Speaker Directory
  • speaker photo
    Ashley Bull
    Solutions Engineer, Tessian

    Ashley is a Solutions Engineer at Tessian, providing customers with solutions to address their email security objectives. She is responsible for leading technical product demonstrations and evaluations, and is an expert in email security, endpoint security, insider threats, and behavior analytics and Human Layer Security. Prior to joining Tes...

  • speaker photo
    Chris Griffith
    VP of Product, Balbix

    Chris Griffith leads product management for Balbix. Chris brings over 15 years as a product, business development and strategy leader in security and technology. Prior to Balbix, Chris led tech alliances for Hewlett Packard Enterprise’s (HPE) security portfolio. Chris also ran product management for HPE’s Data Security business and drove stra...

  • speaker photo
    Lisa Britt
    SVP & Chief Human Resources Officer, Thermo Fisher Scientific
  • speaker photo
    Ryan Snyder
    SVP & CIO, Thermo Fisher Scientific
  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is the Executive Director at the National Cybersecurity Alliance. Lisa is a trailblazer in security awareness and education and is a prominent security influencer with a proven track record of engaging and empowering businesses and their employees to protect themselves and their data. Lisa has held executive roles with the For...

  • speaker photo
    David Barker
    Head of Application Security, GoodLeap LLC

    David Barker is Head of Application Security for GoodLeap LLC, a Fintech company providing a point-of-sale platform for sustainable home solutions. GoodLeap marks David’s fourth creation of a Code-to-Cloud Application Security program. His pedigree includes companies like Dell EMC, Stanley Black & Decker, and PTC. David has both an MBA and an...

  • speaker photo
    Richard Berthao
    Cybersecurity Advisor, U.S. Cybersecurity & Infrastructure Security Agency (CISA)

    Richard Berthao is the CISA Cybersecurity Advisor (CSA) for Connecticut. He manages the major cyber engagements in Connecticut with additional support to Region 1, championing cyber resilience to public and private sector partners. His career began over 25 years ago as an IT specialist in the private sector. Additionally, he spent 19 years as...

  • speaker photo
    Christopher Zell
    VP & CISO, The Wendy's Company
  • speaker photo
    Margaret White
    SVP & BISO, Wells Fargo
  • speaker photo
    Peter Liu
    Technical Account Manager, Qualys

    Peter Liu has been with Qualys in the Pre-Sales TAM role for over four years. He loves helping customers evaluate Qualys to make the decision to adopt Qualys as a security platform that allows you to tackle current security challenges such as vulnerability management or global IT asset management. Prior to Qualys, he spent six years in the di...

  • speaker photo
    Kevin Brennan
    Special Agent, FBI, Seattle Field Office

    FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.

  • speaker photo
    Loris Degioanni
    CTO & Founder, Sysdig

    Loris Degioanni is the Chief Technology Officer (CTO) and founder of Sysdig, the secure DevOps leader. He is also the creator of the popular open source troubleshooting tool, sysdig, and the open source container security tool, Falco. Prior to founding Sysdig, Loris co-created Wireshark, the open source network analyzer, which today has 20+ m...

  • speaker photo
    Evan Tegethoff
    VP of Solutions Consulting, BitSight

    Evan Tegethoff is Vice President of Solutions Consulting at BitSight. He previously held leadership roles in Risk and Compliance Practice Management at Optiv, Accuvant, and Forsythe Technologies. He has developed Third Party Risk approaches for numerous large organizations. Additionally, he led consulting teams focused on compliance, risk man...

  • speaker photo
    Justin Henkel
    Head of CISO Center of Excellence, OneTrust

    Justin Henkel is an information security thought leader, subject matter expert, and Head of OneTrust's Security Center of Excellence. Justin has a proven track record planning, developing, building, and monitoring portfolios of work to secure IT infrastructure to meet federal and state cybersecurity standards, guidelines, and best practices. ...

  • speaker photo
    Chuck Brooks
    Cybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty

    Named Top Tech Person To Follow by LinkedIn, Named Top 5 Cybersecurity Exec to Watch, Georgetown U Faculty, 2X Presidential Appointee, FORBES Contributor, Cybersecurity, Emerging Tech SME, Influencer

  • speaker photo
    Alexandra Heckler
    CISO / Executive Director, Cybersecurity, Collins Aerospace
  • speaker photo
    Nick Olmsted
    Sr. Systems Engineer, Arctic Wolf

    Nick Olmsted is a senior systems engineer with Arctic Wolf who brings 19 years of experience architecting, implementing, and developing secure technology solutions for enterprises. Nick started his career as a developer learning how to develop secure applications for clients around the globe. He then moved into a systems engineer role to help...

  • speaker photo
    Michael Johns
    Assistant Special Agent in Charge, United States Secret Service

    Michael brings over 24 years of experience with the Secret Service that includes leadership roles both in the protective arena and investigative front. Currently, he leads the Secret Service's Outreach Program, focusing on private and public sector partner growth. He is also the Executive Director for the Secret Service's Cyber Investigative ...

  • speaker photo
    Curtis Barker
    Field CTO; VP, Product and Solution Architecture, Rezilion

    Curtis has spent the past 10 years in technical sales and product management. Prior to Rezilion, Curtis spent 6 years at Symantec to manage their emerging mobile security products and went on to lead the Symantec product portfolio in their Asia Pacific region based in Singapore. Curtis transferred to Symantec HQ in Mountain View, California i...

  • speaker photo
    Michael Gorelik
    CTO, Morphisec

    Michael Gorelik is CTO of Morphisec, where he leads the malware research operation and sets technology strategy. He has extensive experience leading diverse cybersecurity software development projects and experience in the software industry in general. Prior to Morphisec, Michael was the VP R&D at MotionLogic GmbH and before that served in se...

  • speaker photo
    Tom Bowyer
    DevSecOps Engineer, Automox

    Tom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaki...

  • speaker photo
    Greg Maples
    Principal Security Architect, Gigamon

    Greg Maples, CISSP, is Principal Security Architect for Gigamon. He has been involved in computer networking since his involvement in the original ARPANet project that became the Internet. He has been specializing in security protocols and web/DDOS issues for many years, and has more recently been focusing on threat detection in a Zero-Trust ...

  • speaker photo
    Tim Williams
    Director, Information Security & Cyber Risk, ZOLL Medical Corporation
  • speaker photo
    Tung Nguyen
    Director of Cyber Security, Denver Water
  • speaker photo
    Sue Lapierre
    Vice President, Information Security Officer, Prologis
  • speaker photo
    Richard Bakos
    Director, Sales Engineering, LogRhythm
  • speaker photo
    Tim Keeler
    Founder & CEO, Remediant, Inc.

    Tim Keeler worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Tim moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences, and CardioDX. Tim is a GX-certified Secu...

  • speaker photo
    Troy Kitch
    VP of Product Management, Solutions, 1Password
  • speaker photo
    Tom Dixon
    Security Engineer, Corelight

    Tom has 15 years of experience in the security industry, beginning his career as an Analyst at what is now the U.K. MOD Joint Cyber Unit. After seven years in the military, he left to join Sourcefire as a Security Engineer. Cisco acquired Sourcefire in 2013, and he joined a small global team working with Cisco's top 28 accounts, ultimately le...

  • speaker photo
    Dan Kaplan
    Solutions Engineer, Okta

    Dan is a Solutions Engineer for Okta and aligns identity-related technical requirements to business outcomes for Okta US West commercial customers and prospects. He is an Okta-certified consultant and developer familiar with Zero Trust methods used by Okta's ecosystem of customers, partners, and prospects.

  • speaker photo
    Jim Johnson
    Director of Systems Engineering, Arctic Wolf

    Jim Johnson has been working to end cybercrime for the past two decades. His career started at Blue Coat, where he helped customers with their struggles to mitigate risk in the early days of web filtering. Since then, he has worked with customers of all sizes and verticals providing solutions from F5, Forescout, and now Arctic Wolf. As the Di...

  • speaker photo
    Bobby Mazzotti
    Sr. Solutions Engineer, Red Canary
  • speaker photo
    Jim Mandelbaum
    Field CTO, Gigamon
  • speaker photo
    Maggie MacAlpine
    Security Strategist, Cybereason
  • speaker photo
    Steven Anderson
    Chief Underwriting Officer, Measured Analytics and Insurance
  • speaker photo
    Sean Scranton
    Cyber Liability National Practice Leader, RLI Insurance Company

    Cyber Liability National Practice Leader (current).
    IT Security / IT Auditor at RLI for 8 years.
    Network / security consulting / auditor for financial institutions, government for 9 years.
    Network / firewall administrator in healthcare for 7 years.


  • speaker photo
    Akshay Kumar
    Product Manager, Partners, PKWARE

    Akshay Kumar serves as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid de...

  • speaker photo
    Sonya Wickel
    Director, Cybersecurity & Risk Compliance, Triumph Group
  • speaker photo
    Steve Kinman
    Field CISO, Snyk

    Steve Kinman is a dedicated technology leader, with 20+ years of innovative, compliance-driven security strategy knowledge and the ability to deliver scalable, principle-based security and privacy programs focused on business requirements. Most recently, he led a security program transformation at Zalando SE in Berlin, Germany, joining as the...

  • speaker photo
    Keith Chapman
    Cybersecurity Specialist, Infoscitex Corporation

    Keith has been a team lead for a security operations center, where he was a mentor and an incident response and threat intelligence subject matter expert and facilitated tabletop exercises. He currently works in a GRC role. He has the CISSP and Certified Threat Intelligence Analyst certifications. He also serves as a Cyber Teen Education chai...

  • speaker photo
    Jasmine Noel
    Sr. Product Marketing Manager, ReversingLabs

    Jasmine Noel is Senior Product Marketing Manager at ReversingLabs. Her career began as an industry analyst covering IT technologies. She then founded Ptak, Noel & Associates to provide research and marketing services to Fortune500 and startup technology firms. Prior to ReversingLabs, Noel also held product marketing roles in growth companies,...

  • speaker photo
    Mike Davis
    CISO, ExactlyIT Inc.; former CISO, alliantgroup
  • speaker photo
    Travis Dye
    Principal Solutions Architect, Armis

    Travis Dye is a Principal Solutions Architect for Armis focusing on strategic customers with challenging security projects. His passion is to help organizations with large and complex network environments find effective, real-world approaches to improve their network security programs. Prior to his current role he worked with security teams t...

  • speaker photo
    Eve Maler
    CTO, ForgeRock

    Eve Maler is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and has also served as a Forr...

  • speaker photo
    Adam Meyers
    SVP, Intelligence, CrowdStrike
  • speaker photo
    Sean McKay
    CISO, Portland State University
  • speaker photo
    Krishna Ksheerabdhi
    VP, Product Marketing, Encryption, Thales Group

    Krishna has more than 25 years of experience leading Engineering and Business Strategy teams, including evaluating and integrating several key Thales acquisitions. Krishna has a Ph.D. in Computer Science and has worked on various topics, from compilers for supercomputers to operating systems for smart cards, leading skunkworks innovation proj...

  • speaker photo
    Matt Downing
    Director, Threat Hunting Operations, ReversingLabs

    Matt is Director of Threat Hunting Operations at ReversingLabs where he helps to operationalize the implementation of ReversingLabs tools and massive dataset to help make networks more secure. Matt is a dedicated blue teamer and threat hunter. Prior to his role at ReversingLabs, Matt held many roles supporting threat research and security ope...

  • speaker photo
    Nathan Faith
    Manager, Cyber Security Nuclear Fleet, Exelon Generation
  • speaker photo
    Michael R. Glennon
    Special Agent and Private Sector Coordinator, FBI
  • speaker photo
    Earl Duby
    VP & CISO, Lear Corporation; Board Member, Michigan InfraGard Members Alliance
  • speaker photo
    Toby Zimmerer
    Director, Cybersecurity Due Diligence, RSM US

    Toby Zimmerer is a Director of Cybersecurity Due Diligence in the Transaction Advisory Services Practice of RSM US, where he assists organizations with identifying and addressing the potential cybersecurity risks during mergers and acquisitions. He has over 22 years of professional experience developing information security strategies, design...

  • speaker photo
    John M. Wilke
    Sr. Product Marketing Manager, Okta

    John Wilke is a Senior Product Marketing Manager at Okta who is currently focused on aligning the impact of Okta's SaaS solutions with the core business goals of Okta's most strategic customers. He was previously responsible for the expansion of Okta's Business Value team for the West Coast and Asia Pacific regions.

  • speaker photo
    Cory Sutliff
    Technical Director, AttackIQ

    Practice Lead for Technical Account Management at AttackIQ. Cory has 20+ years' experience in IT focusing on security, seven+ years with the DoD. He has spent the last two years at AttackIQ delivering Security Optimization (BAS).

  • speaker photo
    John Prewett
    Sr. IT Security Engineer, UnitedHealth Group

    John Prewett is a security technologist with over 20 years’ experience helping private sector, government agencies, and educational institutions identify risk and improve their security postures. John's latest passion is code writing, software engineering best practice, and otherwise improving the overall relationship between security practit...

  • speaker photo
    Joey Peloquin
    Principal Cloud Architect, Sales Engineering, Gigamon

    Joey Peloquin is an information and cyber security veteran, evolving over the years to specialize in multiple domains, including network, application, mobile, and for the last seven years, cloud security and architecture. Joey has held a variety of leadership roles over his career including security product ownership, head of consulting servi...

  • speaker photo
    Matthew Alvarado
    Threat Intelligence Manager, Digital Shadows
  • speaker photo
    Bridget Kravchenko
    CISO, Meritor

    Bridget Kravchenko is the Senior Director, Chief Information Security Officer for Meritor, responsible for information security, IT risk, and compliance globally. She has responsibility for developing a strategic security plan, security metrics, security programs, risk management, and incident response.

    Bridget has served in a CISO or...

  • speaker photo
    Adam Ford
    CISO, Illinois Department of Innovation & Technology (DoIT)
  • speaker photo
    Laura Clark
    CSO, State of Michigan - Department of Technology, Management and Budget

    Chief Security Officer for the Michigan Department of Technology, Management & Budget, Laura Clark brings a unique blend of strengths that include leadership, vision, and strategic and tactical planning, along with the ability to promote collaboration at all levels to support high-level, critical state-wide projects to successful completion.<...

  • speaker photo
    Karl Bernard
    IT Security Architect, University of Texas Health Science Center at Houston (UTHealth)

    Karl Bernard, CISSP, is an IT Security Architect at UTHealth with 30 years of IT experience, with 20 years in Information Security. His experience runs the full gamut of IT Security: he has implemented new technologies, such as network monitoring products and web application firewalls; performed risk assessments; coordinated large DR tests; l...

  • speaker photo
    Shafia Zubair
    Manager, Information Security, Morningstar

    Shafia is a Manager of Information Security at Morningstar, where she is responsible for the Information Security program management and governance. This requires working across security operations, threat intel, application security, compliance, and with the product teams to ensure secure, resilient, and recoverable applications. Prior to Mo...

  • speaker photo
    Tim Mackey
    Principal Security Strategist, Synopsys

    Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim appl...

  • speaker photo
    Sam Curry
    Chief Product and Security Officer, Cybereason
  • speaker photo
    Alex Jones
    Information Security Manager, Cobalt.io

    Alex Jones is an Information Security professional with eight plus years of direct security and compliance experience. He also has an extensive background in media, audio, and communications prior to working in the security field. He is currently the Information Security Manager for the leading Pentest as a Service Company, Cobalt.io. Prior t...

  • speaker photo
    Michael Boucher
    Americas CISO, JLL
  • speaker photo
    Jason Rivera
    Director, Strategic Threat Advisory Group, CrowdStrike

    Jason Rivera has over 15 years of experience innovating at the intersection of security operations and technology. He was a former Intelligence Officer/Captain in the U.S. Army, had assignments with the National Security Agency (NSA) and U.S. Cyber Command (USCYBERCOM), and served in combat tours overseas. He has experience in the private sec...

  • speaker photo
    Jeremy C. Sheridan
    Assistant Director, Office of Investigations, United States Secret Service

    Jeremy Sheridan is the Assistant Director of the Office of Investigations at the United States Secret Service. In this role, he leads more than 160 Secret Service field offices and directs the Secret Service's network of Cyber Fraud Task Forces (CFTFs) in their investigations of sophisticated computer and financial crimes. He also works to en...

  • speaker photo
    Pascal Geenens
    Global Director, Threat Intelligence, Radware

    Pascal Geenens helps execute Radware's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of IT. As part of the Radware Security Research team, he develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, perfor...

  • speaker photo
    Michael Schladt
    Principal Cybersecurity Researcher, General Electric Gas Power

    Mike Schladt, CISSP, GREM, is an information security researcher and engineer with over 12 years' experience performing malware analysis, reverse engineering, digital forensics, and incident response. Previous roles include leading malware analysis at the USAF National Air and Space Intelligence Center, as well as heading the development of e...

  • speaker photo
    Deepthi Menon
    Director of Information Security, Ambra Health

    Deepthi Menon serves as Director of Information Security at Ambra Health. Ambra Health is an innovative software company that provides solutions for medical image sharing of DICOM and non-DICOM data between patients, physicians, and hospitals. Deepthi has more than 12 years of experience in information security. She has her Masters in Informa...

  • speaker photo
    Rob Ellis
    Vice President, Reciprocity, Inc
  • speaker photo
    Scott McCormick
    CISO, Reciprocity, Inc
  • speaker photo
    Eric Botts
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cyber Security Program, and Assistant Professor of International Studies at the University of St. Thomas, teaching courses on Cyber Warfare, Cyber Ethics, Enterprise Cybersecurity, and Digital Governance. Adjunct Lecturer at the University of Houston Downtown, teaching a course on Organizational Resilience in th...

  • speaker photo
    Andrew Jarrett
    Program Manager, Cyber Readiness Center, Texas A&M Engineering Extension Service

    Andrew Jarrett of the TEEX Cyber Readiness Center is a former firefighter, current member of a Type II/Type III Incident Management Team (IMT) and has recently been deployed as a member of Texas Division of Emergency Management (TDEM) Incident Support Teams (ISTs) for COVID response. As the Cyber Enterprise Program Manager at the TEEX CRC, he...

  • speaker photo
    Russell Dowdell
    Director, Sales Engineering, SecureLink

    For nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations iden...

  • speaker photo
    Eric Monteith
    Director, US Public Sector Engineering, CrowdStrike
  • speaker photo
    Adam Hastings
    Sr. Sales Engineer, iboss
  • speaker photo
    Marcus Gwyn
    Sr. Federal Sales Engineer, SonicWall

    Marcus Gwyn has worked in cybersecurity sales for 10 years and in the Federal space for five of those years. He is the lead Sales Engineer on the SonicWall Federal team and has worked with Federal customers in Civilian, DOD, and Intel spaces. Marcus enjoys following trends in the threat landscape and learning more about cybersecurity. In his ...

  • speaker photo
    Wes Knight
    CISO, Needling Worldwide
  • speaker photo
    Ryan Witt
    Sr. Director, Industry Solutions Group, Proofpoint
  • speaker photo
    Marina Liang
    Sr. Security Engineer, Automox

    Marina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, tria...

  • speaker photo
    James McGril
    Security Solutions Architect, Radware

    James is a Security Solutions Architect and one of Radware’s thought leaders in Network and Application Security. He's been with Radware for nearly 10 years. James is a self-described geek and enjoys learning about application security and building web applications using the latest technologies. In his off time, James enjoys hiking, surfing, ...

  • speaker photo
    Kevin Wilson
    Sr. Product Manager, Area 1 Security

    Throughout his 14 years in cybersecurity, Kevin has been an Analyst and Engineer in various organizations, such as the U.S. Navy, First Data, and Lowe’s. Previously, he served as the Global Information Security Officer at Guess? Inc. and a Product Manager for McAfee.

  • speaker photo
    Baseer Balazadeh
    Sr. Technical Marketing Engineer, Gigamon

    Baseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor's degree in computer system networking engineering f...

  • speaker photo
    Nancy Rainosek
    CISO, State of Texas
  • speaker photo
    Ed Lopez
    Solutions Engineer, Bitglass
  • speaker photo
    Moderator: Joel Caminer
    Sr. Director of Cybersecurity Education, NYU Tandon

    Joel Caminer is the Director of Cybersecurity Education at NYU Tandon. Joel has 20+ years of experience in Financial Services, IT, and Consulting, and has led many strategic initiatives across the IT Risk and cybersecurity spectrum. He previously served as the Global Head of Technology Risk Management at TD Securities; VP of Information Risk ...

  • speaker photo
    Liat Krawczyk
    AVP, Emerging Tech, Cyber NYC, New York City Economic Development Corporation

    Liat Krawczyk is Assistant Vice President for Emerging Tech at the NYCEDC where she led the workforce arm of Cyber NYC, NYC's signature program to grow its cybersecurity ecosystem. She is also the founder and head of the women.nyc Childcare Innovation Lab. Prior to joining NYCEDC, Liat grew startups, social-enterprises, and innovation ecosyst...

  • speaker photo
    Jim Routh
    Private Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and Aetna

    Jim Routh serves as a security & risk advisor and Board member for several companies, and is the former CISO for MassMutual, CSO at Aetna, and Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and info...

  • speaker photo
    Geoff Brown
    CISO, City of New York; Head of NYC Cyber Command

    Geoff Brown was appointed Chief Information Security Officer for the City of New York in 2016, a position focused on cybersecurity and aggregate information risk across all 100+ NYC departments and agencies. In July 2017, Mayor de Blasio established New York City Cyber Command, led by Geoff and charged with setting Citywide cybersecurity poli...

  • speaker photo
    Nasir Memon
    Vice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of Engineering

    Nasir Memon is Vice Dean for Academics & Student Affairs, Head of Tandon Online, and a Professor of Computer Science at NYU Tandon. He introduced cybersecurity studies to NYU Tandon in 1999. He is co-founder of NYU's Center for Cyber Security (CCS) & the founder of the OSIRIS Lab, CSAW, and NYU Tandon Bridge & Cyber Fellows programs at NYU. H...

  • speaker photo
    Tom Roeh
    Director, Systems Engineering - Public Sector Technical Practice, ExtraHop

    Tom currently leads the ExtraHop Public Sector technical practice as Director of Systems Engineering. He has spent most of his 20-year career looking at networks, protocols, and packets in one way or another. Tom has a passion for utilizing data-driven techniques to solve the complex problems faced by modern IT practitioners. When he's not wo...

  • speaker photo
    Moderator - Tina Thorstenson
    Executive Public Sector Strategist, CrowdStrike

    Tina Thorstenson, Public Sector Strategist, sits on the Public Sector Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for Public Sector organizations across Federal, State and Local, Higher Education, and Healthcare. Just prior to joining CrowdStrike, she serv...

  • speaker photo
    Joel Burleson-Davis
    CTO, SecureLink
  • speaker photo
    Jonathan Ehret
    Vice President, Strategy & Risk, RiskRecon, a Mastercard company

    Jonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.

  • speaker photo
    Deborah Watson
    Resident CISO, Proofpoint

    Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah led cybersecurity strategy programs for public and private sector organizations across the Fortune 1000....

  • speaker photo
    Dave Lewis
    Global Advisory CISO, Cisco
  • speaker photo
    Brian Wasko
    Director, Information Security & Compliance, RiskIQ
  • speaker photo
    Terrence Davis
    Solutions Architect, Armis
  • speaker photo
    Keval Shah
    Sr. Sales Engineer, Gigamon

    With over 12 years of technical consulting and solution engineering experience in the field of Enterprise Networking & Security, Keval has enjoyed architecting and transforming businesses. Prior to Gigamon, Keval spent a decade at Cisco. He holds a Masters in Science, Electrical Engineering, from University of Southern California and a Master...

  • speaker photo
    Maria Thompson
    Chief Risk Officer, State of North Carolina
  • speaker photo
    Deborah Blyth
    CISO, State of Colorado
  • speaker photo
    Vinod Brahmapuram
    CISO, State of Washington
  • speaker photo
    Sowmya Karmali
    Director, Product Management, CrowdStrike

    Sowmya Karmali is a Director of Product Management at CrowdStrike and is responsible for Falcon Horizon (CSPM) and Falcon Discover for Cloud. She has over 20 years of product development and management experience covering cloud, data, and IoT, and has worked in startups and large organizations. Prior to CrowdStrike, Sowmya held product leader...

  • speaker photo
    Spencer Parker
    Sr. Director, Product Management, CrowdStrike

    With over 20 years of product management experience at Cisco, Websense, and most recently Sophos before joining CrowdStrike in 2017, Spencer has been instrumental in leading the Intel/Falcon X and Mobile solutions. Spencer holds a B.S. in Molecular Biology from the University of Portsmouth.

  • speaker photo
    Naeem Babri
    President, ISSA KC Chapter; Security Risk Manager, T-Mobile
  • speaker photo
    Michael Rasmussen
    Director, ISSA International

    Michael Rasmussen is an internationally recognized pundit on governance, risk management, and compliance (GRC). With 27+ years of experience, he helps organizations improve risk and compliance processes, design and implement GRC architecture, and select technologies that are effective, efficient, and agile. As a sought-after keynote speaker, ...

  • speaker photo
    Justin Fier
    Director for Cyber Intelligence and Analysis, Darktrace
  • speaker photo
    Vito Ferrante
    Presales Engineer, Arctic Wolf
  • speaker photo
    Igor Sorkin
    Sr. Solutions Engineer, Okta

    Igor is a 25-year Kansas City IT professional with background across Telecom, Fin-Tech, and Security Technology companies focusing on Software Development, Enterprise Architecture, Security, and Identity and Access Management. A member of Okta's Enterprise Solutions team since 2019, Igor has been helping companies in the Central region to vis...

  • speaker photo
    Rich Guth
    CMO, CloudPassage

    Rich has built a 25-year career in Silicon Valley bringing new B2B software technologies to market including Big Data, Analytics, Business Intelligence, Java development tools, interactive development environments. and web application servers. He has held sales, product management, product marketing, solutions marketing, partner marketing, GM...

  • speaker photo
    Bob Gilbert
    Chief Evangelist, Netskope
  • speaker photo
    Mike Asaro
    Sr. Named Account Manager, Proofpoint

    Mike Asaro is an Insider Threat Management and DLP Specialist at Proofpoint. Before joining Proofpoint earlier this year, he spent almost 10 years with an industry leading traditional DLP vendor. Throughout his career in cybersecurity, he’s managed and supported many organizations in the Southwest region across multiple verticals. As a San Di...

  • speaker photo
    Damian Chung
    Business Information Security Officer, Netskope
  • speaker photo
    Prakash Nagpal
    VP of Marketing, Appaegis

    Prakash Nagpal is VP of Marketing at Appaegis, where he is responsible for bringing the next generation of Zero Trust Secure Application Access solutions to market. His mission is to help customers realize the vision of securing applications and data without compromising user experience, with a Zero Trust application centric approach to secur...

  • speaker photo
    Joel Hollenbeck
    Regional Director, Security Engineering, Check Point Evangelist, Check Point Software Technologies

    Joel Hollenbeck is a Cyber Security Visionary with the Office of the CTO at Check Point Software Technologies Inc., the worldwide leader in securing the internet. His background includes over 20 years of experience deploying application protection and network-based security. Joel has been securing networks and systems since 1994, including de...

  • speaker photo
    Steve Velazquez, CISSP, CISM
    Sr. Solutions Engineer, Okta

    Steve is a Sr. Solutions Engineer at Okta helping enterprise customers with their identity and access management needs. In his previous life, Steve has served as a CISO / VP of Information Security, Data Center Manager, and held various Security, Windows, and Network Engineering roles.

  • speaker photo
    Donovan Stevens
    Solutions Engineer, SpyCloud

    Donovan is a Solutions Engineer at SpyCloud and has been in the tech industry since the mid nineties. He has worked in various industries and for companies ranging from start-ups to those listed in the Fortune 50. His career has taken him all over the world, including a four-year stint in South-Africa where he worked for the South-African gov...

  • speaker photo
    Brian Linder
    Emerging Threats Cybersecurity Evangelist, Office of the CTO, Check Point Software Technologies

    Brian Linder is an Emerging Threats Expert and Evangelist in Check Point’s Office of the CTO, specializing in the Modern Secured Workforce. Brian has appeared multiple times on CNBC, FOX, ABC, NBC, CBS, and NPR Radio, and hosts Check Point’s CoffeeTalk Podcast and Weaponizers Underground, and has teamed on keynote CyberTalks at Check Point’s ...

  • speaker photo
    Michael McGinnis
    Sr. Sales Engineer, LogRhythm

    A Senior Sales Engineer for LogRhythm, Michael McGinnis has worked in IT Security for over 15 years, specializing in SIEM technology for the past 10. Michael’s experience began as a Security Architect for the largest hospital network in the Midwest where he developed and matured a security posture that is the framework used by many hospital s...

  • speaker photo
    Kristen Cooper
    Director of Product Marketing, Siemplify

    Product marketing specialist with over 15 years of experience at emerging and growing cybersecurity and SaaS companies. Currently heading up product marketing at Siemplify. SecOps solution specialist. Remote work advocate.

  • speaker photo
    Tim Chang
    VP, Global Sales Engineering, Imperva
  • speaker photo
    Brad Tompkins
    Sales Engineer, LogRhythm
  • speaker photo
    Matthew Norwood
    Solutions Engineer, Bitglass, Inc.
  • speaker photo
    Timothy Lee
    CISO, City of Los Angeles, Information Technology Agency
  • speaker photo
    Pedro Vazquez
    Director of Cybersecurity, Waddell & Reed

    As the Director of Cyber Security for Waddell & Reed, Pedro is tasked with leading IR, SECOPS, Vulnerability Management, Security Automation, and IAM. Pedro has previously provided security services for the DoD, IRS, DST, and SS&C.

  • speaker photo
    Jay Bivens
    Sr. Systems Engineer - GA, Gigamon

    Jay Bivens started his technology career working in IT stationed aboard the USS WASP (LHD-1) back in 1993. With a background expertise in email security and Advanced Threat Protection, his career spans several areas including Cloud Access Security Brokers, Web Application Firewalls, and Application Delivery Controllers. Jay has earned GIAC Ce...

  • speaker photo
    David Gold
    Sr. Director, Sales Engineering, SentinelOne
  • speaker photo
    John Weiler
    Chairman of the Board, CMMC Center of Excellence

    John Weiler is currently the CEO and CIO of a congressionally charted IT "do tank" called IT-AAC. He has forged partnerships with two dozen leading non-profits and federal agencies committed to the Digital Transformation of the federal IT sector.

    He has 40 years of IT Management, Solution Engineering, and Architecture experiences, cove...

  • speaker photo
    Vladimir Svidesskis
    Director, Head of Security, Compliance and Risk, Vaco
  • speaker photo
    Ray Griffin
    Director and Head of Information Security, Cox Media Group
  • speaker photo
    Michelle Stewart
    CISO, Safe-Guard Products
  • speaker photo
    Ryan Aleman
    Director, Solution Architect , Armis

    Ryan Aleman is a Director of Solutions Architect at Armis. In this role, Ryan is at the forefront of the developing landscape of unagentable devices. With an extensive background in security and technical environment management, Ryan has worked extensively to find passive, agentless security solutions in the medical, industrial, and IoT space...

  • speaker photo
    Kevin Santarina
    Sr. Presales Systems Engineer, Arctic Wolf Networks
  • speaker photo
    Tony Lee
    VP, Global Services Technical Operations, BlackBerry
  • speaker photo
    Jason LeDuc
    Director, Risk Management Services, AccessIT Group
  • speaker photo
    Paul Kitor
    Application Security Solution Architect, Contrast Security
  • speaker photo
    John Swensson
    Enterprise Customer Success Manager, CloudPassage

    John Swensson is the Customer Success Manager at CloudPassage and is responsible for all customer support initiatives. John’s information security career spans two decades and includes a broad number of business environments. John and the CloudPassage teams have worked together creating groundbreaking security solutions across a range of indu...

  • speaker photo
    Harrison Parker
    Solutions Architect, Siemplify

    Harrison holds a Bachelor's in Computer Science from Harvard University.

  • speaker photo
    Chris Pin
    VP, Security and Privacy, PKWARE

    Chris Pin serves as PKWARE’s VP, Security and Privacy. In this role, Chris drives value and awareness for all PKWARE customers regarding the various challenges that both privacy and security regulations bring to the data-driven world. He works closely with all customers and potential customers to help them better understand how PKWARE solutio...

  • speaker photo
    Jose Barajas
    Technical Director of NA, Sales Engineering, AttackIQ

    Jose Barajas is Technical Director, NA Sales Engineering AttackIQ. He has over a decade of experience as a security researcher reverse-engineering malware and developing security controls and analytics. At AttackIQ, he now focuses on improving security control efficacy through attacker behavior emulation and establishing continuous security v...

  • speaker photo
    Christopher A. Hart
    Former Chairman, National Transportation Safety Board; Founder, Hart Solutions LLP

    Christopher A. Hart is the founder of Hart Solutions LLP, which specializes in improving safety in a variety of contexts, including the safety of automation in motor vehicles, workplace safety, and process safety in potentially hazardous industries.

    Mr. Hart is also Chairman of the Washington Metrorail Safety Commission, a three-jurisd...

  • speaker photo
    Bruno Almeida
    Cloud Overlay Sales Engineer, Gigamon

    Bruno Almeida is a Sales Engineer at Gigamon, where he partners with customers to help them ensure continuous security and monitoring of cloud and data center services during their digital transformation journeys. He has over a decade of experience in the IT infrastructure space. Before joining Gigamon, Bruno worked for several firms in the m...

  • speaker photo
    Jay Venkatraj
    Sr. Solutions Engineer, Okta
  • speaker photo
    Crane Hassold
    Sr. Director, Threat Research, Agari
  • speaker photo
    Moderator: Larry Chinski
    Vice President, Global IAM Strategy, One Identity
  • speaker photo
    Todd Bearman
    VP & CISO, Global Infrastructure and Security Solutions, TE Connectivity
  • speaker photo
    Nick Falcone
    CISO, University of Pennsylvania
  • speaker photo
    Mariana Pereira
    Director, Email Security Products, Darktrace

    Mariana is the Director of Email Security Products at Darktrace, with a primary focus on the capabilities of AI cyber defenses against email-borne attacks. Mariana works closely with the development, analyst, and marketing teams to advise technical and non-technical audiences on how best to augment cyber resilience within the email domain, an...

  • speaker photo
    Chris Christensen
    Sr. Business Consultant, Cybersecurity, Honeywell Building Solutions

    Chris Christensen is the Cybersecurity Business Consultant for Honeywell Building Solutions (Americas) and specializes in securing Operational Technology (OT) and Industrial Control Systems (ICS) Chris passionately believes that cybersecurity is everyone's shared responsibility and through awareness, education, accountability and positive rei...

  • speaker photo
    Alex Kirk
    Global Principal Engineer, Corelight

    Alex Kirk is an open source security veteran, with a combined 17 years at Sourcefire, Cisco, Tenable, and now Corelight, where he serves as Global Principal for Suricata. Formerly a malware zookeeper and IDS signature writer, today he spends his time helping SOC analysts and advising on security policy for government agencies, universities, a...

  • speaker photo
    Prashanth Ram
    Solutions Architect, Okta
  • speaker photo
    Stephen Gates
    Security Evangelist & Sr. Solution Specialist, Checkmarx Inc.

    Stephen Gates brings more than 15 years of information security experience to his role as Security Evangelist and Senior Solution Specialist at Checkmarx. He is an SME with an extensive hands-on background in security and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and informa...

  • speaker photo
    Tommy Todd
    Vice President of Security, Code42

    Tommy Todd is Vice President of Security at Code42 with over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, Tommy served in security roles at Symantec, Ionic Security, and Optiv as well as many other firms. Throughout his career, he has acted as a leader, mentor, engine...

  • speaker photo
    C. Michael Tracy
    Sr. Solutions Engineer, SpyCloud

    An experienced security architect, specializing in Identity Governance, Access Management, and Multi-Factor Authentication, C. Michael Tracy has over 20 years of diverse technology experience with roles at Microsoft, Wells Fargo Bank, HID Global, and DigitalPersona. At SpyCloud, C. Michael helps clients safeguard the identities of their emplo...

  • speaker photo
    Scott Shackelford
    Cybersecurity Program Chair, Indiana University

    Professor Scott J. Shackelford serves on the faculty of Indiana University where he is Cybersecurity Program Chair along with being the Executive Director of the Ostrom Workshop. He is also an Affiliated Scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Soci...

  • speaker photo
    Tina Meeker
    Sr. Director, Information Security, Sleep Number

    Tina is currently the Sr. Director of Information Security at Sleep Number Corporation and has held executive cybersecurity leadership positions at Best Buy, Shutterfly, and Target Corporation. Tina holds a B.A. in Organizational Behavior from St. Scholastica and an MBA from Augsburg University. Tina also maintains active CISSP and CIPP/US ce...

  • speaker photo
    Theodore Peterson
    Director, Information Security, Datasite

    Theodore Peterson, CISSP, has over 30 years of IT and Information Security experience. He has a BA from the University of Minnesota and an MBA from Augsburg College. He currently is the Director Information Security for Datasite.

  • speaker photo
    Joseph Carson
    Chief Security Scientist & Advisory CISO, Thycotic

    Joseph Carson has more than 25 years of experience in enterprise security. He is an ethical hacker, an InfoSec award winner, and author of "Privileged Account Management for Dummies" and "Least Privilege Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s a cybersecurit...

  • speaker photo
    Dave Armlin
    VP, Solution Architecture, ChaosSearch
  • speaker photo
    Piyali Das
    Sr. Director, Information Security Risk Management, The College Board

    Piyali Das has a proven 16-year track record of leading Information Security and Information Technology enterprise-wide initiatives. This includes success in risk-based prioritization of security initiatives and the resolution of complex issues cost effectively. She has also directed complex cross-functional projects across the enterprise res...

  • speaker photo
    Augusto Barros
    VP of Solutions, Securonix
  • speaker photo
    David Swift
    Sr. Cybersecurity Solutions Architect, Securonix
  • speaker photo
    Todd Maillet
    Sr. Presales Systems Engineer, Arctic Wolf Networks
  • speaker photo
    Brian Coulson
    Principal Threat Research Engineer, LogRhythm

    As Principal Threat Research Engineer in LogRhythm Labs, Brian works to keep abreast of current cyberthreats and news, develop threat detection and response content, and demonstrate how we detect and respond to threats. In this role, he regularly engages with the LogRhythm Community and offers advice and solutions to remediate common security...

  • speaker photo
    Lynne Fistori
    Field & Channel Marketing Manager, Palo Alto Networks
  • speaker photo
    Sajed Naseem
    CISO, New Jersey Courts

    Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters...

  • speaker photo
    Chandler Howell
    Director of Engineering Services, Nexum, Inc.
  • speaker photo
    Erich Kron
    Security Awareness Advocate, KnowBe4

    Erich Kron is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical i...

  • speaker photo
    Mike Stacy
    Sr. Director, Enterprise Security Strategy, Proofpoint

    Mike works with customers and oversees technical strategy for areas which include cloud security, advanced email defense, SOAR, browsing security, and SDP. Prior to joining Proofpoint, Mike held numerous technical leadership and product strategy roles across a variety of solutions.

  • speaker photo
    Chris Poulin
    Director, Technology & Strategy / Deputy CTO, BitSight

    Chris is Director of Technology & Strategy, as well as the Deputy CTO, at BitSight Technologies, guiding enterprises in assessing risk metrics and managing third-party relationships. He's been in cybersecurity for over 35 years, in both technical roles as a developer for the DoD intelligence community, and in executive positions, such as CSO ...

  • speaker photo
    Terry Ray
    SVP, Strategy and Imperva Fellow, Imperva

    Terry Ray is the SVP and Imperva Fellow for Imperva Inc. As a technology fellow, Terry supports all of Imperva’s business functions with his years of industry experience and expertise. Previously he served as Chief Technology Officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well ...

  • speaker photo
    Sudeep Venkatesh
    Chief Product Officer, Egress Software Technologies Ltd

    Sudeep Venkatesh is a noted expert on data protection, bringing two decades of industry and technology experience in this area. His expertise spans the protection of data in both structured and unstructured data ecosystems, with an emphasis on solving real-world business problems through encryption, authentication and key management. He has a...

  • speaker photo
    Allyn Crowe
    Sr. Security Engineer, Nexum, Inc
  • speaker photo
    Jayson Salazar
    Sr. Security Automation Engineer, GitLab Inc.

    Former software engineer and penetration tester, nowadays Sr. Security Automation Engineer at GitLab.

  • speaker photo
    George J. Smith
    Sr. Security Consultant, Gigamon

    George has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down ...

  • speaker photo
    Meera Rao
    Sr. Director, Product Management, Synopsys

    Ms. Meera Rao is a Senior Director of Product Management, focusing on DevOps solutions at Synopsys, Inc. Ms. Meera has over 20 years of experience in software development organizations in a variety of roles including Architect, Lead Developer, and Project Manager, and Security Architect. Ms. Meera has been working as a trusted adviser to Fort...

  • speaker photo
    Brendan Miles
    Sr. Sales Engineer - New England & Upstate NY, SentinelOne
  • speaker photo
    Brad Thompson
    Regional Sales Manager, SentinelOne
  • speaker photo
    Morgan Wright
    Chief Security Advisor, SentinelOne

    Morgan is an internationally recognized expert on cybersecurity strategy and cyberterrorism. As Chief Security Advisor for SentinelOne, Morgan brings his experience as a seasoned moderator, technology analyst, and former law enforcement advisor. Morgan is a Senior Fellow at The Center for Digital Government, and the chief technology analyst f...

  • speaker photo
    Gary Buonacorsi
    SLED CTO & Chief IT Architect, Tanium
  • speaker photo
    Belinda Enoma, CIPP/US
    Founder, Activate & Implement LLC

    Belinda Enoma is a privacy and cybersecurity consultant with a legal and technology background. She offers virtual privacy and cybersecurity services including risk mitigation solutions and building privacy programs from scratch. She is a writer, corporate trainer, lifestyle strategist, mentor, and coach to women in the cybersecurity and data...

  • speaker photo
    Roger Grimes
    Data-Driven Defense Evangelist, KnowBe4

    Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bach...

  • speaker photo
    Nimmy Reichenberg
    CMO, Siemplify

    Nimmy Reichenberg oversees strategy and marketing for Siemplify, the leading independent provider of Security Orchestration, Automation, and Response (SOAR). A cybersecurity industry veteran, Nimmy has more than 15 years of experience helping enterprises around the world tackle their security challenges. Nimmy started his careers as a securit...

  • speaker photo
    Riley Bruce
    Security Community Evangelist, Manager, Code42

    Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with...

  • speaker photo
    Justin Wynn
    Sr. Security Consultant, Coalfire

    As a Senior Security Consultant, Justin Wynn is responsible for actively compromising and reporting on virtual environments typically encountered at Fortune 500 companies. Justin performs wireless, physical, red team and social engineering engagements. Justin also conducts research to include the production of open-source models for printing/...

  • speaker photo
    Gary DeMercurio
    Directing, Center of Excellence for Red Team, Social Engineering, and Physical Penetration Testing, Coalfire

    Gary DeMercurio runs one of the largest groups in Coalfire Labs as a Director, where he leads Coalfire’s “Center of Excellence” for Red Teaming, Social Engineering and Physical Penetration. At Coalfire, Gary manages day-to-day business involved with FedRAMP, PCI, HIPPA, and penetration testing, while helping to spearhead the physical and soci...

  • speaker photo
    Matt Smith
    Director of Solutions Engineering, BeyondTrust
  • speaker photo
    Amber Vanderburg
    Founder, The Pathwayz Group

    Amber Vanderburg is a multi award winning international businessperson, keynote speaker, and founder of The Pathwayz Group. In 2016, she left her job in corporate HR to become the only female, only American, and only blonde Academy elite football coach for the Adidas Gameday Academy/Paris Saint Germain Academy in Bangalore, India. She worked ...

  • speaker photo
    Brian Vecci
    Field CTO, Varonis

    As Field CTO at Varonis, Brian supports a wide range of security and technology initiatives by helping Varonis’ customers and partner get the most out of the company’s products. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecuri...

  • speaker photo
    Dave Presuhn
    Sr. Security Engineer, Boston Scientific

    Dave has been working in IT since the last millennium. In his current role, he manages the device management system for medical devices. He has worked primarily in healthcare throughout his IT career.

  • speaker photo
    Anthony Baer
    Solution Architect, Sonatype
  • speaker photo
    Sam Gillespie
    Offering Manager, OneTrust DataGovernance, OneTrust
  • speaker photo
    Keith Buswell
    Sr. Sales Engineer, Exabeam
  • speaker photo
    Brian Anderson
    Director of Technology, Office of the CTO, Imperva

    Brian Anderson has over 16 years' experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactiona...

  • speaker photo
    VJ Viswanathan
    Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory & strategic consulting firm delivering solutions to public and private sectors. He also serves as...

  • speaker photo
    Mark Sangster
    Vice President and Industry Security Strategist, eSentire

    Mark Sangster is the author of "NO SAFE HARBOR: The Inside Truth About Cybercrime and How to Protect Your Business." He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference, and author on various subjects related to cybersecurity. His thought provoking work and per...

  • speaker photo
    Jason Georgi
    Global Field CTO, Prisma Access, Palo Alto Networks

    Jason is an accomplished technology executive with over 25 years of experience driving innovation and transformation initiatives across global organizations. Jason collaborates with CIOs, CTOs, and other technology leaders on strategies aimed at enabling business outcomes.

    Jason is currently the Global Field Chief Technology Officer fo...

  • speaker photo
    Eric Bodkin
    Director, Endpoint Recovery Services, CrowdStrike

    Eric Bodkin leads the delivery of Endpoint Recovery Services for CrowdStrike. Based out of the greater Denver area, Eric leads service engagements focused on the rapid recovery and remediation of endpoints in response to a cyber incident. Eric has more than 15 years of experience in incident response, forensic investigation, cybersecurity ope...

  • speaker photo
    Jonathan Echavarria
    Enterprise Architect, ReliaQuest

    Jonathan Echavarria is an Enterprise Architect at ReliaQuest that has spent his career building and breaking a variety of environments. In his current role, Echavarria leverages this experience to orchestrate business strategy alignment with technological enablement. During his time at ReliaQuest, Jonathan has held various positions with resp...

  • speaker photo
    Chris Pittman
    Senior Manager, Sales Engineering, BlackBerry

    Chris Pittman has worked in enterprise information technology since 1993 and has specialized in cyber security for the last 14 years. He worked in security and controls and incident response for the Ford Motor Company before moving to the security vendor space in 2008. As a sales engineer at BlackBerry Cylance, he provides technical and secur...

  • speaker photo
    Rori Perkins
    Senior Manager, InfoSec Awareness and Analytics, Columbia Sportswear

    Rori is an expert in organizational change management with a focus on security awareness and driving human behavior.

  • speaker photo
    Lonnie Benavides
    Head of Infrastructure and Application Security, OneLogin

    Lonnie Benavides is an accomplished cybersecurity leader with more than 20 years' industry experience, and is currently the Head of Infrastructure and Application Security at OneLogin. Lonnie began his career as a communications encryption specialist in the U.S. Air Force, and went on to conclude his military service as a Technical Lead of th...

  • speaker photo
    Alex Sorokunov
    Sr. Presales System Engineer, Arctic Wolf Networks
  • speaker photo
    Brennan O'Brien
    Director, Information Security, Risk & Compliance, Columbia Sportswear

    Brennan is the head of Information Security for Columbia Sportswear Company and a 20-year veteran of cybersecurity in verticals including apparel, logistics, healthcare, and financial services.

  • speaker photo
    Paul Rich
    Executive Director, Data Management & Protection, JPMorgan Chase

    Paul Rich joined JPMorgan Chase & Co. in 2019 as Executive Director, Data Management & Protection, with the mission of tackling the management of all unstructured data within the company. Paul is passionate about data security, privacy, principle-based design and goal-setting, and has over thirty years of technology experience. During the mor...

  • speaker photo
    Mike DeNapoli
    Senior Solution Architect, Cymulate

    Mike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners k...

  • speaker photo
    Nigel Thompson
    Vice President, Solutions Marketing, BlackBerry

    Nigel Thompson is responsible for the product position and messaging of BlackBerry® Spark. He is a regular thought leadership speaker, experienced on topics impacting governments and businesses worldwide, including cybersecurity trends, workflow reformation and harnessing IoT to accelerate digital transformation.

    As BlackBerry has tr...

  • speaker photo
    Jeremiah Sahlberg
    Managing Director - Federal, Third Party Risk, Tevora

    Jeremiah Sahlberg has more than 20 years of security experience. Sahlberg is an executive security consultant and advises clients on establishing security programs and compliance management. He holds CISSP, CISM, PCI QSA and HITRUST certifications.

    Previously, Sahlberg held the Senior Director of Protect Operations at NBCUniversal a...

  • speaker photo
    David Hawkins
    Director, Consulting Engineer, BitSight

    David Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.

    On the Info...

  • speaker photo
    Bryan Magoffin
    Sr. Security Architect, Check Point Software Technologies
  • speaker photo
    Sherry Callahan
    CISO, Dairy Farmers of America
  • speaker photo
    Brian Robison
    Chief Evangelist & Sr. Director, Product Marketing, BlackBerry

    Brian Robison is the Senior Director, Product Marketing and Chief Evangelist at BlackBerry (formerly Cylance), where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after an attack. With over 20 years' of cybersecurity experience, Robison is a regular sp...

  • speaker photo
    Zuri Cortez
    Principal Solutions Engineer at Alert Logic, Alert Logic
  • speaker photo
    Israel Barak
    CISO, Cybereason
  • speaker photo
    Kevin Bocek
    VP, Security Strategy & Threat Intelligence, Venafi

    Kevin Bocek is a leading subject matter expert in machine identity protection. With more than 16 years in the IT security industry, Kevin has been featured in The Wall Street Journal, The New York Times and The Washington Post, among many others. Before joining Venafi in 2012, Kevin spent almost two decades working for several leading IT secu...

  • speaker photo
    Tom Watson
    Channel Chief Advisor, NinjaRMM
  • speaker photo
    Renee Tarun
    Deputy CISO, Fortinet
  • speaker photo
    Peter Klimek
    Director of Technology - Office of the CTO, Imperva
  • speaker photo
    Katrina Watts
    Cyber Security Threat Analyst, Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC)

    Katrina Watts works as a Threat Analyst with the ONG-ISAC and focuses on curating and sharing qualitative intelligence related to cyber threats to the oil and natural gas supply chain. Prior to joining the ONG-ISAC, Katrina worked as an Incident Response Analyst for a mid-size corporation and separately as a contractor. Additionally, Katrina ...

  • speaker photo
    Travis Herrmann
    Information Security Advisor, Devon Energy Corporation

    Travis has been with Devon Energy for 20 years, being a pioneering member of the Information Security team. Currently, Travis supports the Incident Response, Hunt, and Intelligence functions at Devon, serves on the ONG-ISAC Information Sharing committee, and holds multiple industry security certifications.

  • speaker photo
    Dr. Shaneé Dawkins
    Computer Scientist, Visualization and Usability Group, National Institute of Standards and Technology (NIST)

    Dr. Shaneé Dawkins is a Computer Scientist in the Visualization and Usability Group at the National Institute of Standards and Technology (NIST). She performs research focusing on human centered design and leads the NIST Phish Scale research effort. Shaneé received her M.S. and Ph.D. in Computer Science at Auburn University, and B.S. in Compu...

  • speaker photo
    Ansh Patnaik
    Head of Product Marketing, Google Cloud Security

    Ansh Patnaik, former Chief Product Officer for Chronicle, is now the head of product marketing for Google Cloud Security. Previously, he was VP of Product Management at Oracle where he defined and launched their Security Analytics Cloud service. Over the last 20 years, Ansh has held product management, marketing and sales engineering roles at...

  • speaker photo
    Svetla Yankova
    Head of Customer Experience Engineering, Chronicle
  • speaker photo
    Adam Gates
    Sr. Sales Engineer, Malwarebytes

    With over 20 years of experience in technology, Adam Gates serves as a senior technical member of Malwarebytes Field Sales Team providing support for customers in North America. Prior to Malwarebytes, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, and Mimecast. Adam lives in Dalla...

  • speaker photo
    Mitch Spaulding
    Solutions Engineer, Okta
  • speaker photo
    Lisa Wallace
    Sales Engineer, FireMon
  • speaker photo
    Myriah V. Jaworski, Esq.
    Privacy Litigation Practice Group, Beckage Law

    Myriah leads Beckage’s Privacy Litigation Practice Group where she represents clients in data breach actions, technology vendor disputes, and the defense of consumer class actions and related regulatory investigations. Recognized as a Super Lawyers Rising Star – Litigation om 2019 and 2020, Myriah practices in many jurisdictions throughout th...

  • speaker photo
    Stuart Wagner
    Sr. Director, IT Security & Compliance at Enterprise Products, Chairman, ONG-ISAC

    Stuart served as a Board Member of ONG-ISAC for over five years and became Chairman in June 2018. He has attended the FBI CISO Academy, has served as President of the award-winning South Texas Chapter of the Information Systems Security Association (ISSA), and is a member of ISACA and InfraGard. Stuart has developed and led information securi...

  • speaker photo
    Angela Haun
    Executive Director, ONG-ISAC

    Angela Haun became the Executive Director of the Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC) in September 2018. Ms. Haun joined the ISAC after a 20-year career as a Special Agent with the FBI. She brought extensive experience in cybersecurity and protecting critical assets from her work at the FBI, along with her le...

  • speaker photo
    Brad Beutlich
    Vice President, Western and LATAM Sales, Entrust

    Brad Beutlich is an information security professional who has worked with numerous U.S. based companies over the past 20 years, providing security solutions ranging from end-point to data security. The last 13 years, he has worked for Entrust providing security solutions that protect customer data, financial transactions, and IoT device manuf...

  • speaker photo
    Matt Hubbard
    Sr. Technical Product Manager, Armis
  • speaker photo
    Karen Lancon
    Business Information Security Manager, Wood.
  • speaker photo
    Sivan Tehila
    Director of Solution Architecture, Perimeter 81

    Sivan Tehila is the Director of Solution Architecture at Perimeter 81, a leading Secure Access Service Edge (SASE) provider, and a cybersecurity expert with over 14 years of industry experience. Sivan served in the IDF as an Intelligence Officer and then in various field positions, including Information Security Officer, CISO of the Research ...

  • speaker photo
    Chase Massar
    Professional Sales Engineer, Alert Logic
  • speaker photo
    Ryan Archer
    Sr. Sales Engineer, Arctic Wolf Networks
  • speaker photo
    Christopher Hass
    Director of Information Security and Research, Automox

    Chris Hass is an extremely driven and proven information security professional with extensive experience in Malware Reverse Engineering, Threat Intelligence, and Offensive Security Operations. In his current role, Chris serves as Director of Information Security and Research at Automox. In addition to being a former cybersecurity analyst for ...

  • speaker photo
    Julia Voo
    Cyber Fellow, Harvard Kennedy School, Belfer Center for Science and International Affairs

    Julia Voo is a Cyber Fellow and leads the team behind Belfer's National Cyber Power Index. She was formerly the Research Director for the China Cyber Policy Initiative.

    Her areas of research concern geotech strategy including the Digital Silk Road, industrial policy, and technical standards for strategic technologies.

    Voo has re...

  • speaker photo
    Tony Anscombe
    Chief Security Evangelist, ESET

    Tony Anscombe is Global Security Evangelist and Industry Partnerships Ambassador for EST, where he serves to increase ESET’s public awareness initiatives and strengthen relationships with new and existing partners.

    Anscombe joined ESET from Avast (which acquired his former employer AVG) where he held the title of Senior Security Evange...

  • speaker photo
    Tom Utley
    Sr. Presales Systems Engineer, Arctic Wolf

    Tom Utley is a senior presales systems engineer with Arctic Wolf Networks based out of the Charlotte area. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer and solution archite...

  • speaker photo
    Allan Liska
    Sr. Security Architect, Recorded Future

    Allan Liska is a senior security architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security pos...

  • speaker photo
    Michael Doyle
    Principal Consultant, Secure Development Practice Lead, Synopsys
  • speaker photo
    Dwayne Dreakford
    Solutions Architect, Sonatype
  • speaker photo
    Richard Melick
    Sr. Technical Product Marketing Manager, Automox

    Richard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.

  • speaker photo
    Etay Maor
    Chief Security Officer, IntSights

    Etay Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in...

  • speaker photo
    Gina Scinta
    Sr. Solutions Architect, Thales

    Gina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the IT profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data usin...

  • speaker photo
    Rick Holland
    CISO and VP of Strategy, Digital Shadows

    Rick has more than 15 years' experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently co-chair ...

  • speaker photo
    Chris Goettl
    Sr. Director, Product Management, Ivanti

    Chris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events...

  • speaker photo
    Lee Psinakis
    Cloud Security Sales Specialist, Check Point Software Technologies

    Lee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.

    Before joining Check Point, Lee held Sales, Management and Business...

  • speaker photo
    Eric Skinner
    VP, Strategy, Trend Micro

    Eric Skinner is VP of Market Strategy at Trend Micro, helping shape Trend’s solution offerings, growth plans and go-to-market approach. Previously at Trend Micro, Eric has been responsible for global product marketing. Prior to Trend Micro, Eric held senior management positions in a health care mobile startup and at digital identity solutions...

  • speaker photo
    Tim O'Connor
    Manager of Knowledge Services, Cadre Information Security

    Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including PCI-QSA, CISA, CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written...

  • speaker photo
    James Ellis
    Detective First Lieutenant, Commander, Michigan Cyber Command Center (MC3), Michigan State Police

    Detective First Lieutenant Jim Ellis is the commander of the Michigan State Police Cyber Section within the Intelligence Operations Division. He leads a cyber team of 56 MSP members located at 7 offices throughout Michigan. He has oversight over the Michigan Cyber Command Center (MC3), Computer Crimes Unit (CCU), and the Michigan region of th...

  • speaker photo
    Edward Roberts
    Director of Product Marketing, Imperva

    Edward Roberts leads Product Marketing for Imperva Advanced Bot Protection. Prior to Imperva he led marketing at Distil Networks and has over twenty years of experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Softw...

  • speaker photo
    Ran Rosin
    Director, Product Management, Imperva

    Ran Rosin Joined Imperva two years ago and is currently leading the Cloud Data Security solution. Prior to joining Imperva, Ran founded and lead two start-ups in the area of mobile Application and IoT.

  • speaker photo
    Phillip Wylie
    Lead Curriculum Developer, Point3 Federal

    Phillip Wylie is the Lead Curriculum Developer for Point3 Federal, Adjunct Instructor at Dallas College, and The Pwn School Project founder. With over 22 years of experience, he has spent the last eight plus years as a pentester. His passion for mentoring and education inspired him to start teaching and to found The Pwn School Project, a bi-m...

  • speaker photo
    Tod Beardsley
    Director of Research, Rapid7

    Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, ...

  • speaker photo
    Glenn Kapetansky
    Interim CISO, University of Chicago Medical Center; CSO, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...

  • speaker photo
    Thomas Blade
    Presales System Engineer, Arctic Wolf
  • speaker photo
    Ryan Gritt
    Solutions Architect, ReliaQuest
  • speaker photo
    Myla Pilao
    Director, Technology Marketing, Trend Micro
  • speaker photo
    Susan St. Claire
    CxIAST Evangelist and SME, Checkmarx
  • speaker photo
    Eric Wolff
    Sr. Product Marketing Manager, Cloud and App-layer Data Protection, Thales Cloud Security

    Eric Wolff is a Senior Product Marketing Manager for Thales application-layer data protection and solutions for public cloud security. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications, a...

  • speaker photo
    Jonathan Nguyen-Duy
    VP, Global Field CISO Team, Fortinet
  • speaker photo
    Kevin Dillaway
    Cloud Security Architect, Optiv
  • speaker photo
    Sami Laine
    Director, Technology Strategy, Okta
  • speaker photo
    Kelsey Nelson
    Sr. Product Marketing Manager, Okta

    Kelsey Nelson is a Senior Product Marketing Manager at Okta, leading workforce IT and security solutions, including getting beyond the buzzword of "Zero Trust." Prior to joining Okta, she led product and business communications at tech startups varying from enterprise software to edtech to consumer music hardware, and prior to that taught sec...

  • speaker photo
    David Masson
    Director of Enterprise Security, Darktrace

    David Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various u...

  • speaker photo
    Susan Hanson
    Vice President, Human Resources, Provation Medical

    Susan has over 20 years of healthcare experience in Human Resources and Compliance. Susan joined the Provation team in 2017 and brings her experience of building and growing high-performing teams with a dynamic, results-oriented culture and strong leadership. Susan also has experience in healthcare compliance specifically in HIPAA and HITECH ...

  • speaker photo
    Paul Lanzi
    Co-Founder & COO, Remediant

    Paul Lanzi, is the co-founder and COO of Remediant. Remediant is a cybersecurity startup focused on delivering a new approach Privileged Access Management. Paul and his co-founder at Remediant, Tim Keeler, worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At eac...

  • speaker photo
    Mark Spencer
    Regional Sales Manager and Account Executive, AccessIT Group
  • speaker photo
    Adam Waltman
    Sr. Sales Engineer, Malwarebytes

    Adam has over 20 years of experience in technology and serves as a senior technical member of the Malwarebytes field sales organization, providing expertise to customers in the Eastern U.S. Prior to joining Malwarebytes almost 5 years ago, Adam’s travels took him from various operational roles to other pre-sales engineering roles with Symante...

  • speaker photo
    Eddie Doyle
    Global Security Strategist, Check Point Software Technologies

    Edwin Doyle communicates with international leaders in cybersecurity, cyber forensics, and cyber law enforcement, across the world. Taking best practices for threat mitigation from the industry’s finest CISOs and from police and military cyber command, Edwin’s responsibilities include sharing cyber defense tactics with media, government agenc...

  • speaker photo
    Moderator: Tom Brennan
    CIO/CTO, Mandelbaum Salsburg P.C.
  • speaker photo
    Andre Alves
    Cloud Security Architect, Trend Micro

    Andre Alves has been helping companies to achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a certified AWS Solutions Architect and Hybrid Cloud Security trainer.

  • speaker photo
    Nathan Wenzler
    Chief Security Strategist, Tenable, Inc.

    Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing, and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new ...

  • speaker photo
    Martyn Crew
    Director of Product Marketing Management, Gigamon
  • speaker photo
    Gurinder Bhatti
    Sr. Sales Engineer, Okta
  • speaker photo
    Somer Hernandez
    Solutions Architect, ReliaQuest
  • speaker photo
    John Davies
    Sr. Presales Systems Engineer, Arctic Wolf
  • speaker photo
    Dean Gross
    Identity and Security Architect, Insight Cloud + Data Center Transformation
  • speaker photo
    Kazbek Khumush
    Trend Micro
  • speaker photo
    Brian Rossmeisl
    Sr. Security Architect, AccessIT Group
  • speaker photo
    Bob Pacheco
    Principal Risk Management Architect, Eurofins
  • speaker photo
    Joseph Acosta
    Director, Security Operations, Delta Risk
  • speaker photo
    Marc Keating
    Security Evangelist, Arctic Wolf
  • speaker photo
    Richard Schunk
    Major Accounts Systems Engineer, Palo Alto Networks
  • speaker photo
    Mike Lloyd
    CTO, RedSeal Networks

    Dr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-...

  • speaker photo
    James Sheldrake
    Enterprise Sales Engineer, Egress Software Technologies Ltd
  • speaker photo
    Kevin Romero
    Sales Engineer, ReliaQuest
  • speaker photo
    Kevin Kennedy
    Sr. Sales Engineer, Malwarebytes
  • speaker photo
    Nick DeLena
    Principal, IT Risk Assurance & Advisory, DGC (DiCicco, Gulman & Company)
  • speaker photo
    Mark Ostrowski
    Head of Engineering, East US, Check Point Software Technologies
  • speaker photo
    Davitt J. Potter
    Director, MSSP and Channels, Americas, Digital Shadows

    Born and raised in the Black Hills of South Dakota, Davitt has over 25 years of experience in the OEM, VAR & MSSP channels realm. From starting as a field services engineer fresh from school at the South Dakota School of Mines and Technology, and eventually defining and managing IT operations and strategy for numerous companies in a CTO capac...

  • speaker photo
    Michael Lopez
    Director of Cloud Services, AccessIT Group

    Mike Lopez, Director of Cloud Services at AccessIT Group, has a history of designing cloud architecture with a security focused approach for government and fortune 500 clients. He has worked with private and public cloud environments including AWS, Azure, Oracle, and Google Cloud. Mike leads AccessIT Group’s Cloud practice by helping its cust...

  • speaker photo
    Marc Ybarra
    Distinguished Solutions Engineer - North America, Alert Logic
  • speaker photo
    Erika Barber
    Director of Compliance and Privacy, Boston Medical
  • speaker photo
    Gillian Lockwood
    Enterprise Information Security Program Administration and Governance, Partners Healthcare
  • speaker photo
    Brian Carey
    Manager, Advisory Services, Rapid7

    Brian Carey is a Rapid7 Manager of Advisory Consulting, specializing in: Security Program Assessments, Security Program Development, Risk Management, Vulnerability Management Program Development, Security Awareness and Policy Development. Before joining Rapid7 Brian was Information Security Director and interim Security Officer at LafargeHolc...

  • speaker photo
    Adam Winn
    Product Manager, Cisco Umbrella, Cisco

    Adam Winn is the platform product management lead for Cisco Umbrella. He got into cloud security product management in 2013 and never looked back. In 2016, he joined OpenDNS shortly before it was rebranded as Cisco Umbrella. He is a life-long California resident and a fan of live music (and can't wait for it to come back).

  • speaker photo
    Yuk Fai Chan
    Co-Leader, OWASP Toronto Chapter

    Yuk Fai Chan is Co-Leader of the OWASP Toronto chapter, where he actively promotes software security within the Toronto community. Professionally, Yuk Fai is a Co-Founder at Proack Security Inc., a Toronto-based information security consulting firm. He specializes in application security, penetration testing, threat modelling, security incide...

  • speaker photo
    Bobby Modha
    Security Consultant, Security Compass

    Bobby Modha is a Security Consultant with Security Compass. He specializes in security assessments in the application security space including web application, APIs and mobile app penetration testing. In his spare time, Bobby enjoys working on personal projects such as developing scripts and participating in capture-the-flags.

  • speaker photo
    Keyaan Williams
    Founder and Managing Director, CLASS, LLC
  • speaker photo
    Melvin Crum
    Chief Informatics Officer, Centers for Disease Control & Prevention
  • speaker photo
    Jeremy Castleman
    Cloud Security Specialist, Check Point Software Technologies

    Jeremy Castleman is the Cloud Security Specialist supporting the Cloud Team for Check Point Software Technologies. Jeremy brings 15 years of experience in technology sales, marketing, business development and cloud migration services in the partner ecosystem. He has worked in multiple countries around the world, in various markets, and across...

  • speaker photo
    Achint Sehgal
    Global Head of Solutions Engineering, OneTrust

    Achint Sehgal, CIPP/E, CIPM, serves as a Global Head of Solutions Engineering for OneTrust Vendorpedia—a purpose-built software designed to operationalize third-party risk management. In his role, Sehgal advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, fra...

  • speaker photo
    Ernest Dunn
    Regional Partner – Mid Atlantic, GuidePoint Security
  • speaker photo
    Eric Mims
    Director, Enterprise IT Security & CISO, University of Houston
  • speaker photo
    Greg Thompson
    CISO & VP, Manulife
  • speaker photo
    Robert Wong
    Executive Vice-President, Chief Information Officer, Toronto Hydro

    Robert Wong is EVP & CIO at Toronto Hydro, responsible for information technology, operational technology, cyber security, and telecommunications. Robert was also Chief Risk Officer, responsible for corporate enterprise risk management, strategic planning, corporate governance, and business continuity.
    Robert is on the Board of Directo...

  • speaker photo
    Lois Tullo
    Executive in Residence, Global Risk Institute; CFRO/CCO, Novera Capital, Risk Management Faculty, Schulich School of Business, York University
  • speaker photo
    GuidePoint Security
  • speaker photo
    Nick Ritter
    CISO, First Financial Bank

    Nick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost...

  • speaker photo
    Kai Pfiester
    Founder & Chief Security Architect, Black Cipher Security
  • speaker photo
    James Goepel
    Treasurer and Member, Board of Directors, Cybersecurity Maturity Model Certification (CMMC) Accreditation Body

    James Goepel is Treasurer and Member, Board of Directors for the CMMC-AB. He is also an adjunct professor of Cybersecurity at Drexel University and CEO of Fathom Cyber, a trusted agent for senior management and developer of defensible cybersecurity strategies. Jim earned his BSECE from Drexel and his JD and LLM degrees from George Mason Unive...

  • speaker photo
    Edward Ettorre
    Operational Risk Consultant, Wells Fargo

    Ed is an Operational Risk Consultant working within the Technology Information Security group. He has been with Toastmasters International (TMI) since 1997 and has multiple certifications from TMI. Ed is a resourceful, creative, and solution-oriented person who was frequently able to come up with new and innovative approaches to his assigned ...

  • speaker photo
    Devon Campbell
    Digital Forensic Examiner, TransPerfect Legal Solutions

    Devon Campbell is a Digital Forensic Examiner at TransPerfect Legal Solutions in the Forensic Technology and Consulting division. Devon has experience conducting forensic examinations of mobile devices, computers, social media data, cloud-based data, and email data. Prior to joining TransPerfect Legal Solutions, Devon earned her Master's degr...

  • speaker photo
    Christina Griffin
    IT Security and Risk Manager, Chatham Financial

    Cybersecurity professional specializing in risk management and information security. She holds an MBA, a master’s in information technology leadership, and also has a CISSP certification. She has professional experience working in both higher education and finance industries and is currently employed as an IT Risk and Security Manager at Chat...

  • speaker photo
    Tedrick Housh
    Partner, Lathrop GPM LLP

    Tedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the ...

  • speaker photo
    Steve Hengeli
    Attorney at Law, Polsinelli

    With a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technolog...

  • speaker photo
    Nan L. Grube
    Consulting Attorney, PBL Consulting

    Owner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandabl...

  • speaker photo
    Scott Laliberte
    Chapter President, ISSA Delaware Valley Chapter

    Scott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Scott also leads Protiviti’s Emerging Technology practice where he enables clients to leve...

  • speaker photo
    Brice Taylor
    Special Agent, FBI
  • speaker photo
    Jason Patel
    Chief Technology Officer, Ensighten

    As Chief Technology Officer Jason leads the Product and Engineering teams at Ensighten. Being part of Ensighten’s development team over six years ago when the Tag Management Platform was first designed gives him a unique perspective and experience on all our solutions; he has hence been influential in designing and implementing the majority o...

  • speaker photo
    Sunny Notani
    Special Agent, United States Secret Service

    Sunny Notani has worked as a Special Agent for the United States Secret Service for 18 years. SA Notani was initially assigned to the New York Field Office (NYFO) for eight years. During his time in the NYFO, SA Notani specialized in Financial Institution Fraud, Electronic Crimes, Network Intrusions, and Social Engineering. SA Notani was assi...

  • speaker photo
    RJ Sudlow
    IT Advisory Manager, Dixon Hughes Goodman LLP
  • speaker photo
    Steve Magowan
    Director, Data Protection and Resiliency, Royal Bank of Canada

    Steve Magowan is Director of Data Protection with the Royal Bank of Canada. A Veteran of the Canadian Airforce, since retiring Steve has spent the past 20 years engaged in a wide assortment of Risk Focused, Data Protection, Security Architecture & Enterprise Risk Management initiatives.

    Including the remediation of active security...

  • speaker photo
    MJ Couldridge
    Director, Business Development, Canadian Cyber Threat Exchange

    MJ Couldridge is the Director of Business Development for the Canadian Cyber Threat Exchange. The CCTX is Canada’s threat sharing hub for all companies doing business in Canada. It provides analysis and enables collaboration of cyber security insights impacting Canada. Providing both a cross-industry and by-industry context, it serves small, ...

  • speaker photo
    Sabrina Stanich
    Cybersecurity Manager, Darktrace

    Sabrina Stanich is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from financial services to manufacturing, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting an...

  • speaker photo
    Will Mishra
    Cybersecurity Manager, Darktrace

    Will Mishra is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autono...

  • speaker photo
    Taylor Lehmann
    CISO, athenahealth

    Taylor Lehmann is the VP and Chief Information Security Officer at athenahealth, a healthcare information technology organization with headquarters in Watertown, MA and operations around the world. Taylor has been in information security and risk management for over 15 years. He was most recently the CISO at Wellforce, an eastern MA-based, Tu...

  • speaker photo
    Myles Kellerman
    Chief Cybersecurity Analyst, Alpine Security

    Myles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many ...

  • speaker photo
    Lauren Provost
    Professor, Computer Science, Western Governors University

    Dr. Lauren E. Provost is an ethical hacker, author and professor. She directs The Ethical Hackers Cybersecurity organization, a virtual community for educators and industry providing comprehensive planning and risk management updates, network and cloud security knowledge and information on other cybersecurity topics such as general penetratio...

  • speaker photo
    Sam Rastogi
    Product Marketing Director, Illumio

    Sam Rastogi is a veteran of the security industry with 18+ years experience marketing leading security products at Illumio, Palo Alto Networks, Cisco Systems, HP Enterprise, McAfee, Juniper Networks, and Oracle. Sam is a Product Marketing Director at Illumio, where he is responsible for leading go-to-market and marketing activities for zero t...

  • speaker photo
    Leland Dean
    VP, Global Corporate Security, Bank of New York Mellon

    Leland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).

    Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal ...

  • speaker photo
    Nathan Wilcox
    Sr. Security Architect, GuidePoint Security
  • speaker photo
    Patrick Keenan
    Principal Security Engineer, GuidePoint Security

    Splunk Master Flex

  • speaker photo
    Torry Crass
    Agency CISO, N.C. State Board of Elections

    Torry Crass currently serves as the Agency CISO at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.

    Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry was a CI...

  • speaker photo
    Brian Neesby
    CIO, N.C. State Board of Elections

    Brian Neesby is the CIO of the State Board of Elections. Prior to this role, he was the Chief Data Officer. Brian has served as a fact witness, been deposed several times, and executed declarations on behalf of the State Board concerning his knowledge of North Carolina’s Statewide Voter Registration Database. He investigated data discrepanc...

  • speaker photo
    Michael Dickerson
    Director, Mecklenburg County Board of Elections

    Michael Dickerson is currently the Director of Elections for Mecklenburg County and has held this position since 1998.
    Prior to coming to Charlotte, Mr. Dickerson was with the Federal Election Commission as a Deputy Assistant Staff Director. Mr. Dickerson spent 14 years at the Federal Election Commission.

    Currently he is a membe...

  • speaker photo
    Karen Brinson Bell
    Executive Director, N.C. State Board of Elections

    Karen Brinson Bell was appointed executive director of the State Board of Elections on May 13, 2019, and began her tenure on June 1. As the state’s chief elections official, she leads about 70 full-time employees at the state agency, which is charged with administering elections and overseeing the 100 county boards of elections, as well as ca...

  • speaker photo
    Patrick Gannon
    Public Information Officer, N.C. State Board of Elections

    Patrick Gannon has been the public information officer at the State Board of Elections since October 2016, just before the presidential election. He came to the State Board after a 17-year career in journalism, most recently as editor of The Insider State Government News Service and syndicated columnist covering state politics for the Capitol...

  • speaker photo
    Boris Vishnevsky
    Board Member and Technology Strategist, Cloud Security Alliance - Delaware Valley (CSA-DV)

    Boris Vishnevsky, MBA, CISSP, DIA is a board member and advisor of the Cloud Security Alliance- Delaware Valley Chapter, Distinguished IT Architect of the Open Group and is a frequent speaker and presenter, taking part in review panels and advising innovative Cyber Security Companies. Mr. Vishnevsky is a solutions principal advising companie...

  • speaker photo
    Marc Tabago
    Solutions Engineer, Trend Micro

    As a Solutions Engineer, Marc Tabago works with enterprises to solidify and strengthen their digital security policies against malicious threat actors. However, he believes that having a concrete digital security posture starts at the use case level, driven and experienced by its users and not simply read off a PowerPoint slide. Once the dust...

  • speaker photo
    Justin Bourgeois
    Sales Engineer, Mimecast

    Justin Bourgeois is a Solution Engineer at Mimecast. He has a background in implementation project management, IT consulting and has spent his off time programming as a hobby. Justin’s main responsibility is educating people about the ever-evolving threat landscape that not only threatens their infrastructure but also their partners and the g...

  • speaker photo
    Joe Zurba
    CISO, Harvard Medical School

    In his role as the leader of Information Security at Harvard Medical School, Joe Zurba has been responsible for defining and building capabilities to meet the requirements of an extraordinarily diverse community of clinical and research faculty, students, and staff. Joe develops strategy, improves capabilities, and manages risk for all inform...

  • speaker photo
    Michael Anaya
    Supervisory Special Agent, Cyber, FBI (Prior)

    Michael is the Head of Cyber Risk at Expanse (one of Forbes' 25 fastest-growing venture-backed startups likely to reach a $1 billion valuation). He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies' and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent...

  • speaker photo
    Tony Howlett
    CISO, SecureLink

    Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP and GNSA certifications, and a B.B.A in Management Information Systems. Tony is curre...

  • speaker photo
    Ian Woolley
    Chief Revenue Officer, Ensighten

    Ian’s impressive background and management expertise in digital marketing and advertising are fueling his success in driving adoption of Ensighten’s solutions worldwide. Ian started his career at Dun & Bradstreet Europe before working at Interpublic Group’s Draft Digital as Managing Director. After building his own premium publisher business,...

  • speaker photo
    Samara Williams
    Threat Intel Engineer, Cardinal Health

    Samara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about ...

  • speaker photo
    Melisa Ozcan
    Cybersecurity Account Executive, Darktrace

    Melisa Ozcan is a Cyber Security Account Executive at Darktrace, the world’s leading AI company for cyber defense. At Darktrace, Melisa works with leading organizations in a range of industries from private equity to media and entertainment to deploy and operationalize cutting edge technologies. During Melisa’s tenure at Darktrace, the compan...

  • speaker photo
    Kelley Misata
    CEO, Sightline Security

    Dr. Kelley Misata, CEO of Sightline Security, President and Executive Director of OISF (Suricata), and former Director of Communication of The Tor Project - a cyber and information security executive with 15+ years of experience in cyber and information security, marketing, and communications. Expert in bridging the gap between technical and ...

  • speaker photo
    Sergeant Michael Davis
    Cyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center Unit

    Sgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Ho...

  • speaker photo
    Michael Butterfield
    Regional Architect - Mid-Atlantic, Check Point Software Technologies

    Michael Butterfield is Security Architect at Check Point, where he supports 30+ engineering teams responsible for hundreds of customers across the Mid-Atlantic. He is primarily focused on helping enterprises design, consolidate, and integrate security controls into emerging technology platforms. Over an 18-year career in cybersecurity, Michae...

  • speaker photo
    Andrew Hoover
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Andrew Hoover is a Senior Engineer with the CERT Division of Carnegie Mellon University’s Software Engineering Institute. As a member of the Cybersecurity Assurance Team, he performs risk and resilience management work for a variety of organizations, mostly relating to critical infrastructure protection. Andrew has 16 years of experience in i...

  • speaker photo
    Katie Stewart
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Katie Stewart is a senior member of the technical staff within the CERT® Division at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. She has more than 15 years of experience advising clients in engineering, information technology, and telecommunications industries. Katie’s current research int...

  • speaker photo
    Juan Marin
    Sales Engineer Manager, IntSights

    A cybersecurity professional and avid technologist advocate with 10 years of experience in effective cyber-security practices, advanced threat prevention, malware and incident response; Juan has worked with the likes of McAfee/Intel Security and Trend Micro in the past, fulfilling technical sales, advisory and customer success roles, and toda...

  • speaker photo
    John Amaral
    Head of Product, Cloud Security, Cisco

    John Amaral is the Head of Product for Cisco Cloud Security. In this role, he is responsible for product management, planning and strategy for Cisco's leading cloud security offerings including Cisco Umbrella and Cisco Cloudlock. John joined Cisco through the acquisition of Cloudlock, where he was Head of Product; responsible for product deve...

  • speaker photo
    Stacy Harper
    Partner, Spencer Fane LLP

    Stacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and ...

  • speaker photo
    Benjamin Agner
    Sr. Manager, Global Security, Aflac Subsidiary Security
  • speaker photo
    Rick Doten
    CISO, Carolina Complete Health; VP, Information Security, Centene Corp.

    Rick is CISO of Carolina Complete Health, a state healthcare plan for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industrie...

  • speaker photo
    Dr. Atefeh (Atty) Mashatan
    Founder & Director, Cybersecurity Research Lab, Ryerson University

    Dr. Atefeh (Atty) Mashatan is the Founder and Director of the Cybersecurity Research Lab at Ryerson University. SC Magazine recognized her as one of top five Women of Influence in Security globally in 2019. She joined the School of Information Technology Management of Ryerson University in 2016 focusing on Information Systems Security, Crypto...

  • speaker photo
    Rob Dalzell
    BISO, Bank of America

    Rob Dalzell is a cybersecurity professional with over 30 years of IT experience and 10 years of cybersecurity experience. He has thrived in the following cybersecurity based arenas: Third Party Defense, Identity and Access management, Responsible Vulnerability Disclosure, email encryption and end user security awareness. He is a member of the...

  • speaker photo
    James Keegan
    Director, Information Security, Essent Guaranty, Inc.
  • speaker photo
    Tammy Klotz
    CISO, Covanta

    Prior to Covanta, Tammy was responsible for the cybersecurity program at Versum Materials, which included Information Risk Management, Plant Cybersecurity, as well as IT Security, Risk & Compliance activities. She was with Versum since their start-up in October 2016 and was responsible for standing up all security services required for the ne...

  • speaker photo
    ACP Local Chapter
  • speaker photo
    Pete Murphy
    IT Advisory Executive, CareSource

    Pete Murphy is a well-established leader, builder and collaborator with high standards for personal integrity and a bias for action. He has demonstrated senior level leadership experience building, growing, improving and operating business systems and processes as a CIO, CTO, CISO, Risk Leader and Data and Analytics executive.
    He speci...

  • speaker photo
    Joshua Cloud
    Director of Information Security, NFI

    Joshua Cloud is currently serving as the director of information security for NFI. He has over 20 years of infrastructure and security leadership experience spanning professional services, manufacturing, retail, and logistics industries in countries all over the world. Cloud is a transformational security leader with a business focus who evan...

  • speaker photo
    Paul Ihme
    Co-Founder & President of Consulting Services, Soteria

    Paul is an accomplished Security Professional with 14 years of experience in multiple information technology domains, specializing in computer network exploitation, computer network defense and security incident response. His expertise includes planning, coordinating and performing offensive computer operations.
    Paul leads the firm’s ma...

  • speaker photo
    Douglas Jambor
    Sr. Cybersecurity Manager - IT Advisory, Dixon Hughes Goodman LLP

    Douglas has 13 years of penetration testing experience in the information technology field, focusing on information systems security and information security risk management. He is DHG’s cybersecurity subject leader and manager over all of the firm’s technical cybersecurity services, which includes internal, external, wireless and web applica...

  • speaker photo
    Trend Micro
  • speaker photo
    Kevin Dreyer
    IT Director & CISO, Maple Reinders Group

    Kevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the...

  • speaker photo
    Jana White
    COO, Alpine Security

    Jana White is the Chief Operating Officer of Alpine Security. Jana has an extensive background in banking, compliance, and loss prevention and serves as one of the virtual CISOs for Alpine Security clients. Jana has degrees in criminal justice and cybersecurity and is certified as a crime scene evidence technician. She also holds many cyber...

  • speaker photo
    Olivera Zatezalo
    Chief Security Officer, Huawei Canada

    Olivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada’s operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Olivera is best known for creating value through collaborative leadership style, agi...

  • speaker photo
    Kenrick Bagnall
    Detective Constable, Coordinated Cyber Centre (C3), Toronto Police Service, Former VP of IT at Capital G Bank

    Kenrick has been a member of the Toronto Police Service since April of 2006 and currently serves as an investigator in the Coordinated Cyber Centre (C3) section of Intelligence Services. Before this Kenrick spent 20 years in the Information Technology industry primarily in the financial services sector, holding positions of Senior Network Ana...

  • speaker photo
    Tamika Puckett
    Risk Manager, Corporate Security, Zoom

    As the City of Chicago’s Chief Risk Officer, Ms. Puckett was responsible for implementing and managing the city’s enterprise risk management governance framework, including the implementation of policies and procedures to identify and manage organizational risks. A career risk manager, Ms. Puckett possesses over 15 years of experience managin...

  • speaker photo
    Tanya Tipper-Luster
    IT Audit/Advisory Professional, Wyndham Destinations

    Tanya Tipper-Luster has spoken at cyber conferences such as the (ISC)2 Security Congress and was featured as a cybersecurity expert in the Orlando Business Journal. She is a Cybersecurity Audit thought leader and visionary. She represents the alignment of emerging technology, critical business processes and key cybersecurity controls to infl...

  • speaker photo
    Robert Ryba
    Sr. IT Audit / Advisory, Wyndham Destinations

    Robert Ryba has spoken at cyber conferences such as the (ISC)2 Security Congress. He is a Certified Public Accountant and Certified Information Systems Auditor with an Internal Audit and Cybersecurity background. As a millennial who is deeply passionate about information technology, he is motivated to learn why millennials are so indifferent...

  • speaker photo
    Ethan Strayer
    Sr. IT Advisory Analyst, Wyndham Destinations

    Ethan Strayer has spoken at cyber conferences such as the (ISC)2 Security Congress. Ethan is a Certified Information Systems Auditor, Cybersecurity and Information Technology (IT) Governance Risk and Compliance professional. He supports the Company's risk tolerance while also improving the IT posture of the organization. Ethan specializes in...

  • speaker photo
    Chris Turley
    Leader, RISC Education & Awareness, FIS

    I lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previo...

  • speaker photo
    Brian Coleman
    Associate CIO, Information Security Officer , University of Massachusetts Medical School

    Brian is a seasoned leader, Chief Information Security Officer, and IT executive. His experience spans Insurance, Financial Services, Health Care, and Cloud Security. His specialty is optimizing Information Security and Risk Management / Compliance organizations, his passion is employee mentorship, continuous improvement and process developme...

  • speaker photo
    Donna Ross
    SVP & CISO, Radian Group

    Donna L. Ross was appointed to her current position as Senior Vice President, Chief Information Security Officer in July 2016. In this role she is responsible for Radian’s information security program and business compliance, as well as the enterprise project management and initiative governance programs.

    Donna is a senior security and...

  • speaker photo
    Moderator: Nancy Hunter
    VP & CISO, Federal Reserve Bank of Philadelphia

    Nancy Hunter is the VP, CISO and Data Privacy Security Officer at the Federal Reserve Bank of Philadelphia. With more than 25 years of experience in technology including 15 years in Information Security, Nancy joined the Federal Reserve Bank in 2017 where is accountable for Information Security Operations and Consulting, Information Risk Mana...

  • speaker photo
    Mark Eggleston
    VP, Chief Information Security and Privacy Officer, Health Partners Plans

    Mark Eggleston is a senior executive specializing in security and privacy programs. His unique background and expertise in IT program and people management, combined with his diverse experience in healthcare, has positioned him as a thought leader and frequent speaker.

    Mark currently serves as Vice President, Chief Information Security...

  • speaker photo
    Joshua Sorenson
    Sr. Director, Global Security, Equifax

    Joshua is a Global Information Security Leader with 14 years of professional experience. Joshua currently serves as Equifax's Senior Director of Global Mainframe Security where he has responsibility for transforming zSeries platform security around the world. Prior to joining Equifax, Joshua served in security leadership roles, leading transf...

  • speaker photo
    Ted Demopoulos
    Principal, Demopoulos Associates

    Ted Demopoulos’ professional background includes over 35 years of experience in Information Security and Business, including over 30 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent...

  • speaker photo
    Joel Lowe
    Director of Physical and Cyber Security, Red Ventures

    Joel Lowe has more than 14 years of experience in remediating threats, vulnerability management, risk management, data privacy, and information security programs. These programs focus on overseeing private data protection, corporate governance, risk management strategy, Certification & Accreditation, Incident Response, forensics and executive...

  • speaker photo
    Canadian Cyber Threat Exchange (CCTX)

    The Canadian Cyber Threat Exchange (CCTX) is a sharing hub and collaboration organization that provides insight into cyber events directly impacting Canadian business, along with mitigation options and tools to combat identified threats. Learn about the CCTX and enjoy a special, CCTX-hosted guest presentation. Details available soon.

  • speaker photo
    Ken E. Sigler
    Board of Advisors, University of Detroit Mercy, Center for Cybersecurity and Intelligence Studies

    Ken Sigler has served as a full-time faculty member of the Computer Information Systems program at the Auburn Hills Michigan campus of Oakland Community College since 2001, while his primary research is in the area of cybersecurity education, policy, and management; software management; and software assurance. Ken serves as the Liaison for th...

  • speaker photo
    Daniel Goldenberg
    Director, IT Infrastructure, Barton Associates

    Dan is a business results-focused information technology leader with a background in information security, infrastructure, and technical operations; experiences range from fledgling start-ups to enterprise corporate environments.

  • speaker photo
    Tammy Moskites
    Ponemon Institute Distinguished Fellow, Career CISO & Former CISO, Time Warner Cable; CEO & Founder, CyAlliance

    Tammy is the CEO and Founder of CyAlliance. She is a strategic advisor to companies, vendors and startups by leading, building and scaling security offerings while providing CISO as a Service and virtual CISO (vCISO) services for companies worldwide. With her 30 years of experience, she is noted by her peers to be a results-driven and passion...

  • speaker photo
    Bobby Singh
    CISO and CTO, Toronto Stock Exchange
  • speaker photo
    Adam Karcher
    Cyber Special Agent, FBI

    Special Agent Adam Karcher has been with the FBI for over 16 years running cyber investigations and operations across the full spectrum of criminal and national security programs. SA Karcher's experience spans local field investigations to national and international strategic engagement against the most sophisticated cyber threats. His curren...

  • speaker photo
    Matt Donato
    Co-Founder & Managing Partner, HuntSource

    Matt Donato is a Co-Founder & Managing Partner of HuntSource- the preeminent Executive Search and Talent Solutions firm with a niche focus in Cyber Security & Data Intelligence. Matt possesses fifteen years of experience in executive recruiting, talent solutions, workforce planning, and talent management. He is a thought leader and recruiting...

  • speaker photo
    Helen Oakley
    Leader in Cybersecurity

    Helen Oakley is a cybersecurity enthusiast, researcher and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s “Canadian Women in Cybersecurity” conference. Helen holds a lea...

  • speaker photo
    (ISC)2 Local Chapter

    The International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization."

  • speaker photo
    Joe Provost
    Information Security, Avidia Bank

    Joe's been in cyber since the internet was a piece of string tied between two soup cans! He's a former Army warrant officer (network warfare), MIT Lincoln Laboratory IAM, IBM (XForce Cyber Range) “The Cave” member, teaches professional ED at MIT with the Geospatial Cyber Security group, and has a Masters in Cyber from Utica College. His forme...

  • speaker photo
    Michael Meyer
    Chief Risk and Innovation Officer, MRS BPO, LLC

    Michael Meyer, MPSTM, CISSP, CIPP/US, CIPM, FIP, CISM, CRVPM II, CRISC, CISA, is the Chief Risk and Innovation Officer of MRS BPO. He is responsible for overseeing the company’s enterprise innovation, risk management and security initiatives for its Fortune clients. Michael has been with MRS for over 20 years and previously served in the Chie...

  • speaker photo
    Don McKeown
    Information Security Manager, Wolters Kluwer Health

    Don McKeown is currently an information security manager for a provider of healthcare solutions that facilitate effective clinical decisions. There he developed and teaches a threat modeling course, teaches code scanning, contributes to corporate application security advisory committees, and consults for technical and product teams. Previousl...

  • speaker photo
    Doug Graham
    Chief Security and Privacy Officer, Lionbridge

    Doug is the Chief Security and Privacy Officer at Lionbridge Technologies, a global leader in localization and data training. He has over 20 years of global experience in the enterprise security space and brings a balance of leadership, customer focus, and technical expertise to the table. He previously served as CSO of Nuance Communications ...

  • speaker photo
    Ben Schwering
    CISO, Premiere, Inc.
  • speaker photo
    Gabriel Doncel
    Director, Information Security, Drexel University

    Gabriel Doncel joined Drexel University in 2019 where is currently Director of Information Security. He is also part of the University of Delaware and Wilmington University Adjunct Faculty. As a member of the Information Security team at Drexel, and working closely with the campus community and outside parties, his focus is to protect the peo...

  • speaker photo
    Margarita Rivera
    VP, Information Security, Risk & Compliance, LMC (a Lennar Company)

    An Information Security Executive with over 15 years of experience, Margarita Rivera has thrived her entire career on solving complex problems. Margarita has dedicated her professional journey to building Information Security Risk, Compliance and Privacy Programs and continues to do so as the Head of Information Security at LMC, a Lennar Corp...

  • speaker photo
    Brendan Campbell
    AVP, Global Technology Governance & Control, Manulife

    Brendan Campbell is currently the leader for Manulife’s Global Technology Governance & Control function and has prior experience across audit, risk management, information security. He is a part of the Global Technology Executive team and is responsible for leading the execution of risk activities globally. In addition, he is responsible for ...

  • speaker photo
    Mike Ste Marie
    Election Security Partnership Program Manager, Office of the Secretary, Commonwealth of Massachusetts

    Mike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a...

  • speaker photo
    Adel Danesh
    CISO, Analytics 4 Life

    Adel Danesh has over 20 years of experience in IT and information security. Over the course of his professional career, he has been holding information security leadership roles in various organizations and spearheaded mission critical security and infrastructure projects. In his current job, Adel is a CISO at Analytics For Life, a medical re...

  • speaker photo
    Dominique West
    Sr. Cloud Security Consultant, EY, Instructor, Georgia Institute of Technology

    Dominique West is a senior consultant for Ernst & Young based in Atlanta, GA. She has eight years of experience in Information Technology, five of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries...

  • speaker photo
    Daniel Pepper
    Partner, BakerHostetler

    Dan Pepper is a partner on BakerHostetler's Privacy and Data Protection team. Utilizing 25 years of comprehensive experience in information technology, data privacy, and cybersecurity law, Dan advises clients on proactive data security practices, data breach incident response, and regulatory compliance. He frequently handles security incident...

  • speaker photo
    Michael Effiong
    Head of Cybersecurity, Tango Networks

    Michael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas,...

  • speaker photo
    Arif Hameed
    Sr. Director, Client Security, Equifax Canada

    Arif Hameed is Senior Director at Equifax, where he leads a team that handles client cybersecurity due diligence activities including questionnaires, audits, remediation support, security schedules, etc. Prior to his role at Equifax, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third Party Cyber Risk, and IT ...

  • speaker photo
    Imran Ahmad
    Partner/ Attorney, Blake, Cassels & Graydon LLP

    Imran has a business law practice with a specialization in technology, cybersecurity, and privacy law. As part of his cybersecurity practice, Imran works closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk alloca...

  • speaker photo
    J. Zhanna Malekos Smith
    Reuben Everett Cyber Scholar and Researcher, Duke University Center on Law & Technology

    J. Zhanna Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of ...

  • speaker photo
    Larry Snyder
    Associate Professor, Bloomsburg University of Pennsylvania

    Professor Larry Snyder has nearly two decades of experience in law enforcement, fraud, and auditing in the US Army and a variety of industries, and 15 years in the field of cybersecurity education. Larry believes that cybersecurity strategists must have a broad understanding of the cyber issues facing organizations, as well as the skills need...

  • speaker photo
    Ryan Hausknecht
    Instructor, University of North Carolina at Charlotte

    Ryan Hausknecht specializes in red teaming as a Security Consultant at SpecterOps and is an instructor for cybersecurity at UNC Charlotte. He is a former Forensic Consultant, Information Security Analyst, and Penetration Tester who has dealt with clients ranging from local government to enterprise-sized businesses. Ryan graduated Summa Cum La...

  • speaker photo
    Stephen Purpura
    Founder, [Stealth Mode]

    Stephen Purpura is an American entrepreneur and an applied machine learning researcher. He has co-founded four companies that focus on evolving the future of work, including Context Relevant (renamed Versive and acquired by eSentire) and SkyEye LLC (also acquired). He holds degrees from Harvard University’s Kennedy School of Government and th...

  • speaker photo
    Karen Holmes
    VP and CISO, TrueBlue Inc.

    Karen Holmes is the Vice President and CISO at global staffing company TrueBlue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating...

  • speaker photo
    Tom Bechtold
    Digital Event Director, SecureWorld

    Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also worki...

  • speaker photo
    Garrett Whitney
    CIO, Delta Dental of Washington

    Garrett Whitney is the Chief Information Officer at Delta Dental of Washington, the largest dental benefits provider in Washington State. He developed a passion for technology at an early age by learning to program Pascal, C, and 8086 Assembly languages prior to graduating high school. Garrett is a veteran of the United States Navy, specializ...

  • speaker photo
    Kat Jungck
    Principal Enterprise Security Architect, F5 Networks

    Kat is an experienced cybersecurity practitioner with a background in both enterprise cybersecurity and secure product development with deep domain experience in cloud security, identity and access management, and secure product development. Kat enjoys working with local cybersecurity chapters and programs to recruit and develop the next gen...

  • speaker photo
    Brian Shea
    Director of Security - GRC, Microsoft

    Brian is an IT Executive with 25 years of experience from IT Operations and Support, Security, through Compliance, Risk Management, and Technology Innovation. As part of his tenure at Microsoft he has been supporting Supply Chain security and compliance for the last 7 years including hardware supply chain, software supply chain, and vendor /...

  • speaker photo
    Sean Ventura
    CISO, Atmosera

    Sean has over 30 years of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Chief Information Security Officer at Atmosera, implementing and maintaining the company’s security posture, while providing security and compliance expert advisory to Atmoser...

  • speaker photo
    Michael Ray
    Manager, IT Security & Risk, Puget Sound Energy
  • speaker photo
    Mukesh Dixit
    CTO, Washington State Department of Labor and Industries

    Chief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...

  • speaker photo
    Austin McBride
    Threat Data Scientist, Cisco Umbrella

    Austin McBride is a Threat Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. His current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets...

  • speaker photo
    Monica Dubeau
    Director, Privacy Program, IBM Security
  • speaker photo
    Jay Wilson
    CISO, Healthgrades
  • speaker photo
    Burak Serdar
    Co-Founder, ConsentGrid

    Burak is one of the co-founders and the technical lead at Cloud Privacy Labs. He has more than 25 years of experience as a software engineer and recently left his position at Red Hat as Principal Software Applications Engineer. His work includes large scale back-end applications for distributed environments and open-source tools for enterpris...

  • speaker photo
    Jaymin Desai
    Third-Party Risk Offering Manager, OneTrust

    Jaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficie...

  • speaker photo
    Clint Sowada
    Director of Product Security, Collibra

    As the Director of Product Security at Collibra, Clint Sowada is responsible for delivering secure applications and protecting customer’s data. He has been in the security industry for nearly a decade and has proven track record in building secure SDLC programs at companies that range from endpoint protection to large scale cloud service prov...

  • speaker photo
    Ashish Popli
    Director of Product Security, Privacy & Compliance, UiPath

    Ashish thrives on pragmatism, innovation and building teams that deliver a promise. He started his career over 20 years ago, as a computer scientist in upstate NY, and since then has been learning the 'art of impossible', by wearing multiple hats, including writing code, conducting pen tests, finding and fixing security bugs, building and shi...

  • speaker photo
    Dr. Ben Edwards
    Sr. Data Scientist, Cyentia Insitute

    Dr. Benjamin Edwards joined Cyentia at the beginning of 2019 as hire #1. He was formerly with IBM Research, where he worked in applying advanced machine learning techniques to solve real world security problems and shaped the next generation of analytical security models. Before that he received his Ph.D. from the University of New Mexico wit...

  • speaker photo
    Jeff Raymond
    Sales Engineer, Avanan

    Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakesurfing (depending on the se...

  • speaker photo
    Justin Schluessler
    Data Protection Officer, Compassion International

    Justin Schluessler has served with Compassion International, a global child development non-profit, for 21 years. Starting in IT and then transitioning to Risk Management, Justin was the organization’s very first information security employee—building a comprehensive security and compliance program from the ground up. In his current role as ...

  • speaker photo
    Christopher Grillo
    VP & CISO, Formerly Deluxe Corporation
  • speaker photo
    Jerry Vergeront
    Attorney, Vergeront Law, PLLC

    Jerry Vergeront is the founder and attorney at Vergeront Law, PLLC. With over 25 years in Information Security before becoming an attorney, he brings an industry understanding to data security, privacy, and compliance law.

  • speaker photo
    Tim Danks
    VP, Risk Management & Partner Relations, Huawei Technologies (USA)

    As VP Risk Management & Partner Relations Mr. Danks is responsible for understanding and managing business risks in the context of cybersecurity and privacy across Huawei USA businesses and toward external stakeholders. Further, he is responsible for developing and enhancing partner relationships towards key external stakeholders across acade...

  • speaker photo
    Bruce Potter
    CISO, Expel

    Bruce Potter is the CISO at Expel. Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company. He also served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security, and co-founded the Shmoo Group in 1996.

  • speaker photo
    Gaurav Kapil
    Sr. Director, Information Security, Blue Cross and Blue Shield
  • speaker photo
    Anand Singh
    CISO, Alkami Technology

    Dr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currentl...

  • speaker photo
    Drew Simonis
    VP & Deputy CISO, Hewlett Packard Enterprise

    Drew Simonis is a Vice President and serves as the Deputy CISO at Hewlett Packard Enterprise (HPE). He has worked in some of the largest and most complex environments in the public sector and the private sector with firms such as IBM, AT&T, EDS and Symantec. Prior to joining HPE, Drew spent 8 years as the CISO for Willis Group Holdings (now W...

  • speaker photo
    Robert Walden
    Chief Information Officer, Epsilon

    Robert Walden is the Chief Information Officer at Epsilon where he is responsible for cybersecurity, data center and public cloud infrastructure services, and network services. Additionally, Robert is responsible for providing all IT workplace services for a global user base. Robert has been delivering business value through technology for ov...

  • speaker photo
    Tianne Strombeck
    Sr. Principal, Security Risk Management, Verizon

    Tia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has work...

  • speaker photo
    John Berisford
    Sr. Security Architect, SecureWorks
  • speaker photo
    Michael Blaha
    Sr. Director, Cloud Operations, NucleusHealth

    Michael Blaha is currently Sr. Director of Cloud Operations and Security at NucleusHealth. Throughout his career, Michael has made a focus of integrating security and cloud native principles into his delivery and operations teams in both the healthcare payer and healthcare Software-as-a-Service space.

  • speaker photo
    Ian Schneller
    SVP Global Information Security, Financial Institution

    A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...

  • speaker photo
    Craig Swinteck
    IS Manager, Town of Castle Rock

    Craig Swinteck has a comprehensive background in IT operations and cybersecurity, with a career spanning across entrepreneurship, small businesses to global corporations, serving the public in local and federal government, and providing cybersecurity guidance in challenging industries such as Finance, Healthcare, and Manufacturing. Craig’s pa...

  • speaker photo
    Joe Dietz
    Network Security Architect, CenturyLink

    A technology focused senior level IT security professional with an excellent balance of business experience and knowledge of systems/network security. Always conducting oneself with integrity and ethical behavior following the motto of “Always do the right thing.”

  • speaker photo
    Diana Hennel
    CTO, Catalyst Corporation Federal Credit Union

    Diana Hennel is currently the Chief Technology Officer for Catalyst Corporate Federal Credit Union. In her role, Diana is responsible for the long-term strategic direction and implementation of technology strategy, security, and processes. She oversees the corporate’s network operations, technology development and information systems securit...

  • speaker photo
    Joshua Carlson
    Data Privacy and Technology Law Attorney, The Carlson Firm

    Joshua Carlson is a privacy lawyer but also is a technologist and understands sytem engineering, he has for a long time held his CISSP, CIPP, CIPP/G, CIPP/E and provides guidance and advisory to organizations around the world.

  • speaker photo
    Jay Jacobs
    Chief Data Scientist & Co-Founder, Cyentia Institute

    Jay is a Co-founder and Chief Data Scientist at Cyentia Institute, a research firm dedicated to advancing the state of information security knowledge and practice through data-driven research. Prior to Cyentia, Jay served as the Lead Data Analyst on the Verizon Data Breach Investigations Report and is the co-founder of the Society for Informa...

  • speaker photo
    Christopher Calarco
    Special Agent / Private Sector Coordinator, FBI Denver

    Special Agent (SA) Christopher A. Calarco has been in law enforcement for 25 years. He was previously a local and federal prosecutor, and has been an Agent for the FBI for over 20 years. SA Calarco has investigated a number of matters to include reactive violent crimes, gangs, organized crime, fraud and major theft. SA Calarco was also a m...

  • speaker photo
    Scott Bennett
    VP, Applications, Lear Corporation

    Scott Bennett leads Lear Corporation’s global applications as the Vice President of Applications, Deployment and Development. Prior to joining Lear Corporation, he served as the Global Chief Information Officer to International Automotive Components Group, a $6 billion Tier 1 automotive supplier. Before that, Scott was the North America CIO...

  • speaker photo
    Zahira (Zah) Gonzalvo
    SVP and Chief Information Security & Privacy Officer, Flagstar Bank

    Zah joined Flagstar Bank Information Security & Privacy team in 2018 as a Senior Vice President and Chief Information Security & Privacy Officer. Prior to her CISO role, Zah was the head of ERM and the Operational Risk teams since 2013 when she joined Flagstar Bank. Zah was the Strategy Leader for Diversity and Inclusion (D&I) for the Bank si...

  • speaker photo
    Janet Lawless
    CEO & Founder, Center for Threat Intelligence

    Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge threat intelligence consulting, training and a certification program for Certified Threat Intelligence Professionals (CTIP). We are a proud provider for The National Initiative for Cybersecurity Education (NICE)...

  • speaker photo
    Jason Rader
    Director, Network & Cloud Security, Insight Cloud + Data Center Transformation

    Jason Rader joined Insight in 2015 as the National Practice Director of Security. He is charged with managing Insight’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true s...

  • speaker photo
    Dennis Hodges
    CIO, Inteva Products

    Dennis Hodges is the Chief Information Officer for Inteva Products, LLC, a position he has held since March 1, 2008. Prior to this assignment Dennis was Chief Information Officer for Delphi Interiors and Closures. Prior to joining Inteva, Dennis served as the Global Business Systems Director at Huntsman Corporation. He began his career at She...

  • speaker photo
    Tammylynne Jonas
    CIO, Self Esteem Brands

    Tammylynne Jonas (TLJ) is a seasoned digital and technology executive with almost 20 years of experience leading large, international teams. TLJ is the Global CIO for Self Esteem Brands, the parent company for Anytime Fitness. In this role, TLJ has responsibility for multiple franchise brands, with almost 5000 locations across almost 40 count...

  • speaker photo
    Brenden Smith
    CISO, FirstBank

    Brenden Smith is the Chief Information Security Officer at FirstBank. Having spent the last 10 years at FirstBank he is passionate about their community involvement and “Banking for Good” philosophy. In his current role Brenden is focused on aligning security with the needs of the business to help drive better business outcomes through better...

  • speaker photo
    Christopher Riley
    CISO, Ntirety (formerly HOSTING.com)

    Chris is a seasoned IT Strategist with 20 years of leadership experience in Project & Program Management, Technology & Infrastructure, and Security & Governance. He creates and scales internal technology operations for sustained hyper-growth, builds security operations for Managed Security Provider and spearheads Compliance certification pro...

  • speaker photo
    Ronald Williamson
    Information Security Officer, Medical College of Wisconsin

    Ronald Williamson has over 20 years’ experience in Information Technology and Information Security. He has held roles within the banking, retail, and healthcare industry. Currently, he is Information Security Officer at the Medical College of Wisconsin. Driven by a belief in promoting a strategic vision and utilizing best practices to accompl...

  • speaker photo
    Bill Meredith
    Cloud Security Engineer, Charles Schwab

    Bill Meredith has over 25 years of experience designing, implementing, and supporting IT solutions for large enterprises, of which 10 years have been in the cybersecurity area. He is a cybersecurity professional with experience across a diverse set of cyber domains and industries such as Cloud Security, Financial, Forensics Investigation, Te...

  • speaker photo
    Panel Discussion
  • speaker photo
    David Sonheim
    Cybersecurity Advisor, DHS / CISA
  • speaker photo
    Kevin Beaver
    Independent Information Security Consultant, Principle Logic, LLC

    Kevin Beaver, CISSP is an information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. • With over 31 years in IT and 25 years in security, Kevin specializes in independent security assessments and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sen...

  • speaker photo
    Doug Boykin
    Solutions Engineer, OneTrust

    Doug Boykin serves as a Privacy Engineer at OneTrust – the #1 most widely used privacy, security and third-party risk technology platform. In his role, Boykin advises many of the world's leading organizations on CCPA, GDPR and ePrivacy (Cookie Law) solution implementations, focused on formulating efficient and effective responses to data prot...

  • speaker photo
    John Callaghan
    Sr. Security Engineer in SOC Operations, Forensics, and Threat Hunting, Pulte Financial Services

    As a security practitioner of 30 years, Jack's experience began in the 80s with commercial and military venues, and expanding in early days of the Internet. It continued to be shaped by the growth of malware and data breaches as global threats against business, nations, and individuals. While developing some of the earliest proactive IPS syst...

  • speaker photo
    Patrick Benoit
    Global Business Information Security Officer , CBRE

    Patrick is an Advisory CISO and formerly the Deputy CISO for Cheetah Digital. He is a security and privacy executive, writer, speaker, knowledge provider and seeker. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is certifi...

  • speaker photo
    Jeff Kenney
    CIO/CISO, Grasshopper Bank

    30+ years IT and Information Security practice. CIO/CISO at the first digital commercial bank in the US. Previously served as the Global Head of Wealth Technology for Thomson Reuters wealth management business line. Lead a team of over 380 developers and technologists supporting the TR BETA, BETA Online, and Thomson One products. Previously t...

  • speaker photo
    Dale Drew
    Chief Security Officer, Zayo Group

    Dale is currently the Chief Security Officer of Zayo Group, Inc, a global telecommunications service provider based in Boulder, Colorado. Dale is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, having worked in Federal/State Law Enforcement and with Inte...

  • speaker photo
    Rob Walk
    Sr. Security Engineer, Tenable

    Rob is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying, and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable, he helps organizations reduce risk due to Cyber Exposure.

  • speaker photo
    Kelce Wilson
    General Counsel, InfraGard North Texas

    Kelce S. Wilson was in the U.S. Air Force, both active duty and reserves, retiring as a Lieutenant Colonel. He has a B.S., M.S. and PhD in electrical engineering, an M.B.A., a J.D., US PTO patent practitioner registration, and is a certified privacy professional with CIPP-US, CIPP-E, and CIPM. During his military and engineering career he wor...

  • speaker photo
    TJ Gonen
    Co-Founder , Protego Labs

    TJ is a subject matter expert on cloud security who has decades of experience solving enterprise problems with innovative solutions. His current project, Protego Labs, is two years in the making. With Protego, TJ has developed an award-winning platform that automates security for serverless applications. The combination of reduced development...

  • speaker photo
    Book Signing
  • speaker photo
    Parthasarathi Chakraborty
    Director, Security Architecture, Bank of Montreal

    Partha has over 20 years of cyber security leadership experience in financial services industry. An active speaker and panelist in cyber security conferences around the world. Very much passionate about learning new technologies and writing on recent cyber trends. Currently heading up infrastructure security architecture for Bank of Montreal....

  • speaker photo
    Rob Maynard
    Solutions Architect, Trend Micro

    Rob Maynard is a sales engineer and DevOps SME for Trend Micro. He has been in the IT field for over 11 years working with various cloud, automation, and virtualization technologies. He lives in Michigan with his wife and two children.

  • speaker photo
    Jennifer Reicherts
    Certified Ethical Hacker, Healthcare Information Security Analyst

    Jennifer Reicherts is an Information Security Analyst with over 16 years of experience working in the Healthcare and Public Health sector. Her passions include IoT cybersecurity and threat intelligence. Jennifer is a Certified Ethical Hacker (CEH) and an Executive Board Member of InfraGard Minnesota Member Alliance.

  • speaker photo
    Michael Hiskey
    Chief Marketing Officer, Avanan

    Michael Hiskey is a long-time data, analytics, cloud, and AI industry executive. An accomplished writer and speaker, he has published articles in Forbes, InfoWorld, TechCrunch, ITProPortal, etc. He spends his time thinking about how these innovations impact B2B organizations and their customers. Michael has a background in enterprise technolo...

  • speaker photo
    Rebecca Harness
    AVP, CISO, Saint Louis University and SLUCare

    Rebecca Harness is AVP & Chief Information Security Officer for Saint Louis University and Founder/Principal of Pericuro. Rebecca has an established 20+ year career in information technology with the past ten years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two succes...

  • speaker photo
    Scott Hogg
    Chair Emeritus, Rocky Mountain IPv6 Task Force

    Scott Hogg is CTO and a co-founder of HexaBuild.io, an IPv6 consulting and training firm. He is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. He is the author of the a Cloud Guru course, “Rapidly Deploying IPv6 on AWS.” Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member o...

  • speaker photo
    Joseph Marentette
    MIM, Network Engineer 3, Washington University in St. Louis

    Joe Marentette, MIM (WashU IT Network Engineer 3), has worked for the university for over 20 years. Joe leads the design and engineering of the WashU enterprise network and the research network. Joe has a long history of collaboration with the Information Security department, and most recently built the data collection network to capture netw...

  • speaker photo
    Eddie Ho
    Former CIO & COO, Los Alamos National Bank

    Eddie Ho is the former COO and CIO for Los Alamos National Bank in New Mexico and CIO and CISO at OmniAmerican Bank in Texas. Prior to banking leadership roles, Eddie was in Technology Risk Management, cyber security, and Enterprise Architecture for IBM, Dell, Grant Thornton, and Blockbuster. Eddie is a board member for ePayAdvisors and is a ...

  • speaker photo
    Marc Ashworth
    Senior VP CISO, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...

  • speaker photo
    Frank Leyva
    Systems Engineer, Radware

    Frank Leyva is a Systems Engineer with Radware, a market leader in cybersecurity with a focus on Network and Application level availability, and security. Prior to that, he was a subject matter expert in network security defense with a leading anti-malware company, performing advanced threat analysis, deep packet inspection, and creating hack...

  • speaker photo
    Rod Aday
    CISO, Dexia Crédit Local

    Rod Aday is the CISO, Head of Operational Risk and Information Security for Dexia Credit Local, NY Branch. He is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built I...

  • speaker photo
    Mark Nagiel
    CISO, Supreme Lending

    Mark is currently serving as the Chief Information Security Officer at Supreme Lending. Prior to Supreme Lending, Mark Served as the CISO at Prime Lending, Head of Information Security at MetroPCS (a T-Mobile division), VP of Information Technology and VP of Information Security at InCharge Institute, Head of NEC Information Security Consulti...

  • speaker photo
    Beth Young
    Sr. Security Incident Response Consultant, Aflac

    Beth Young has 20 years of cyber security experience. She is currently a Senior Security Incident Response Consultant with Aflac. Beth has previously worked for a financial services company and for one of the Information Sharing and Analysis centers. She just completed her Masters in Applied Data Science from Syracuse University. She has prev...

  • speaker photo
    Christopher McMahon
    Special Agent, Global Investigative Operations Center, United States Secret Service

    Chris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Servi...

  • speaker photo
    Siam Luu
    Lead Security Architect, Colorado Judicial Department

    Siam Luu has worked information security for over 8 years beginning as an analyst, graduating to an engineer, and currently is employed as a security architect. He has worked in both the public and private sectors in a myriad of different careers and locations in both technical and non-technical roles. At present, he has his CISSP certificati...

  • speaker photo
    Melissa Van Buhler
    Cybersecurity & Data Privacy Attorney, Focal Law

    Melissa’s legal practice focuses on cybersecurity, privacy, and regulatory compliance. Her key strength is helping organizations achieve cyber resiliency through legal and regulatory compliance.

    Before joining Newman Du Wors in 2018, she served more than 15 years as a Judge Advocate General officer in the United States Army where she s...

  • speaker photo
    Quin DeVries
    UX Researcher, Automotive Cybersecurity, Mitsubishi Electric Automotive America

    Quin DeVries is exploring the realm where technology and human behavior meet to create engaging user experiences. As a curious researcher, he is eager to tackle the challenges of today and the future.

    His research background includes topics in design thinking and ideation in engineering, managerial accounting and neuropsychology, and ...

  • speaker photo
    Alan Berry
    Vice President, Cybersecurity, Centene Corporation

    Alan Berry is the Vice President for Cybersecurity at Centene Corporation. He leads the Cyber Incident Response, Security Strategy, and Threat and Vulnerability Management teams, as well as the Business Resilience and Crisis Management teams. Alan brings 30 years of experience in cyber operations, communications, and command and control. Prio...

  • speaker photo
    Matthew Clapham
    Director of Cybersecurity, GE Healthcare

    Matt Clapham is a Directory of Cybersecurity at GE Healthcare. He and his team make products more secure.

  • speaker photo
    Michael Rogers
    Director, Cyber Defense, Optum / UHG

    Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybersecurity. He is a certified nerd with nearly 20 years of IT experience, and has spent the last decade developing his understanding of information security, business strategy, and communications. Mike earned his MBA from the Carlson School of Ma...

  • speaker photo
    David Stauss
    Partner, Husch Blackwell LLP

    David is the leader of Husch Blackwell’s national privacy and data security practice group. Accredited by the International Association of Privacy Professionals as a Fellow of Information Privacy, Certified Information Privacy Professional/United States, and Certified Information Privacy Technologist, David brings to the table a deep engageme...

  • speaker photo
    Marc Harwin
    Information Security Professional, Harwinet LLC

    Marc Harwin is an Information Security Professional with more than 20 years of experience. He has worked to improve Information Security at multiple Fortune 500 organizations with a focus on:
    - Security Operations
    - Vulnerability Management
    - Incident Response

    Marc has a Master of Science in Information Systems from W...

  • speaker photo
    Preston Bukaty
    GRC Consultant / Privacy & Compliance Specialist, IT Governance USA Inc.

    Preston Bukaty is an attorney and consultant working for IT Governance USA. He specializes in data privacy GRC projects, from data inventory audits to gap analysis, contract management, and remediation planning. His compliance background, and experience with operationalizing compliance for a variety of industries, give him a strong understand...

  • speaker photo
    Jeff Wilbur
    Technical Director, Online Trust Alliance, Internet Society

    Jeff Wilbur is the Technical Director of the Internet Society’s Online Trust Alliance. He is responsible for integrating, developing, and extending the OTA initiative within the Internet Society’s overall mission and objectives. He has over 25 years of experience in high technology, all focused on bringing new, industry-transforming communica...

  • speaker photo
    Selim Aissi
    SVP and CISO, Ellie Mae

    Selim Aissi is Senior Vice President & Chief Security Officer at Ellie Mae’. He is responsible for Ellie Mae’s Security Engineering, Operations, Strategy and Information Technology Risk & Compliance. Before joining Ellie Mae, Selim was the Vice President of Global Information Security at Visa. In that role, Selim transformed Visa’s informatio...

  • speaker photo
    Sudesh Gadewar
    Security Engineer, Ellie Mae

    Sudesh Gadewar is Sr Staff Security Engineer at EllieMae. Sudesh holds 10+ years of experience in security where passion is in offense and defense of security. Sudesh holds various Security Certifications which he use as attestations to his skillset. His core area of expertise is in product and application security, where he build SSLDC lifec...

  • speaker photo
    Janelle Hsia
    Director of Privacy and Compliance, American Cyber Security Management

    Janelle Hsia is a trusted advisor for strategic and tactical decision making within organizations of all sizes. She brings a diverse background with strong leadership, technical, and business skills spanning 20 years of experience in the areas of project management, IT, privacy, security, data governance, process improvement, and software dev...

  • speaker photo
    Carlin Dornbusch
    President, American Cyber Security Management (ACSM)

    Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of moder...

  • speaker photo
    Ethan Sailers
    Solutions Engineer, OneTrust

    Ethan Sailers serves as a Privacy Engineer at OneTrust, the largest and most widely-used dedicated privacy management technology platform to operationalize privacy, security, and third-party risk management. In his role, he advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the w...

  • speaker photo
    Carlos Garcia
    Enterprise Architect, Office of CIO, Optum

    Carlos has specialized in Identity and Access Management systems for the past 20 years. His experience has been in the architecture and implementation of large enterprise and consumer IAM systems. Most of his career has been spent designing and running the large scale IAM systems for UnitedHealth Group. His experience and leadership led him t...

  • speaker photo
    Tom Muehleisen
    Director of Cyber Operations, Norwich University Applied Research Institutes

    Tom Muehleisen, CISSP and Retired Army Lieutenant Colonel, is a proven leader in cybersecurity. He is currently the Director of Cyber Operations for NUARI, a non-profit focused on improving our nation’s cybersecurity. He has a rich emergency management background as a National Guardsman, ranging from fighting fires to writing Washington State...

  • speaker photo
    Dave Ruedger

    Dave Ruedger is the Chief Information Security Officer for Risk Management Solutions based out of Newark, CA. RMS is a premier provider of catastrophe risk models for the insurance industry that help organizations forecast losses for hurricane, earthquake, flood, wildfire, terrorism and cyber risk in a cloud hosted SaaS environment. Dave ho...

  • speaker photo
    Kevin Paige
    CISO, Flexport

    Kevin Paige is the Chief Information Security Officer (CISO) at Flexport, provider of the Operating System for Global Trade. Prior to Flexport, Kevin was the CISO at MuleSoft, and brings over 20 years of leadership in delivering solutions and programs that optimize security, compliance and technical operations for both the private and public ...

  • speaker photo
    John Heasman
    CISO, Chegg

    John Heasman is the CISO of Chegg, the leading student-first connected learning platform where he is focused on proactive approaches to building secure software. Prior to Chegg, John was the Deputy CISO at DocuSign. He has presented at Black Hat, DEF CON, OWASP AppSec and other industry forums on a diverse range of topics from web application...

  • speaker photo
    Maarten Van Horenbeeck
    CISO, Zendesk

    Maarten Van Horenbeeck is Chief Information Security Officer of Zendesk since March 2018. He has also been a Board member of the Forum of Incident Response and Security Teams (FIRST) since 2011, and is the Lead Expert to the IGF Best Practices Forum on Cybersecurity. From July 2015 to March 2018, he served as Vice President, Security Engineer...

  • speaker photo
    Rinki Sethi
    VP & CISO, Twitter

    Rinki Sethi is an information security executive known for change, technical and thought leadership across security and enablement disciplines. She is a veteran in the cyber security domain and throughout her career has built and matured technical security teams across security operations, product security, application security, security arch...

  • speaker photo
    Gary S. Chan
    System VP & CISO, SSM Health

    Gary S. Chan helps organizations innovate, stay secure, and meet compliance using information security as the vehicle. He has architected anti-fraud systems for state agencies, led the information security teams for a large-cap technology company, leads the information security department for a large multi-state healthcare system, owns an inf...

  • speaker photo
    Jonathan Cran
    Head of Research , Kenna Security

    Jonathan Cran is an information security expert based in Austin, Texas. He’s a principal at the strategic consulting firm Pentestify, and founder of the the open security intelligence platform, Intrigue. His passion is security assessment, architecting systems to measure and ultimately prevent security incidents. Currently, he’s building a wo...

  • speaker photo
    Ann Nagel
    Institutional Privacy Officer and former UW Associate CISO, University of Washington

    Ann Nagel is the Associate Vice Provost for Privacy, University Privacy Officer, and European Union General Data Protection Officer for the University of Washington (UW). She is responsible for developing a cohesive strategy for the humanitarian and legal aspects of privacy across the UW. To help ensure privacy is included in the design of th...

  • speaker photo
    Lynette Crane
    Founder & CEO, Quiet Brilliance Consulting LLC

    Lynette Crane, MA, is a Minneapolis-based mentor to introvert CEOs, an acclaimed national speaker, corporate trainer, executive coach and author, and Founder of Quiet Brilliance Consulting LLC Trained in psychology, she has more than 30 years' experience in her field. Lynette Crane and Quiet Brilliance Consulting help smart companies who are ...

  • speaker photo
    Mark Dargin
    Director, Security & Architecture, Qualfon

    Mark Dargin is the Director of Security Architecture at Qualfon Inc., an organization with over 16,000 employees across North America, South America, and Asia. Mark has over 19 years of experience designing, managing, and securing complex WAN and LAN infrastructures. He is a member of the Michigan Cybersecurity Civilian Corps, FBI citizen’s a...

  • speaker photo
    Swathi Joshi
    Sr. Technical Program Manager - Incident Response, Netflix

    Swathi Joshi is a Senior Technical Program Manager, on the Security Incident Response Team at Netflix where she works on advancing the crisis management program and maturing the incident response function. Previously she worked at Mandiant as an Engagement Manager and as an Escalations manager, managing and solving most critical technical eff...

  • speaker photo
    Sarah Lange
    CISO, Allgress, Inc.

    Sarah has over 23 years of experience in Information Security Management, Risk Management, Third Party Oversight, and Governance in both internal and consulting roles. She is an experienced leader with a background in design, and implementation of GRC and Security programs working with technologies that enable these programs to be effective. ...

  • speaker photo
    Zach Turner
    Enterprise Sales Engineer, Mimecast

    Zach joined Mimecast in 2017 as an Enterprise Sales Engineer in Denver, CO. Previously, Zach worked in the enterprise space for AirWatch by VMware, where he focused on cloud-based Mobile Device Management solutions involving mobile security, content management, and email management. Most recently, he worked for Fuze, Inc., a $1 billion UCaaS ...

  • speaker photo
    Christopher Frenz
    AVP, Information Security, Interfaith Medical Center

    Christopher Frenz is the AVP of Information Security for Interfaith Medical Center, where he worked to develop the hospital’s information security program and infrastructure. Under his leadership, the hospital has been one of the first in the country to embrace a zero trust model for network security. Christopher has also played a role in pus...

  • speaker photo
    Holger Weeres
    Executive Account Manager, baramundi software USA, Inc.

    Holger is a seasoned UEM expert with over 20 years of experience in endpoint Automation for company of all sizes. He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company's general challenges and common obstacles in ach...

  • speaker photo
    Griffin Weaver
    Attorney, Technology and Transactions Counsel, USAA
  • speaker photo
    Dr. Jason Edwards
    Cybersecurity Regulatory Testing Lead, USAA

    Jason Edwards has over 20 years of IT/Cybersecurity experience and currently works for USAA researching, developing and executing enterprise cybersecurity assurance testing. Jason is a 22-year veteran of the US Army and has served multiple tours of duty in Iraq, Afghanistan, and elsewhere. Jason is currently awaiting final approval for his do...

  • speaker photo
    Kristie Pfosi
    Sr. Manager, Automotive Cybersecurity, Mitsubishi Electric Automotive America

    Kristie Pfosi stands at the forefront of one of automotive’s greatest challenges: cybersecurity. A well-respected policy maker and program manager with deep technology expertise, Kristie has been a champion for best practices in cybersecurity for over a decade as a technical intelligence officer at the CIA and as an OEM employee, most notably...

  • speaker photo
    Amy Chu
    Sr. Director, Automotive Product Security, Harman

    Amy Chu is Senior Director, Automotive Cybersecurity at HARMAN, a wholly-owned subsidiary of Samsung Electronics Co., Ltd. HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide, including connected car systems, cyber security solutions, audio and visual products, enterprise automati...

  • speaker photo
    Jennifer Tisdale
    Associate Principal, GRIMM, a Cyber Research, Consulting & Education firm

    Jennifer Tisdale is the Associate Principal for Embedded Systems and Advanced Transportation Security Programs at GRIMM, a cybersecurity research and engineering firm. Previously, Jennifer served as R&D Program Manager of Vehicle Product Cybersecurity at Mazda North America. While at Mazda, Jennifer bridged the gap between R&D and Government ...

  • speaker photo
    KC Condit
    CISO, G6 Hospitality, LLC

    KC Condit has been an information security practitioner and IT leader for 30 years with a diverse resume including hospitality, financial services, retail, and private, post-secondary education. He is currently the CISO for G6 Hospitality, LLC, and is responsible for information security, data privacy, IT risk management, and IT compliance fo...

  • speaker photo
    Sonja Torseth
    Sr. Training Consultant, Kalles Group

    Sonja Torseth is a Senior Training Consultant at Kalles Group. She designs communications strategy and learning experiences with a sharp focus on end-goals: to affect staff behavior change, especially for security risk mitigation. She has more than 10 years’ experience in communications, learning design, and project delivery, and holds a B.S....

  • speaker photo
    Jeanette Rogers
    Director of Learning, Kalles Group

    Jeanette Rogers is the Director of Learning at Kalles Group, helping companies build world-class security awareness and training solutions. She has over a decade of experience in design, development, and delivery of global corporate technology-based programs and holds a Master's degree from Stanford University.

  • speaker photo
    Abigail McAlpine
    PhD Cybersecurity Researcher, Secure Societies Institute - University of Huddersfield

    Abigail McAlpine is a CyberSecurity Researcher at the Secure Societies Institute at the University of Huddersfield. Her research is specialised in PII data published on digital systems that leads users to become vulnerable to a number of threats to their identity and safety long-term.

  • speaker photo
    Andy Purdy
    Chief Security Officer, Huawei Technologies USA

    Andy is Chief Security Officer for Huawei Technologies USA, overseeing Huawei USA's cybersecurity assurance program and supporting Huawei’s global assurance program. Andy is the Huawei global lead for the East-West Institute Global Cooperation in Cyberspace Initiative and serves on the Steering Committee of The Open Group Trusted Technology F...

  • speaker photo
    Elvis M. Chan
    Supervisory Special Agent, Squad CY-1, National Cyber Center, FBI San Francisco

    Elvis Chan is a Supervisory Special Agent (SSA) assigned to FBI San Francisco. SSA Chan manages a squad responsible for investigating national security cyber matters. With 14 years in the Bureau, he is a decorated agent who is recognized within the Intelligence Community as a cyberterrorism expert. SSA Chan was the lead agent on significant c...

  • speaker photo
    Mary Chaney
    Attorney, The Cyber Security Law Firm of Texas

    Mary N. Chaney, Esq., CISSP, has over 20 years of progressive experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law.
    Ms. Chaney spent several...

  • speaker photo
    Tara Schaufler
    Information Security Awareness and Training Program Manager, Princeton University

    Tara Schaufler is the Information Security Awareness and Training Program Manager at Princeton University. Tara has worked at Princeton for 17 years, spending the last 10 focusing on training and technical communications, and over the past five years has built a robust security awareness and training program from the ground up. She is a membe...

  • speaker photo
    David Sherry
    CISO, Princeton University

    David Sherry is the CISO at Princeton University, with university-wide responsibility and authority regarding matters of information security and information risk. He is tasked with the development and maintenance of Princeton's information security strategy, policies and best practices, security training and awareness programs, as well as on...

  • speaker photo
    Steven Lentz
    Head of Security, Mojio

    Steven is the Head of Security, CISSP, CIPP/US. He has presented for SC Magazine and in Las Vegas regarding Cybersecuirty and Security Awareness.

  • speaker photo
    Paola Saibene
    VP, Enterprise Risk Management, American Heart Association

    Paola Saibene is the VP of Enterprise Risk Management at American Heart Association. She has been a CIO, CTO, and CSO of large organizations, and has worked in private, non-profit, and government sectors.

  • speaker photo
    Benjamin Brooks
    VP, Beryllium InfoSec Collaborative, President of the Board, Cyber Warrior Foundation

    Vice President of Beryllium InfoSec Collaborative and Founding Member of Cyber Warrior Foundation. Benjamin is a 19-year Navy veteran of Information Warfare and Special Warfare communities. He serves as the Education Committee Chair for the Cyber Warrior Foundation as well as Chairman of the Board. Benjamin is an (ISC)2 CISSP and Writer for t...

  • speaker photo
    Abhijit Solanki
    Founder & Managing Director, Whiteboard Venture Partners

    Abhijit Solanki is the founder of Whiteboard Venture Partners, an early stage venture capital firm helping entrepreneurs achieve their whiteboard dreams.

  • speaker photo
    Ann Marie Mortimer
    Managing Partner, Los Angeles Office, Hunton Andrews Kurth LLP

    Mortimer is the managing partner of Hunton Andrews Kurth LLP’s Los Angeles office and co-head of the firm’s commercial litigation practice. Her practice is cross-disciplinary and includes significant business and class action consumer claims litigation experience and crisis management in relation to data breach, consumer related labeling clai...

  • speaker photo
    Kenneth Hartman
    Instructor, The SANS Institute

    Kenneth G. Hartman is a security engineering leader in Silicon Valley. Ken's motto is "I help my clients earn and maintain the trust of their customers." Ken is an Instructor for the SEC545 Cloud Security Operations course offered by the SANS Institute. Ken has worked for a variety of Cloud Service Providers in Security Architecture, Engineer...

  • speaker photo
    Scott Reynolds
    Industrial Security Manager, Johns Manville

    Scott Reynolds is the Industrial Security Manager at Johns Manville. He has over 14 years of Industrial Engineering experience and is an active member of the OT / IT community. Scott has held leadership roles in the International Society of Automation (ISA) for the last four years and is currently an Executive Board Member. Scott has an elect...

  • speaker photo
    Chris McLaughlin
    Information Security Officer, Johns Manville

    Chris McLaughlin is the Information Security Officer at Johns Manville, a Berkshire Hathaway company. JM is leading global manufacturer of insulation, roofing and glass fibers products. Chris has over 20 years of security and infrastructure experience leading the vision for a highly complex manufacturing environment. Chris has a passion for i...

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government ...

  • speaker photo
    Jack Freund, PhD
    Director, Risk Science, FAIR Institute

    Dr. Jack Freund is a leading voice in cyber risk measurement and management. He is an expert at building relationships to collaborate, persuade, and sell information risk and security programs. Jack is currently serving as Director, Risk Science at RiskLens and previously worked for TIAA as Director, Cyber Risk. Jack holds a PhD in Informatio...

  • speaker photo
    Nick Selby
    Director, Cyber Intelligence and Investigations, NYPD

    Nick is the Director of Cyber Intelligence and Investigations for the New York City Police Department. He serves the NYPD's Intelligence Bureau, helping advise the strategy and policies that govern how the Bureau assesses and manages investigations and intelligence in the Cyber domain. For nearly a decade Nick has served the public as a Texas...

  • speaker photo
    Serge Borso
    Community Instructor, SANS Institute

    Serge Borso is the founder and CEO of SpyderSec, an organization specializing in penetration testing, security awareness training, and OSINT. He also resides on the board of directors for the Denver OWASP chapter and teaches with the SANS Institute. He is an expert in a variety of information security fields, having served in many roles in th...

  • speaker photo
    Michael Landewe
    Co-Founder & Chief Privacy Officer, Avanan

    Before cofounding Avanan in 2014, Michael Landewe had over 20 years of internet startup experience, starting with cofounding an ISP in 1996. He was an early employee of Network Physics, an internet traffic performance company that was one of the first technology companies to develop detection response for the Blaster worm. As a research engin...

  • speaker photo
    Don Peterson
    Sr. National Cybersecurity Specialist, Federal Reserve

    Don Peterson is a Sr. National Cybersecurity Specialist for the Federal Reserve System, based out of the Federal Reserve Bank- St. Louis. He is tasked with overseeing the supervision of the largest and most systemically important financial institutions in the United States with assets of $100B+. His duties also include participating in the de...

  • speaker photo
    Daniel Stiegman
    Cyber Threat Intelligence Engineer, Pathfinder Intel

    Daniel is a 15-year Intelligence Professional, with a career in US Army Intelligence and the National Geospatial Agency. His primary focus has been in Counter-Terrorism, Asymmetrical Warfare, and Intelligence Analysis methodology. Daniel was a national-level instructor in All Source Intelligence Analysis and has written several published whit...

  • speaker photo
    Craig Reeds
    Cybersecurity Compliance Manager, Electric Power Systems International

    Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Complia...

  • speaker photo
    Tina Hauri
    Former CISO, City of Chicago; President, Bradford Garrett Group

    Tina is President of the Bradford Garrett Group. Her prior roles include CISO for the City of Chicago, Global CISO for AON, CIO for Kudoz.com, Director of Enterprise Risk Management for Discover Financial Services, and Global IT Security Program Manager for Perot Systems at Swiss Bank. As co-founder of the Chicago CISO Networking group, Presi...

  • speaker photo
    Rhia Dancel
    Information Security Lead Auditor, NSF International

    Rhia is an ISO 27001 and 9001 Lead Auditor and OSINT PenTester for NSF and has previously held several auditing and technical positions in the information security and Pharma quality sectors. Rhia has completed technical writing work and audits for NSF throughout North America, working directly with customers onsite and remotely developing se...

  • speaker photo
    Tony Giles
    Information Security Lead Auditor, NSF International

    Tony is an ISO 27001, ISO 20000 and ISO 9001 Lead Auditor and OSINT PenTester for NSF. Currently, Tony is the Director of Custom Audit Programs, also having served as Director of Operations, Director of Business Development, and Service Delivery Manager. Tony has conducted audits globally for over 10 years and worked on large-scale security i...

  • speaker photo
    Merlin Namuth
    Cyber Risk Advisory Board Member, Pepperdine University

    Merlin Namuth has spent over 20 years focused in security. His experience includes building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions. Namuth serves on the cyber risk advisory board at Pepperdine Univers...

  • speaker photo
    Alexis Womble
    Sr. Threat Intelligence Analyst, BAE Systems

    Alexis Womble is a Sr. Threat Intelligence Analyst at BAE Systems. Previously, she was a Cybersecurity Intelligence Analyst at Express Scripts, where she interned for a year in an EOCC automation development role, Attack Simulation role, and an Intelligence role. She is also a recent grad from Missouri Baptist University, where she can still ...

  • speaker photo
    Matthew DeChant
    CISO, Tempus, Inc.
  • speaker photo
    John Fatten
    Technical Solutions Architect, Cisco Umbrella
  • speaker photo
    Ann Marie Isleib
    VP, Enterprise Sales, Okta, Inc.
  • speaker photo
    Linda Marcone
    Sr. Director, Information Security, Serta Simmons Bedding, LLC

    Linda Marcone has 15+ years of Information Security, Governance, Risk & Compliance, and Fraud Prevention experience. Throughout her career, she has built and transformed Information Security Programs and Teams, worked with FBI & NCFTA to take down an international fraud ring (APT), promoted diversity in the workplace, and acted as a mentor. ...

  • speaker photo
    Samuel Blaney
    Director Cybersecurity, Georgia Technology Authority

    Sam is the Director of Cybersecurity & Governance Risk and Compliance (GRC) at GTA and is a Chief Warrant Officer (CW3) retired. Georgia Technology Authority (GTA) Office of Information Security (OIS) is the premier strategic partner for all state and local government organizations in support of a strong State Cyber Security posture. GTA OIS,...

  • speaker photo
    Adam Shostack
    Leading Expert on Threat Modeling, Shostack & Associates

    Adam is a leading expert on threat modeling, and a consultant, entrepreneur, technologist, author and game designer. He's a member of the BlackHat Review Board, and helped create the CVE and many other things. He currently helps many organizations improve their security via Shostack & Associates, and advises startups including as a Mach37 Sta...

  • speaker photo
    William Lidster
    Sr. Manager, Information Security and Compliance, AAA Washington

    Dr. William Lidster has more than 25 years of experience in IT and information security leadership in government, retail, insurance, finance, healthcare, and the utility industries. He received is PhD in Information Security and Assurance from Capella University and has published in IEEE and other professional journals. Dr. Lidster focuses hi...

  • speaker photo
    Bryce Verdier
    Sr. Software Engineer, GroupOn

    Bryce Verdier (CISSP, CEH) is currently a Senior Software Developer at GroupOn. In previous roles, he’s also been a Systems Engineer with an automation and DevOps minded focus, and an Information Security Engineer, focusing on host-based security.

  • speaker photo
    Tamika Albert-Williams
    Undergraduate IT Program Adjunct Faculty, Capella University - School of Business and Technology

    With a passion for addressing the human element of cybersecurity, Tamika Albert-Williams has 10+ years’ experience in information technology and security. She began her career in IT project management. She is currently a Management Consultant and adjunct IT program faculty at Capella University. She specializes in GRC; and IS program strategy...

  • speaker photo
    Sherron Burgess
    SVP & CISO, BCD Travel
  • speaker photo
    Ken Foster
    Head of Global Cyber Risk Governance, First Data Corporation
  • speaker photo
    Donna Gallaher
    President & CEO, New Oceans Enterprises
  • speaker photo
    Austin Rappeport
    Blue Team Coordinator, Zurich Insurance Group

    Austin Rappeport is a Threat Defense Consultant working for Zurich Insurance on their global cybersecurity team. His team is responsible for managing Zurich's SIEM and integrating Zurich's security toolkit to allow for the automated detection of suspicious or malicious activity across Zurich's network. Previously, Austin worked for the Federa...

  • speaker photo
    Chris Carlis
    Red Team Coordinator, Zurich Insurance Group

    Chris Carlis is a member of the Zurich Insurance Group Red Team and has built a career helping organizations become more secure through offensive testing. Locally, Chris is a community organizer in the Chicago area and helps coordinate several monthly gatherings designed to connect like-minded information security professionals. In his spare ...

  • speaker photo
    Ed Snodgrass
    Regional Security Principal, Insight Cloud + Data Center Transformation

    Ed has over 20 years of experience in information security, supply chain security, risk, compliance and mergers and acquisitions. Prior to joining Insight, he served as Chief Information Security Officer for Secure Digital Solutions, a consulting firm providing cyber security program strategy, enterprise risk and compliance, and data privacy....

  • speaker photo
    Paul Russo
    Enterprise Security Engineer, Tenable

    Paul is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable he helps organizations reduce risk due to Cyber Exposure.

  • speaker photo
    Cody Johnson
    Intelligence Analyst, FBI
  • speaker photo
    George Schultze
    Supervisory Special Agent, Cyber Crime Task Force , Federal Bureau of Investigation

    Special Agent George Schultzel entered on duty in July of 2010 and was assigned to the New York Field Office. Over the course of his career, SA Schultzel has investigated complex criminal computer intrusions, nation state adversarial action, and cyber terrorism. SA Schultzel is currently serving as the Supervisory Special Agent of the Cyber C...

  • speaker photo
    Moderator: Ed Pascua
    SVP, Simeio Solutions & Director, ISSA
  • speaker photo
    Joseph Thacker
    Sr. Security Consultant, Crowe

    Joseph Thacker, CISSP, is a Senior Staff Member in Crowe’s cybersecurity practice. With experience in software development, automation, and cybersecurity, he is serving in Security Engineer and Analyst roles to assist in the development and maturing of one of Crowe’s cybersecurity programs. He has a Bachelor’s degree in Computer Science and a...

  • speaker photo
    Tim Chapman
    Director of Security Assurance, ADP

    Tim Chapman serves as ADP’s Director of Security Assurance, leading a team that provides security assurance to ADP’s North American clients. Prior to ADP, Tim’s expertise includes over 17 years of information security, operational risk management, business management, and process improvement experience. Additionally, Tim has been involved wit...

  • speaker photo
    Jeff Wheat
    Director, Solutions Engineering, @RISK Technologies, Inc.

    Jeff is the Director of Solutions Engineering at @RISK Technologies as a Technical Director sitting at the nexus of Sales, Deployment, Operations, and Product Development. Interacting directly with customer C-Suite and Technical Staff to drive sales, customer satisfaction, and innovation back into the platform. Jeff provides operational and c...

  • speaker photo
    Tim Callahan
    SVP, Global Chief Security Officer, Aflac

    Timothy L. Callahan, CISSP, CISM, CRISC Senior Vice President, Global Security; Chief Security Officer Tim Callahan joined Aflac in 2014, bringing more than 30 years of experience in information and physical security, business resiliency and risk management. He was promoted to his current role in January 2016, where he is responsible for dire...

  • speaker photo
    Phyllis Woodruff
    VP, Enterprise Cybersecurity Programs, Fiserv
  • speaker photo
    Kim Keever
    CISO & SVP, Security & Technology Services, Cox Communications
  • speaker photo
    Deborah Wheeler
    CISO, Delta Air Lines

    Deborah Wheeler is Delta’s Chief Information Security Officer. In this role, Wheeler leads Delta’s Information Security team responsible for the airline’s cybersecurity efforts that secure and protect information important to Delta and personal to its customers, while ensuring the overall cyber resiliency of the airline.

    Wheeler’s 25 y...

  • speaker photo
    Michael Jones
    Attorney, Trusted Counsel

    Michael is a corporate attorney with a strong background in intellectual property and business-oriented technology. As an Attorney with Trusted Counsel, Michael handles licensing and commercial agreement issues. He advises clients on IP and technology licensing, outsourcing and services agreements. He is responsible for negotiating complex te...

  • speaker photo
    Dominick Frazier
    Security Awareness & Communications Manager, Tenet Health

    Dominick Frazier is a security professional with over 13 years of security experience with his current role being in Information Technology/Cyber-Security. In his current role he serves as the Security Awareness & Communication Manager responsible for the conversation around security between technical and non-technical teams, which extends to...

  • speaker photo
    David Allen
    CISO, State of Georgia - Georgia Technology Authority

    David Allen is the Chief Information Security Officer for the State of Georgia. He leads GTA’s Office of Information Security, which unifies information security responsibilities for the state’s IT enterprise, the Georgia Enterprise Technology Services (GETS) program, and GTA. Prior to joining GTA in 2019, David served as the Chief Informatio...

  • speaker photo
    Graeme Payne
    President, Cybersecurity4Executives

    Graeme Payne has over 30 years' experience in security and information technology risk consulting and IT management. He spent the majority of his career at Ernst & Young prior to joining Equifax in 2011 as VP of IT Risk & Compliance. At the time of the 2017 Equifax data breach, he was CIO of Global Corporate Platforms. He now consults with Bo...

  • speaker photo
    Lori Anello
    VP, Threat Management & Cybersecurity Operations, GE Aviation

    Lori Anello is an adaptive leader with broad background in leading large enterprise teams in the areas of infrastructure, security technology, application architecture, and business solutions. She started her career working for the National Institutes of Health and then moved into private industry in the areas of consulting and manufacturing ...

  • speaker photo
    Kristen Ellis
    Sr. Director, Cybersecurity, Clinical Reference Laboratory, Inc.

    Kristen Ellis is the Security Officer for Clinical Reference Laboratory, Inc. in Lenexa, KS. She obtained her Certified Information Systems Security Professional (CISSP) designation in 2012 and has over 23 years of Information Technology experience, twelve years focused in security. Mrs. Ellis has been instrumental in the development of the s...

  • speaker photo
    Melissa Spicer
    Sr. Manager, InfoSec Ops, Kansas City Power & Light
  • speaker photo
    Moderator: Beth Strobel
    Sales Director, Onspring

    Beth Strobel began her career at a global aerospace and defense company, maintaining responsibility for the ethics and legal compliance training and awareness programs. She's since worked in both technical and sales roles at technology companies providing solutions for cybersecurity and governance, risk and compliance. Beth currently serves a...

  • speaker photo
    James Pointer
    Manager of Information Security , EML Payments
  • speaker photo
    Mike Shine
    Director, Systems Engineering, Mimecast

    Mike has over 15 years’ experience designing and implementing IT security solutions for large enterprises, and he’s currently focused on making email safer for businesses. He actively participates in combating existing cyber threats and researching new threats out of Mimecast’s Chicago office. Mike holds a degree in Computer Engineering from ...

  • speaker photo
    Anne Rogers
  • speaker photo
    Mario Chiock
    Fellow & CISO Emeritus, Schlumberger

    Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the
    company’s worldwide, long-term cyber security strategy. He is recognized for his leadership...

  • speaker photo
    Brandon Bradshaw
    Sales Engineer, Trend Micro

    Brandon has been with Trend Micro for three plus years, and has been in the IT Industry since the late 1990s. As a Sales Engineer, it's his passion to be the technical bridge between sales and customers.

  • speaker photo
    Altaz Valani
    Research Director, Security Compass
  • speaker photo
    Sahba Kazerooni
    CISO, Aviva Canada
  • speaker photo
    Karen Nemani
    Director, Risk, Compliance and Projects, IACS, Opentext
  • speaker photo
    Greg Thompson
    Vice President & CISO, Manulife
  • speaker photo
    Patrick Gray
    IT Security Consultant, Patrick Gray & Assoc LLC
  • speaker photo
    Stanton Gatewood
    CISO, State of Georgia
  • speaker photo
    Vinay Puri
    National Director, Cloud Security, Deloitte

    Vinay is a ex-veteran and a leader in Cyber Security with two decades of experience. He currently leads the National Cloud Security practice for Deloitte Canada. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organization in architecting complete security framework....

  • speaker photo
    Bryan Orme
    Principal & Partner, GuidePoint Security

    Bryan Orme leads the Information Assurance consulting organization; which includes Application Security, Cloud Security, Governance, Risk, and Compliance Services, Threat and Attack Simulation, Incident Response and Forensics. Additionally, Bryan leads the internal IT and Information Security teams as well as the Project Management Office and...

  • speaker photo
    Susan Berezny
    Director, Information Security, Royal Canadian Mint

    Susan Berezny is the Director of Information Security at the Royal Canadian Mint. She is responsible for developing a cybersecurity strategy and managing a risk-based security program aligned with business objectives. Prior to joining the Mint, Susan was with The Ottawa Hospital for 23 years in several roles, including Information Security Of...

  • speaker photo
    Bob Gordon
    Executive Director, Canadian Cyber Threat Exchange

    Robert W. (Bob) Gordon is the Executive Director of the Canadian Cyber Threat Exchange (CCTX). The CCTX is Canada’s private sector organization for the sharing and analysis of cyber threat information, and enabling collaboration across all sectors. Most recently, Bob was a Director, Global Cyber Security at CGI. Prior to this, he enjoyed a lo...

  • speaker photo
    Laura Fey
    Principal, Fey LLC

    Laura Clark Fey, Esq., PLS, CIPP/US, CIPP/E, CIPM, FIP: Laura Clark Fey, one of the first twenty-seven U.S. attorneys recognized as Privacy Law Specialists by the International Association of Privacy Professionals (IAPP) (ABA-accredited), leads Fey LLC, a global data privacy and information governance law firm. She and her team help organizat...

  • speaker photo
    Roger Vann
    Information Security Leader, JANUS Associates, Inc.
  • speaker photo
    Dave Snyder
    Chief Information Security Leader, Independence Blue Cross
  • speaker photo
    Samuel Sutton
    Computer Scientist, FBI, Houston Cyber Squad

    Samuel Sutton is an FBI Computer Scientist. Since 1992 he has worked in Headquarters and Field Offices across the country. He is currently assigned to a Cyber Squad of the Houston Office. Specializing in Computer Security, Network Forensics, "Enhanced Network Capabilities", and Information Security Management, his skills have been applied to ...

  • speaker photo
    Andrew Matushek
    Senior Special Agent, United States Secret Service

    Andrew Matushek is a Senior Special Agent (SSA) with the United States Secret Service. He is also the Assistant Director of the Kansas City Electronic Crimes Task Force (ECTF) and has over 19 years of experience. He has previously served in Arizona, California, and Washington, DC, prior to landing in Kansas City. SSA Matushek is current activ...

  • speaker photo
    Tim Miller
    Lead Cybersecurity Consultant, Trend Micro

    Tim has over 10 years’ experience in Information Security and 33 years working with computer technology. He started his career with the Apple IIe in his first computer class, through achieving his master’s degree in Network Communications Management. Tim has been with Trend Micro for three years, and his experience in Information Security in...

  • speaker photo
    Intel Analyst from the FBI
  • speaker photo
    Lynn Watson
    Director of Compliance and Risk Management, Dinsmore & Shohl LLP

    Lynn is the Director of Compliance & Risk Management for Dinsmore & Shohl, a national law firm with 1,300 attorneys and employees in 26 offices. Lynn oversees the cybersecurity team and is responsible for all firm security policies, procedures, technology, and initiatives, including the incident response program.

  • speaker photo
    Eric Bucher
    Solutions Architect, Cequence Security

    Eric Bucher has over 15 years of experience in the security industry with a technical concentration in financial fraud, advanced persistent threats, forensics, exfiltration, DLP, and overall attack surfaces.

  • speaker photo
    Eugene Kesselman
    Founder and CEO, TapJets

    Eugene Kesselman is Founder and CEO of TapJets, the on-demand private jet charter company headquartered in Houston, Texas. Since 2015 the company has been using blockchain ledger technology to conduct its business and since 2016 became the first private aviation company to instantly accept cryptocurrency as a form of payment for its services....

  • speaker photo
    Gustavo Coronel
    Sr. Cloud Security Architect, Check Point Software Technologies

    Gustavo (Gus) Coronel is a Senior Cloud Security Architect with Check Point Software Technologies and has been involved with network security for over 25 years. His first foray into network security was serving as the first Firewall Administrator at the US Department of Transportation in 1994. Intrusion Detection, Vulnerability Assessments, P...

  • speaker photo
    Fred Kwong
    CISO, Delta Dental Plan Associates

    Fred Kwong is currently the CISO for Delta Dental Plans Association. He is a highly recognized thought leader in security and is often asked to speak and chair at national/international security conferences. Fred serves on several advisory boards and is often asked to consult on matters of security and leadership. He currently holds the CISSP...

  • speaker photo
    Joseph Rogalski
    Sr. Director, Solution Engineering, eSentire Inc.

    Joe Rogalski is an accomplished Technology and Security Professional with over 20 years of experience developing world-class programs and delivering technology-based solutions. He has served in a variety of technical and management positions during his career, including Security Strategist at Symantec and Information Security Officer at Firs...

  • speaker photo
    Axel Peters
    Executive Sales Manager, baramundi Software USA Inc.

    Axel holds his degree in IT Management and has advised more than 300 small businesses and global enterprises in Europe and the U.S. on tools and strategies to keep technology infrastructure up-to-date, safe, and efficient. Now continuing that role at the baramundi U.S. headquarters in Framingham, MA, Axel is actively helping IT departments ad...

  • speaker photo
    Tasha Phelps
    President & CEO, Phelco Technologies, Inc.

    Protecting the integrity of information continues to be a strategic focus within Tasha's cybersecurity efforts. She has seen the impact of businesses being compromised by malicious threats, and shares how building contingency plans can be of value. Her approach is to align business processes with technical solutions to create powerful plans f...

  • speaker photo
    Zaki Abbas
    VP & CISO, Brookfield Asset Management

    An accomplished Information Security and Technology leader with proven ability to develop and align strategies with business priorities and establish strong, trust-based partnerships across executive teams, key stakeholders and board members. Zaki has extensive experience in the insurance, real estate, banking, infrastructure, energy, investm...

  • speaker photo
    Chase Cresgy
    Sr. Healthcare Cybersecurity Consultant, Crowe LLP

    Chase Cresgy attended IUPUI and graduated with a BS in CIT concentrated in information security. He also holds the Security+ and CySA+ certifications. Information/cybersecurity has always interested Chase, and he believes it will be one of the greatest challenges society faces over the next decade. The world of cybersecurity is a fast, ever-c...

  • speaker photo
    Jay Robinson
    Director of Cyber Operations, BlackRock

    BlackRock's Cyber Operations team manages the global 24x7 operations center responsible for cyber monitoring, incident response, cyber intelligence, cyber forensics, and vulnerability management.

  • speaker photo
    Timothy Keese
    Special Agent, FBI
  • speaker photo
    Bob Rudis
    Sr. Director, Chief Security Data Scientist, Rapid7

    Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Bre...

  • speaker photo
    Joel Weinstein
    President, Greater Boston Chapter, Association of Continuity Professionals

    Joel Weinstein, a native of Washington DC, moved to Boston in 1977, formed his first company in 1986, and currently is in his second term as president of the Greater Boston Chapter of ACP. He has taught at Boston University, Northeastern University, Benjamin Franklin Institute, and ITT Technical Institute for over 40 years. Joel is interested...

  • speaker photo
    Adib Sarakby
    Sr. Sales Engineer, Mimecast

    Adib Sarakby joined Mimecast as a Service Delivery and, after a year, was promoted to a Sales Engineer role. He works closely with the Sales, Marketing, and Educational teams to continually enhance Mimecast's products and promote Cyber Resilience. Email Security is Adib's passion, and as the threat landscape evolves, he splits his time betwee...

  • speaker photo
    Jonathan Villa
    Practice Director, Cloud Security, GuidePoint Security

    Jonathan Villa has 19 years of experience as a technology consultant including 18 years of direct information security experience. For over 10 years Jonathan consulted to a large municipality across several competencies including PCI compliance and training, application architecture and security, vulnerability management, secure coding, web a...

  • speaker photo
    Antona Dumas
    Associate, XPAN Law Group

    Antonia M. Dumas is an associate at XPAN Law Group, a certified Women’s Business Enterprise (“WBE”) and Women Owned Small Business (“WOSB”). At XPAN, Antonia works with clients to create proactive, streamlined, and global approaches to cybersecurity and data privacy. She performs audits, assessments and gap analysis of a client’s existing con...

  • speaker photo
    Les Stevens
    Vice President, Information Security, Equifax Canada

    As Vice President of Information Security at Equifax Canada, Les Stevens is responsible for the identification, assessment, and mitigation of inherent, residual, regulatory, security, and compliance risks specifically associated with the business operations of Equifax International business units. His experience building and maintaining infor...

  • speaker photo
    Heather Bearfield
    IT Risk and Assurance Services Leader, Marcum Technology

    Heather B. Bearfield is a principal in the firm’s Boston office and serves as the IT Risk and Assurance Services leader. She is also a member of the national Real Estate, Alternative Investment, Healthcare, and Financial Services Industry groups. In addition, Ms. Bearfield chairs the Marcum Diversity & Inclusion Committee. She has extensive e...

  • speaker photo
    Chris Braden
    Vice President, Global Channels & Alliances, eSentire

    Chris Braden is a veteran sales and channel executive, bringing over 20 years of experience building, leading, and executing successful programs around the world. In his current role as the Vice President, Global Channels and Alliances, he is responsible for eSentire's global channel program, overseeing strategic partner recruitment, internat...

  • speaker photo
    Mike Fabrico
    Sr. Technical Sales Director, TrapX Security

    Mike Fabrico is a security expert that has worked for NASDAQ and has over 20 years of industry experience in implementing, architecting, and maintaining critical infrastructure networks. He is also an advisory board member on a number of successful cybersecurity companies worldwide for APT/malware, network intrusion, threat intelligence, digi...

  • speaker photo
    Joshua Marpet
    Data Protection Advisory Council
  • speaker photo
    Rosemary Christian
    Founder & President, Philadelphia Women and Cyber Security

    Rosemary Christian is the founder and president of the Philadelphia Women & Cyber Security. She has worked in the cybersecurity industry for the last 3 years at AccessIT Group assisting customers with evaluations of their current cybersecurity programs to help them mature their overall security posture. She has a demonstrated passion, knowled...

  • speaker photo
    Robert Wilner
    President, Delaware Valley Chapter, Cloud Security Alliance
  • speaker photo
    Parker Crook
    Senior Sales Architect, SentinelOne

    Parker Crook has been in the security industry for over 10 years across multiple verticals. He has experience working on both blue and red teams and has been asked to speak at various regional security conferences. Some of his speaking engagements have covered topics such as purple-teaming, wargaming, orchestration, and his own research. Park...

  • speaker photo
    Matt Wilson
    Chief Information Security Advisor, BTB Security

    Matt Wilson is the Chief Information Security Advisor for BTB, based in southeastern Pennsylvania. Matt has spent his entire career in IT and has over 14 years of experience within Information Security. Throughout his career, Matt has fostered the development of assessment methodologies, toolsets, and techniques for the delivery of security a...

  • speaker photo
    Bruce Forman
    CISO, UMassMemorial Health Care

    Bruce has several degrees including an MBA in Biotechnology and Health Industry Management. Prior to his current position at UMass, he held other IT Management positions, focusing on Information Security, Risk Advisory, and Security Strategy and Policy, as well as offering consultative services. Bruce is a past president of the Information Sy...

  • speaker photo
    Brian Minick
    CISO, Fifth Third Bank

    Brian Minick is CISO at Fifth Third Bank. Brian has responsibility for the bank’s information protection program. Brian is a noted speaker and published author. He brings 20 years of technology and cybersecurity leadership and experience to this position. Prior, Brian was VP of Managed Threat Services at Booz Allen Hamilton following the acqu...

  • speaker photo
    Brian Tobia
    Consulting Systems Engineer, Cisco

    Brian has been an IT practitioner, consultant, and pre-sales engineer for 15 years, focusing on network and virtualization security. He currently is a consulting systems engineer covering cloud security solutions at Cisco. He holds a CISSP along with other industry certifications.

  • speaker photo
    Andrew Dutton
    CISO, DuHart Consulting

    Strategic Global Cybersecurity leader that is accomplished in complex multinational organizations. Strong interpersonal skills and communicator. Extensive experience in cybersecurity, compliance, governance, architecture. Expert in deployment of enterprise standards, processes, and policies. Strong project management experience. Dedicated and...

  • speaker photo
    Christopher Stephen
    Senior Sales Engineer, SentinelOne

    Chris Stephen is a Senior Sales Engineer at SentinelOne. Chris has over a decade of experience in the IT field, from his initial startup where he designed end-phase punch management systems for commercial and residential builders, to his work at Apple to his work in the medical industry. Chris is a ‘Jack-of-all-trades’ when it comes to IT.

  • speaker photo
    Grant Asplund
    Growth Technologies Evangelist, Check Point Software Technologies

    For more than 20 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his passionate and relational storytelling at conferences like RSA and Next100 C...

  • speaker photo
    Kevin McPeak
    Principal Cyber Architect, U.S. Federal Government, Symantec

    Kevin McPeak is Symantec’s Principal Cyber Architect for the U.S. Federal Government. In this capacity, he serves as the technical SME for eight distinct enterprise defensive technologies. In addition to his CISSP and ITILv3 certifications, Kevin also holds two Masters of Science degrees from Johns Hopkins University and Virginia Tech. In add...

  • speaker photo
    Ondrej Krehel
    CEO and Founder , LIFARS

    Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise. He actively participates in many high-profile engagements around the world whereby his proprietary methodology is leveraged to achieve the most rapid root-cause analysis and remediation.
    He’s the former Chief Information Security Officer ...

  • speaker photo
    Katie Creaser
    SVP and Cybersecurity Practice Lead, Affect

    Katie is a Sr. Vice President, Cybersecurity Lead at Affect, where she provides counsel to clients that are looking to bring PR and social media into their communications program as part of a thoughtful, holistic strategy. Katie is passionate about helping brands of all shapes and sizes find unique and creative ways to tell their story. She w...

  • speaker photo
    Seth Robertson
    Principal, Nocturn Security

    Seth is a dynamic information security leader with fifteen years’ experience building best-in-class programs – including launching a security startup, managing NASA’s incident response program, founding the Security Operations Center at a top Wall Street firm, and leading the security program for a global tech company. His work has been used ...

  • speaker photo
    Sandra Fathi
    President, Affect

    Sandra Fathi has spent the last 20 years helping technology, healthcare and professional services companies achieve their goals. As President and Founder of Affect, a public relations, marketing and social media agency, Sandra has successfully led the company with consistent growth since the agency’s inception in 2002. Sandra’s commentary has...

  • speaker photo
    Jimmy Mills
    Senior Solutions Architect, SSH.COM

    Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.

  • speaker photo
    Kenneth Olmstead
    Internet Privacy & Security Analyst, The Internet Society's Online Trust Alliance

    Kenneth (Kenny) Olmstead is the Internet Security & Privacy Analyst that helps research, analyze, write, and review technical content relating to The Internet Society's Online Trust Alliance issues—identity, security, privacy, and data stewardship. He also helps with communications and engages the OTA Committees on technical and techno-policy...

  • speaker photo
    Jodi Daniels
    Founder & CEO & Privacy Consultant, Red Clover Advisors, LLC

    Jodi Daniels, founder of Red Clover Advisors, is a Certified Informational Privacy Professional (CIPP/US) with more than 20 years of experience helping a range of businesses from solopreneurs to multi-national companies. Red Clover Advisors has helped hundreds of companies create privacy programs, achieve GDPR compliance, and establish a secu...

  • speaker photo
    Tasneem Nipplewala
    VP, Information Security; MSIA, CISSP, CCSP, Eastern Bank

    Tasneem is a Senior Security Architect at Eastern Bank, the largest and oldest mutual bank in the country with $11B in assets. As part of her responsibilities, she provides internal clients security services when implementing new initiatives across the bank and insurance company to ensure the solutions are built with the highest security stan...

  • speaker photo
    Jason Barr
    CIO & CISO, Aptean

    Jason is currently the CIO and CISO of Aptean, leading the IT, security and governance, cloud hosting services, and business systems teams. He's been in the technology sector for over 20 years and has a passion for taking things apart and making them better.

  • speaker photo
    Jockel Carter
    Sr. Cybersecurity Advisor, Sage Data Security
  • speaker photo
    Jeremy Rucker
    Attorney, Spencer Fane LLP

    As a cybersecurity and data privacy attorney in the Dallas office of Spencer Fane LLP, Jeremy Rucker has assisted companies of all sizes in responding to data security and privacy incidents. The expertise of Jeremy and his Spencer Fane colleagues cover several industries including healthcare, banking and finance, insurance, energy, transporta...

  • speaker photo
    Dr. John Opala
    VP, IT Security, McCormick

    Cybersecurity thought leader with over 19 years of technical and leadership experience in multiple disciplines.

  • speaker photo
    Fred Gordy
    Director of Cybersecurity , Intelligent Buildings, LLC

    Fred Gordy is the Director of Cybersecurity at Intelligent Buildings, LLC and is a nationally recognized thought leader, speaker and expert in building systems cybersecurity specializing in organizational and technical vulnerabilities. He has over 20 years of industry experience including information technology and building controls systems. ...

  • speaker photo
    Tom Tollerton
    Sr. Manager, IT Advisory, DHG

    Tom has 15+ years of experience in the IT industry, and has extensive experience performing SOC 1 and 2 examinations and reporting, cybersecurity risk assessments, PCI compliance assessments, and system security assessments. Tom is one of DHG’s PCI Qualified Security Assessors and has completed multiple Reports on Compliance for PCI Level 1 m...

  • speaker photo
    Bryan Bechard
    Fractional CISO, CISO4hire

    Bryan has been working in InfoSec for 20 years as an individual contributor and management of security professionals. Currently, he is the CISO of an auto finance company and Board member of the (ISC)2 Philadelphia chapter. Current certs: CISSP, CSSLP, CRISC.

  • speaker photo
    Velu Jeganathan
    VP, Security Engineering Solutions Team, State Street Corporation

    Velu Jeganathan has more than 20 years of IT experience, most of which is around Information Security. He has been extensivly involved in various roles in penetration testing, vulnerability management, security project consulting, and developing security processes, with an emphasis on integrating security into the project lifecycle.

  • speaker photo
    Vince Fitzpatrick
    Cyber Risk Program Manager, Christiana Care Health System

    Vince Fitzpatrick has experience greater than some and less than others. Currently he is the Cyber Risk Program Manager at Christiana Care Health System (CCHS), one of the largest health care providers in the mid-Atlantic region, serving all of Delaware and parts of PA, MD, and NJ.

  • speaker photo
    Jim Menkevich
    Sr. Sales Engineer, Netskope

    Jim Menkevich is an Information Security, Privacy, and Risk Management professional with 19+ years of experience. Through his career, he has led teams in Cybersecurity, Enterprise Architecture, Systems Integration, and Application Development. Jim specializes in applying methodologies, frameworks, and ideas outside of the intended domain, whi...

  • speaker photo
    Joe Walsh
    M.A.C.J. Program Director and Assistant Professor of Criminal Justice/Computer Science, DeSales University

    Joe Walsh teaches digital forensics and computer security at DeSales University. He previously worked as a senior security consultant where he performed security assessments, conducted penetration testing, and responded to computer security incidents. He has been a police officer for 13 years and is a former member of the ICAC Task Force and ...

  • speaker photo
    Charles Sgrillo
    Professor of Cybersecurity, Drexel University

    Charles Sgrillo is an adjunct professor of cybersecurity at Drexel University, teaching on topics such as IT Auditing, Cybersecurity, Penetration Testing, and Computer Forensics. During his time as a principal consultant, Charles has worked with over 50 businesses to implement the NIST Cybersecurity Framework. Along with teaching at Drexel Un...

  • speaker photo
    Christian Espinosa
    CEO, Alpine Security

    Christian Espinosa is Alpine Security's CEO/Founder and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a US Air Force veteran with a BS in Engineering from the US Air Force Academy and MBA from Webster University. Christian holds multiple patents on cyberse...

  • speaker photo
    Daniel Smith
    Head of Security, Emergency Response Team, Radware

    Daniel Smith is the Head of Security Research for Radware's Emergency Response Team and provides executive insight for SC Magazine. Daniel's research mainly focuses on network and application based vulnerabilities. As a white-hat hacker, his expertise in criminal tactics, techniques, and procedures (TTP) helps Radware develop signatures and m...

  • speaker photo
    Roy Wattanasin
    Information Security Leader, Healthcare Industry

    Roy Wattanasin is currently a healthcare information security professional. Additionally, Roy is an avid speaker who has spoken at many conferences and webinars. Roy also enjoys data forensics & incident response and building security in. He is heavily involved with many computer security groups including OWASP Boston, ISSA and the local comm...

  • speaker photo
    Ron Reidy
    Audit Analytics Leader, Wells Fargo

    Ron has been working in IT for over 30 years. Starting as a software engineer writing database programs on CP/M, MSDOS, VAX/VMS, and UNIX in C, Pascal, VAX/VMS assembler, and FORTRAN. After 15 years, he switched into a database administration role, managing large Oracle databases as well as smaller SQL Server and Sybase databases. Ron became ...

  • speaker photo
    Ernesto DiGiambattista
    CEO & Founder, CYBRIC

    Ernesto DiGiambattista founded CYBRIC to enable organizations to more easily, confidently and holistically answer the question “How secure are we?” Prior to founding CYBRIC and developing the CYBRIC Continuous Application Security Platform, Ernesto was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, responsibl...

  • speaker photo
    Michael Brown
    Rear Admiral, U.S. Navy (Ret.), President, Spinnaker Security LLC; ACSC Board Clerk

    Michael Brown, Rear Admiral, United States Navy (Retired) is the Founder and President, Spinnaker Security LLC, a cybersecurity consulting business focused on understanding, identifying and mitigating business risks associated with cybersecurity. Additionally, Brown brings executive leadership, including crisis management, from both public an...

  • speaker photo
    Salar Atrizadeh, Esq.
    Attorney at Law, Law Offices of Salar Atrizadeh

    Salar Atrizadeh, Esq. is an attorney and IT expert with an extensive background in technology and computer information services. He has conducted seminars before legal and non-legal organizations on similar topics. Salar is licensed to practice in the State of California, District of Columbia, and the United States District and Bankruptcy Cou...

  • speaker photo
    Matt Connors
    Identity and Access Management Program Manager, University of New Hampshire

    Matt Connors is the Identity and Access Management Program Manager for the University of New Hampshire. His role sits at the cross section of enterprise infrastructure, client experience, and security; as well as leading IAM strategy and practice for a Tier 1 Research University. Matt enjoys collaborating and sharing knowledge with technolog...

  • speaker photo
    Edward Davis
    President & CEO, Edward Davis, LLC

    Davis has been in law enforcement for 35 years. He served as the Police Commissioner of the City of Boston from December 2006 until October 2013. He administered 6 world championship celebrations and led the highly successful response to the Boston Marathon bombing. Prior to that, Davis was the Superintendent of the Lowell Police Department, ...

  • speaker photo
    Sean Baggett
    Sr. Director, Information Security, Blue Cross Blue Shield of MA

    Sean Baggett is the Senior Director of Information Security at Blue Cross Blue Shield of Massachusetts. After spending 10 years as a United States Naval Officer, Sean has worked exclusively in Information Technology and Cybersecurity. He has held senior leadership positions at Boston Medical Center & Massachusetts Eye and Ear Infirmary before...

  • speaker photo
    Bryan Scovill
    Manager, Telecom & Network Ops, University of New Hampshire

    Lead of the network security team at the University of New Hampshire for 18 years. Areas of focus include development and architicture in the UNH networking enviroment.

  • speaker photo
    Hazel Cerra
    Senior Special Agent, United States Secret Service

    Hazel Cerra is a Senior Special Agent (SSA) with the United States Secret Service out of the Philadelphia Field Office assigned to the Financial Fraud Division. She has over 19 years of experience in protection and investigations. She began her career investigating counterfeit currency, identity theft and credit card fraud. In 2009, she was t...

  • speaker photo
    Anahi Santiago
    CISO, ChristianaCare Health System

    Anahi Santiago is the Chief Information Security Officer at ChristianaCare Health System, the largest healthcare provider in the state of Delaware. Prior to CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. In her role as CISO, Anahi has overall responsibility for the organization's ...

  • speaker photo
    Craig Newell
    Manager, Information Security, Ontario Cannabis Store

    Craig is in the business of mitigating privacy and data loss disasters. Constantly keeping abreast of new challenges and developments in the industry, he has evangelized risk-based security and control through the banking and utility industries, private business, governmental agencies, and now, online sale of a really exciting product. A beli...

  • speaker photo
    Bruce Schneier
    Security and Cryptography Expert and Author

    Bruce Schneier is an internationally-renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the best-seller "Click Here to Kill Everybody"—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over ...

  • speaker photo
    Arvin Verma
    Cybersecurity Strategist, InfraGard National Sector IT Subject Matter Expert

    Arvin Verma is a highly motivated and talented cybersecurity professional with over 8 years of experience across a diverse set of cyber domains and industries such as Aerospace and Defense, Technology, Financial and Insurance, Commercial Retail, Manufacturing and several more. He has filed more than 4 invention disclosures in the field of cyb...

  • speaker photo
    Samantha Dutton
    President , DuHart Consulting

    Dr. Samantha Dutton is the President of DuHart Consulting where she works with her husband in addressing cybersecurity business needs, as it impacts the human factor. She is also an Associate Dean and the Director of the Social Work Program in the College of Social and Behavioral Sciences at the University of Phoenix. She is a Licensed Clinic...

  • speaker photo
    Calvin Nobles
    Cybersecurity Policy Fellow, New America Think Tank, New America

    Dr. Nobles is a Cybersecurity Scientist and practitioner with more than 25 years of experience. He teaches cybersecurity at several universities. He recently retired from the Navy and is currently employed in the Financial and Services Industry. Dr. Nobles is a Cybersecurity Policy Fellow with the New America Think Tank. He authored a book on...

  • speaker photo
    Joseph Fontecchio
    Director of Infrastructure and Database Services, The University of Massachusetts

    Joe is currently the director of infrastructure and database services for The University of Massachusetts Information Technology Services department, leading a team of security professionals who support infrastructure and applications used to host shared services. He holds a master’s degree in Information Technology from Worcester Polytechnic...

  • speaker photo
    Girish Chiruvolu
    Director, Information Security Risk Management, Experian

    Dr. Chiruvolu is a CISSP/CISM and has spent several years in the security industry and in particular Finance/e-Commerce and Enterprise industries on cloud/SaaS technologies. He is currently Director Information Security and risk management, and has lead several successful programs on several fronts of Information Security, Risk management and...

  • speaker photo
    Helen Patton
    Advisory CISO, Cisco; Former CISO, The Ohio State University

    With more years working in the Security, Risk, Privacy and Resiliency professions than she cares to say, Helen Patton advocates using information risk, security and privacy to enable the mission of organizations and to support society at large.

    Helen is an Advisory CISO at Duo Security (now CISCO), where she shares security strategies ...

  • speaker photo
    Rori Boyce-Werner
    Information Security Compliance Program Manager, University of New Hampshire

    Rori Boyce-Werner is currently the Information Security Compliance Program Manager for the University of New Hampshire, where she was previously the Associate Director of IT Client Services and Identity and Access Management Service Owner.She holds a Bachelor’s of Science in Business Administration and is working towards her Masters of Cybers...

  • speaker photo
    Michael Gough
    Founder, IMF Security

    Michael is a Malware Archaeologist, Blue Team defender, Incident Responder and logoholic. Michael developed several Windows logging cheat sheets to help the security industry understand Windows logging, where to start and what to look for. Michael is co-developer of LOG-MD, a free tool that audits the settings, harvests and reports on malicio...

  • speaker photo
    Kalani Hausman
    Adjunct Professor, University of Maryland University College
  • speaker photo
    James Baird
    Founder and Manager, Cybersecurity Management Consultants, LLC

    As a CISO, James has seen his role oversee all the programs and processes involved with Information Security, Operational Security, Technology Risk Management, and IT Compliance, . He has designed and implemented security programs using the ISO 27001, NIST RMF, NIST ICTSCRM, NIST CSF, and ITIL. James holds a Master of Science degree in Inform...