Third Party Risk approaches for numerous large organizations. Additionally, he led consulting teams focused on compliance, risk management, and third party risk assessment. He holds the CISSP certification and was previously an ISO 27001 Assessor and PCI QSA.

  • speaker photo
    Loris Degioanni
    CTO & Founder, Sysdig

    Loris Degioanni is the Chief Technology Officer (CTO) and founder of Sysdig, the secure DevOps leader. He is also the creator of the popular open source troubleshooting tool, sysdig, and the open source container security tool, Falco. Prior to founding Sysdig, Loris co-created Wireshark, the open source network analyzer, which today has 20+ million users. Loris holds a PhD in computer engineering from Politecnico di Torino and lives in Davis, California.

  • speaker photo
    Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Beckage Law

    Jordan Fischer leads Beckage's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts, as well as internationally in both Europe and Asia.

    Jordan has counseled clients on a wide variety of regulatory requirements, including the General Data Protection Regulation (GDPR), and implementing member state law, the California Consumer Privacy Act (CCPA), the Fair Credit Reporting Act, the Driver's Privacy Protection Act, biometric data laws, global data breach standards, and federal and state unfair business practices acts. She also provides counsel on a variety of security and privacy frameworks, including the International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST) cyber and privacy frameworks, and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan has extensive experience in the intersection of law and technology, regularly evaluating and assessing legal and business opportunities and risk to provide public and private sector clients with critical data privacy and cybersecurity assessments and strategy. With a global perspective, Jordan represents clients regarding contractual negotiations related to technology, data management, security, and privacy, and helps to build out compliance programs to address a multitude of regulatory requirements and best practices. She also provides insight into third-party management, working with clients to build solutions to ensure security and privacy are accounted for in the supply chain. Jordan has represented clients in a variety of sectors, including emerging technologies (blockchain, Internet of Things/IoT, and Artificial Intelligence/AI), pharmaceutical, healthcare, agriculture, adtech, and manufacturing. Jordan works with clients to develop business solutions that incorporate privacy-by-design and security-by-design concepts, merging regulatory requirements with real-world practical solutions.

  • speaker photo
    Troy Kitch
    VP of Product Management, Solutions, 1Password
  • speaker photo
    Tim Keeler
    Founder & CEO, Remediant, Inc.

    Tim Keeler worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Tim moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences, and CardioDX. Tim is a GX-certified Security Incident Handler and earned his GX Security Leadership Certification (GSLC) from GIAC. Tim holds U.S. Department of Defense Level 3 8750 IAT and 8750 IAM Management certifications; CHFI (Computer Hacking Forensic Investigator) from EC-Council; and certification as a CCFE (Certified Computer Forensics Examiner) from IACRB. Tim was published in eForensics Magazine in 2013.

  • speaker photo
    Michael Gorelik
    CTO, Morphisec

    Michael Gorelik is CTO of Morphisec, where he leads the malware research operation and sets technology strategy. He has extensive experience leading diverse cybersecurity software development projects and experience in the software industry in general. Prior to Morphisec, Michael was the VP R&D at MotionLogic GmbH and before that served in senior leadership positions at Deutsche Telekom Labs. Michael has extensive experience as a red teamer, reverse engineer and contributor to the MITRE CVE database. He has worked extensively with the FBI and US Department of Homeland Security on countering global cybercrime. Michael is a noted speaker, having presented at multiple industry conferences, such as SANS, BSides, and RSA. Michael holds Bsc and Msc degrees from the Computer Science department at Ben-Gurion University, focusing on synchronization in different OS architectures. He also jointly holds seven patents in the IT space.

  • speaker photo
    Greg Maples
    Principal Security Architect, Gigamon

    Greg Maples, CISSP, is Principal Security Architect for Gigamon. He has been involved in computer networking since his involvement in the original ARPANet project that became the Internet. He has been specializing in security protocols and web/DDOS issues for many years, and has more recently been focusing on threat detection in a Zero-Trust world.

  • speaker photo
    Shreyas Kumar
    CISO, Deserve

    Chief Information Security Officer Shreyas Kumar has spent more than 18 years in cybersecurity related roles. He most recently built the security program at Fintech startup Deserve, from the ground up. This follows previous roles which included securing Uber's global payments and the operational security and compliance of the Adobe Doc Cloud set of products and services. He is a member of the FBI's InfraGard and a partner of the San Francisco Economic Crimes Task Force (ECTF) run by the United States Secret Service. He is also a visiting Professor of Computer Science at San Jose State University. He holds multiple security certifications, an MS degree in Computer Science from Texas A&M University, and a Bachelor's degree from IIT Roorkee. He has spoken in multiple international conferences and has been an invited speaker at universities.

  • speaker photo
    Cindi Carter
    CISO, Check Point Software Technologies

    Cindi Carter is a global, multi-industry Cybersecurity and Information Technology Executive with more than 15 years of experience as a transformational leader for both startups and enterprises. Cindi’s expertise includes building Cybersecurity practices in highly regulated industries, turning strategic goals into actionable outcomes, influencing a “secure from the start” culture, developing secure architecture & engineering platforms, and highly collaborative engagement (C-Suite, Board, Clients and Industry) for managing risk.

    At Check Point Software Technologies, Cindi is a Chief Information Security Officer in the Office of the CISO, committed to helping other CISOs achieve success in both strategic and tactical initiatives and contributing to Check Point’s own security practices. Cindi possesses a firm grasp of the challenges surrounding the security, privacy, and risk management landscape, and is a trusted advisor within Check Point as well as for our customers. More recently, Cindi was the CISO for IntSights Cyber Threat Intelligence, where she was responsible for driving the company’s internal security initiatives, as well as serving as an external-facing advisor and subject matter expert in the areas of threat intelligence, cybersecurity resilience and risk management. Cindi also served as VP and Chief Security Officer at MedeAnalytics, a healthcare analytics software-as-a-service (SaaS) leader; prior to that Cindi was the Deputy Chief Information Security Officer at Blue Cross and Blue Shield of Kansas City.

    Industry Collaboration Cindi is the founding President of Women in Security - Kansas City. She was honored as part of SC Media magazine’s “Women to Watch in Cyber Security” list, and was also featured in Cybersecurity Venture’s book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.” She presents at nationwide conferences, local chapters, and webinars including SecureWorld, RSA Conference, HIMSS, Evanta CxO Summit, and B-Sides. Cindi holds several recognized IT, security, and project management certifications and has a Master of Science degree in Information Technology and a Bachelor of Science degree in Management Information Systems, both from Central Michigan University.

  • speaker photo
    Steve Kinman
    Field CISO, Snyk

    Steve Kinman is a dedicated technology leader, with 20+ years of innovative, compliance-driven security strategy knowledge and the ability to deliver scalable, principle-based security and privacy programs focused on business requirements. Most recently, he led a security program transformation at Zalando SE in Berlin, Germany, joining as the first CISO for the now Dax listed publicly traded company in 2018 to help solve GDPR challenges. Steve is currently the Field CISO of Snyk, a developer-first security platform.

  • speaker photo
    Marina Liang
    Sr. Security Engineer, Automox

    Marina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, triaging alerts and performing deep dive investigations into customer incidents, and suggesting steps to enhance customer security posture.

  • speaker photo
    Curtis Barker
    Field CTO; VP, Product and Solution Architecture, Rezilion

    Curtis has spent the past 10 years in technical sales and product management. Prior to Rezilion, Curtis spent 6 years at Symantec to manage their emerging mobile security products and went on to lead the Symantec product portfolio in their Asia Pacific region based in Singapore. Curtis transferred to Symantec HQ in Mountain View, California in 2016 to manage the introduction of emerging cloud security products. Curtis holds a Master's Degree in Electronic Communications Engineering (MEng) from the University of Sussex, UK.

  • speaker photo
    Jasmine Noel
    Sr. Product Marketing Manager, ReversingLabs

    Jasmine Noel is Senior Product Marketing Manager at ReversingLabs. Her career began as an industry analyst covering IT technologies. She then founded Ptak, Noel & Associates to provide research and marketing services to Fortune500 and startup technology firms. Prior to ReversingLabs, Noel also held product marketing roles in growth companies, including Veracode, Corvil, and NS1.

  • speaker photo
    Jaymin Desai
    Third-Party Risk Offering Manager, OneTrust

    Jaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficient and effective responses to data protection requirements. His team advises many of the world's leading organizations on General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and ePrivacy (Cookie Law) solution implementations with extensive experience building and scaling enterprise-level privacy programs. He holds a B.S. in Biomedical Engineering from the Georgia Institute of Technology.

  • speaker photo
    Jake Bernstein, Esq.
    Partner - Data Protection, Privacy & Security Group, K&L Gates LLP

    Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.

  • speaker photo
    Chuck Brooks
    Cybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty

    Named Top Tech Person To Follow by LinkedIn, Named Top 5 Cybersecurity Exec to Watch, Georgetown U Faculty, 2X Presidential Appointee, FORBES Contributor, Cybersecurity, Emerging Tech SME, Influencer

Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store
Learn and connect virtually

Join your InfoSec peers for high-quality training and collaboration. Sign up today!