- Marissa Gomez-PalmerHead of Security and Compliance, TrueCar
Marissa Gomez-Palmer is an Entrepreneur, Writer, Artist, and Cybersecurity and Governance, Risk and Compliance professional with 12+ years of experience. She's worked in the Technology, Finance, & Publishing industries.
- Divyesh MalkanPresident, ISSA New England Chapter
Divyesh Malkan is an experienced professional specializing in information security, risk management, and compliance. In addition to serving as a Director in Protiviti’s Security & Privacy consulting practice, he serves as President of the ISSA Delaware Valley Chapter.
Divyesh has 15+ years of experience, having developed expertise acro...
- Ryan FrazierSr. Solutions Engineer , Snyk
Ryan Frazier is a Senior Solutions Engineer at Snyk, helping businesses build safer software. As a bridge between technology and people, Ryan works closely with developers, security teams, and executives to understand their needs and find the best ways to protect their applications from security threats and improve their security posture. Pri...
- Mohammad EshanAssociate, Red Team, BlackRock
Mohammad Eshan is an Associate at BlackRock with a focus in Red Team and Cloud Security. After achieving his Bachelors and Masters in Cybersecurity from the Rochester Institute of Technology (RIT), he joined BlackRock’s Cyber Operations team, where he performs adversary emulation and deploys advanced tactics to assess and harden enterprise de...
- Brittany BodaneSenior Product Marketing Manager, AppOmni
Brittany Bodane is a Senior Product Marketer at AppOmni, where she works closely with security leaders, customers, and partners to better understand and communicate evolving SaaS security challenges. She translates these insights into strategies and education that help organizations secure their SaaS environments. Passionate about learning fr...
- Troy WilkinsonGlobal CISO & Member of the Cyberhaven CISO Advisory Board
Troy Wilkinson began his career serving others as a Law Enforcement officer. He commanded a Joint Terrorism Task Force, was a lead bomb investigator, and violent crime and homicide detective. However, one of his greatest achievements came from his ability and skill investigating and prosecuting child exploitation and other electronic crimes. ...
- David Fiore, ModeratorPhiladelphia InfraGard Members Alliance
During his 20+ year career in cybersecurity David has served as a recognized Philadelphia
executive leader at major healthcare, CPG, insurance, and financial organizations in the
region including Atlanticare, Cigna, Campbell Soup, Iroko Pharmaceuticals, and Beneficial
Bank.In David’s most recent role as Corporate Di...
- Julian SalinasEnterprise Systems Engineer, Veeam
Julian Salinas is a seasoned Systems Engineer with extensive experience in data protection strategies, cloud initiatives, and datacenter consulting. Currently, he serves at Veeam, as a Enterprise Systems Engineer engaging with customers on Data Protection and Data resiliency as a trusted advisor in their journey. With Julian's expertise in Vi...
- Stephen GyarmatiPrincipal Solutions Architect – Lead, Cohesity
Stephen Gyarmati is a Principal Solutions Architect - Lead at Cohesity responsible for the Northeast region. In his current role, he interfaces with global and enterprise financial industry professionals to accelerate their adoption of the Cohesity data security and management platform. Stephen has also worked in Systems Engineering roles in ...
- Sasi Siddharth (Sid) MuthurajanSr. Director, Security Assurance, Salesforce
Sid Muthurajan leads efforts in securing large organizations, particularly focused on developer-centric security controls across the SDLC. He has experience in driving security initiatives across SaaS platforms within Salesforce. Prior to his current role, Sid worked at HP where he researched web application scanning techniques and DNS-based ...
- Ryan DavisCISO, NS1, an IBM Company
Ryan Davis is the CISO at NS1, an IBM Company, which delivers premium DNS and traffic steering solutions. With two decades of experience in information technology and security, he leads and unifies corporate security strategy. He previously served as CISO and CIO at software security firm Veracode, where he led global IT operations, security ...
- Christopher RichBISO, MassMutual
Christopher Rich is a seasoned cybersecurity executive with deep expertise in cyber risk management, identity and access management (IAM), and security strategy. As the Business Information Security Officer (BISO) at MassMutual, he advises multiple business lines, driving security transformation and aligning cybersecurity initiatives with bus...
- Tom FilipponeDeputy Regional Director, Region 1, DHS CISA
Tom Filippone serves as the Region 1 Deputy Director for the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Region 1 consists of the six New England states of Connecticut, Maine, Massachusetts, New Hampshire, Rhode Island, and Vermont. Mr. Filippone assumed the Region 1 Deputy Director role in May 2022.
Prior to his role...
- Brandon PritzVP, Cybersecurity (CISO) & IT Operations, Jet Aviation
Brandon Pritz is a forward-thinking cybersecurity leader serving as Vice President of Cybersecurity (CISO) and IT Operations at Jet Aviation in West Palm Beach, Florida. In this role, he’s revolutionized the security department, driving efficiency, and transforming it into a streamlined powerhouse that slashes breach risks while aligning with...
- Yuri SoldatenkovDirector of Cybersecurity, Kemper Development Company
Yuri Soldatenkov is a relentlessly dedicated cybersecurity leader with 20+ years of front-line experience driving enterprise security strategy, risk management, and infrastructure resilience. As Director of Cybersecurity at Kemper Development Company, he leads initiatives to strengthen security defenses and keep the organization ahead of evol...
- Mike Elkins, ModeratorChief Human & Information Security Officer, BAMF Institute of Science and Technology (BAMFIST)
Meet Michael Elkins, Chief Human and Information Security Officer at BAMFIST and a visionary in cybersecurity, enterprise risk, and digital transformation. With 26 years of experience, he has helped Fortune 500 companies and global organizations navigate the complexities of risk, compliance, and IT modernization-always with a sharp focus on p...
- Robert McKeeGlobal VP, Defense.com
Robert is passionate about transforming how businesses approach their cybersecurity challenges. His customer-centric approach has helped hundreds of organizations strengthen their security posture while maintaining operational efficiency. Throughout his career, he has been particularly passionate about democratizing enterprise-grade security ...
- Jacob BerryCISO, Jit
Jacob Berry has always been drawn to the mechanics of how things work—whether it’s the inner workings of a security system, the precision of a well-tuned motorcycle, or the balance of flavors in a perfectly crafted dish. With over 15 years in cybersecurity, he’s built a career on breaking things down, refining them, and pushing the boundaries...
- Reese D'HerckensSr. Director of Systems Engineering, ExtraHop
Reese D'Herckens is the Senior Director of Systems Engineering at ExtraHop, an IT security and analytics company. Reese is a long-time member of the ExtraHop team and leads the Systems Engineering team for the Americas, drawing on his 26 years of experience in IT. Reese has worked at large enterprise companies, such as The New York Stock Exch...
- Rafael RamirezVendor Risk Manager, Manulife
Rafael Ramirez is a cybersecurity professional with over 20 years of experience in global network routing, IT management, and cybersecurity. He has worked with major enterprises, including Magna International, IBM, TD Bank, and Telefonica, leading initiatives across the health, finance, technology, and mobility sectors. Currently, at Manulife...
- Peter StickleSr. Systems Engineer, Veeam
Peter Stickle is a Senior Systems Engineer at Veeam Software Canada, Inc., located in Ontario. With extensive expertise in Data Protection, Peter has been pivotal in advancing technical excellence and innovation within the organization, as well as with large commercial, public sector, and enterprise clients. Peter collaborates closely with cu...
- Matt PourSales Engineering, Island
Matt Pour leads Island's North America Sales Engineers. Matt brings decades of Information Technology and Information Security experience from establishing ITIL practices and InfoSec programs in Fortune 500 companies to engineering/architecting InfoSec business challenges for customers of some of the world's leading technology and cybersecuri...
- Eric SkinkleBusiness Continuity Manager, Children's Hospital of Philadelphia
Eric Skinkle is the Business Continuity Manager at Children’s Hospital of Philadelphia (CHOP), a world class pediatric healthsystem. Eric’s responsibilities include leading the relaunch and oversight of the business continuity (BC) program, including business impact analysis, continuity plans and development of BC Champions. With a career spa...
- BlackRock Representatives
- Aaron WeaverOWASP King of Prussia Chapter Leader; Director of Cloud Security, Financial Services
Aaron Weaver manages the security program for a credit card processor. He also trains companies on secure code, threat modeling and cloud security. When he's not busy "securifying" he enjoys making sawdust in his workshop.
- Romen BrewerBISO, Humana
Romen Brewer is an accomplished Business Information Security Officer (BISO) with a track record of driving security and technology efforts to meet business demand across various industries (Oil & Gas, Software/Gaming, Financial services, and Healthcare).
As a BISO at Humana, he serves a as trusted advisor ensuring security is a busin...
- Octavio HerreraChairman of the Board, Oil and Natural Energy Information Sharing and Analysis Center (ONE-ISAC)
Octavio Herrera, a cum laude graduate from Norwich’s University MSIA program, has held a number of information security positions within Fortune 500 companies. During his 25+ years career he has led the regulatory compliance program at Alcoa’s largest business unit, managed the IT Security program for American Family Life Assurance Company of...
- Sanjay SharmaCISO, Zafin
Sanjay Sharma is a cybersecurity leader and military veteran with over 20 years of experience in enterprise security, risk management, and IT governance. As CISO at Zafin, he drives security strategy, compliance, and incident response, having led cybersecurity programs for Fortune 500 companies, global enterprises, and government agencies. Wi...
- Paul KinderExecutive Cybersecurity Strategist, Global Security Strategy Office, CDW
Paul Kinder is a distinguished member of CDW’s Global Security Strategy Office (GSSO), where he provides advanced security consulting and enhances the solutions portfolio for CDW’s cybersecurity, data privacy, and Artificial Intelligence (AI) services. As a recognized speaker on topics ranging from AI to cybersecurity maturity, Paul has deliv...
- Katie LedouxCISO, Attentive
Katie Ledoux is the Chief Information Security Officer at Attentive, an AI-powered mobile marketing platform, where she oversees the company’s Security and IT functions. She has a proven track record of building high-performing teams and advising emerging companies through technology and operational challenges. She holds an MBA from the MIT S...
- Sean Deuby, ModeratorPrincipal Technologist, North America, Semperis
Sean Deuby brings more than 30 years’ experience in enterprise IT and hybrid identity security to his role as Semperis' Principal Technologist, North America. An original architect and technical leader of Intel's Active Directory and a 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His expe...
- Justin ShipeCybersecurity Architect & Strategist, Fiserv
Justin is a cybersecurity architect and strategist at Fiserv, the world's largest fintech company. He has worked as a a technology and security professional for more than twenty years. His industry expertise is in financial services and software-as-a-service.
- Travis SmithVP of ML Threat Operations, HiddenLayer
Travis Smith is the Vice President of ML Threat Operations at HiddenLayer where he is responsible for the services offered by the organization, including red-teaming machine learning systems and teaching adversarial machine learning courses. He has spent the last 20 years building enterprise security products and leading world class security ...
- Rob FitzgeraldField CISO, Blue Mantis
Rob is the Field CISO of Blue Mantis and the former founder/CEO of Arcas Risk Management (acquired by Blue Mantis in March 2023). Rob specializes in cybersecurity consulting with a focus on developing and implementing cost effective, enterprise-class solutions for organizations of all sizes. He is passionate about developing cybersecurity tal...
- Neil AshworthSr. Solutions Architect for Security, Druva
Neil Ashworth, originally from Manchester, England, has been working in public-private cybersecurity for 24 years, starting out in Royal Navy Intelligence SIGINT, helping define early guidance around Cyber Intelligence operations, then migrating to the U.S. 10 years ago and working as a Cloud Security Strategist at Nutanix helping customers e...
- Bart LenaertsSr. Threat Intel Product Marketing Manager, Infoblox
Bart Lenaerts is a Senior Threat Intelligence Product Marketing Manager with Infoblox. Bart is a 20+ year veteran in Network Systems & Security with a focus in Digital Risk Management and Automated Investigations.
- Todd CovertCISO, National General
Todd is a seasoned cybersecurity executive with over two decades of experience driving information security strategies in highly regulated environments. As Chief Information Security Officer at National General, he has spearheaded transformative initiatives and the integration of acquired organizations. With a passion for fostering proactive ...
- Jason CookField CTO, Americas, Rubrik
Jason brings over 25 years of experience in information systems and technology. He’s held a variety of roles and responsibilities in disciplines ranging from sales to consulting to project management. Jason’s true passion is engaging with clients, both current and prospective, as well as partners and industry personas in fact-based dialogue...
- OWASP Representative
- ISSA Representative
- ISACA Representative
- CSA Representative
- WiCyS Representative
- InfraGard Representative
- Shawn KeeleyManager of Information Assurance, Blue Cross & Blue Shield of Rhode Island
Shawn Keeley oversees the Information Assurance program at Blue Cross & Blue Shield of Rhode Island, which includes threat intelligence and incident response, third-party risk management, and governance, risk, and compliance. He brings over six years of expertise in Information Security and Privacy.
Shawn holds multiple academic degre...
- Farzia KhanSr. Manager, Information Security, TD
Farzia Khan is an award-winning tech leader, cybersecurity advocate, and champion of innovation. As the Senior Manager of Information Security at TD Bank, she has spearheaded enterprise-wide cyber resiliency initiatives, strengthening defences, raising awareness, and equipping colleagues and customers with the knowledge to navigate evolving c...
- Philip WalleySr. Product Marketing Manager, Cato Networks
Philip Walley is a Senior Product Marketing Manager at Cato Networks, where he focuses on showcasing the transformative potential of Cato’s single-vendor SASE platform. With over 20 years of experience in IT and technology marketing, he has developed a strong understanding of how converged networking and security solutions can empower organiz...
- Sanjay Sharma, ModeratorCISO, Zafin
Sanjay Sharma is a cybersecurity leader and military veteran with over 20 years of experience in enterprise security, risk management, and IT governance. As CISO at Zafin, he drives security strategy, compliance, and incident response, having led cybersecurity programs for Fortune 500 companies, global enterprises, and government agencies. Wi...
- Cyberhaven Representative
- Josh BrownSr. Director, Cybersecurity Compliance, Ally Financial
Josh Brown is currently the Senior Director of Cybersecurity Compliance at Ally Financial with an oversight role for cyber-threat related compliance activities as well as effective challenge and oversight of Ally’s cybersecurity threat posture. He joined Ally with his background in working broadly across the financial services sector and othe...
- Rehman KhanChief Information Security Architect, Netskope
Rehman is the Head of Security Architecture & Engineering - Chief Information Security Architect at Netskope. Prior to joining Netskope, he led Security Architecture and Infrastructure Engineering teams at Financial Services, Biotechnology and Hospitality organizations.
Rehman is a frequent speaker at industry conferences, including pr...
- Nick PanosSr. Cybersecurity Advisor, Office of the CISO, Google Cloud Security
Mr. Panos supports Google Cloud’s Manufacturing and Industry clients worldwide throughout their cloud transformation journeys and focuses on cybersecurity, regulatory compliance, risk management, and privacy.
Before joining Google, Nick was a Director of Customer Success at a late stage AI/ML startup where he led digital transformation...
- Monica RomeiBoard Secretary, WiCyS Delaware Valley; SOC Sr. Manager, Security Risk Advisors
Monica leads a global team of 150 cybersecurity analysts, providing 24x7x365 monitoring and response services. She oversees the delivery of Enterprise and XDR SOC services using SRA’s SCALR™ XDR platform, enhancing security capabilities while minimizing costs.
Monica specializes in talent leadership, performance and project management...
- Weston BainbridgeSr. Solution Engineer, Tanium
Weston started his career at Newrez where he focused on Desktop Administration, as well as Identity and Access Management. Weston has been at Tanium going on four years where he is now a Sr. Solutions Engineer, focusing on technical pre-sales engagements.
- Thomas Hart, ModeratorPresident & CISO, Cyber Guide LLC
Thomas F Hart - Tom has been in the IT field since 1978(EDP), starting as a programmer trainee (Assembler and COBOL). First computer worked on was an IBM360 system (PCs were a long way off). He has been a Programmer, Systems Analyst, Operating Systems Programmer, Network Systems Programmer, DR / BCS Specialist, IT Auditor, GRC, Sr. Security A...
- Richard SheinisPartner, Hall Booth Smith, P.C.
Richard Sheinis has litigated in federal and state courts for 37 years and has been the first
chair for approximately 175 jury trials. His clients have included health care professionals and
institutions, technology companies, and global business entities.Rich takes advantage of his litigation background to work with bus...
- Michael MartinDeputy CISO, Allspring Global Investments
Michael has worked in almost every level of information technology, starting in networking and network security in the late 1990s. He has provided security and infrastructure knowledge to companies in the high-tech, financial services, and manufacturing fields as well as professional development and dev-ops. Most recently he helped develop an...
- Phil KirkDirector, Region 7, DHS CISA
Phil Kirk is the Region 7 Director for the Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. Department of Homeland Security (DHS). Region 7 is headquartered in Kansas City, Missouri, and serves the states of Iowa, Kansas, Missouri and Nebraska. CISA is the Nation’s risk advisor, working with partners to defend against today...
- Jim Doggett, ModeratorCISO, Semperis
James (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser ...
- Kelly Meerbott, ModeratorAward-Winning Leadership Coach + TEDx Speaker
When Kelly Meerbott began her coaching career more than 16 years ago, she recognized that resilience, adaptability, and strategic agility were among her greatest assets. She understood that leadership coaching wasn’t just about refining executive presence but also helping leaders in high-stakes environments harness their strength, clarity, an...
- Monique St. JohnVP, CISO, Associate CIO, Children's Hospital of Philadelphia
Monique St. John is the Chief Information Security Officer (CISO) and Associate Chief Information Officer (ACIO) at the Children’s Hospital of Philadelphia (CHOP). In this role, Monique supports the organization’s mission and strategic plan with responsibility for the enterprise Information Security program. With over 25 years of experience i...
- Michael L. Woodson, ModeratorDirector, Information Security & Privacy (former), Sonesta Hotels
Michael Woodson was formerly Sonesta’s Director of Information Security and Privacy and the Chief Information Security Officer (CISO) for the Massachusetts Bay Transit Authority, the public agency responsible for operating most of the transportation services in Greater Boston, Massachusetts. He was responsible for the MBTA’s total information...
- Brandon BorodachField CTO, Sumo Logic
Brandon K. Borodach is a cybersecurity thought leader and Field CTO at Sumo Logic, specializing in SIEM evolution, detection engineering, and cloud security. With deep expertise in security analytics, AI-driven threat detection, and multi-platform SIEM strategies, he has helped organizations modernize their security operations. Brandon has le...
- Lindsay KayeVice President, Threat Intelligence, HUMAN Security
Lindsay Kaye is the Vice President of Threat Intelligence at HUMAN Security. Her technical specialty spans the fields of malware analysis and reverse engineering, with a keen interest in dissecting custom cryptographic systems. Prior to her work at HUMAN, Lindsay served as Senior Director of Advanced Reversing, Malware, Operations and Reconna...
- Jorge OrchillesSr. Director, Readiness and Proactive Security Team, Verizon
Jorge Orchilles is a leader in Cyber Security and currently a Senior Director at Verizon running the Readiness and Proactive Security Team (Enterprise Vulnerability Assessment, Penetration Testing, Red Team, Dedicated Purple Team, and the AI Red Team). He is the author of the Purple Team Exercise Framework and creator of the C2 Matrix project...
- Michaela CloustonSr. Manager, Enterprise Security Education, Bank of Montreal
Michaela Clouston is a cybersecurity leader specializing in workforce development, security education, and risk management. As the Senior Manager of Enterprise Security Education at Bank of Montreal, she designs and leads training programs, exercises, and cybersecurity behavioral remediation initiatives to strengthen awareness across the ente...
- Bryan HumeSecurity Evangelist & Solution Manager, Security Operations, Fortinet
Bryan Hume, along with his team of specialists in Fortinet’s SecOps group, helps organizations strengthen their security teams with a combination of technology and engineering expertise. Over the course of his career, Bryan has been afforded the opportunity to work with different organizations across a wide range of industries, each presentin...
- Joe SarkisianManager, Lead Penetration Tester, Wolf & Company
Joe serves as a Manager on Wolf & Company’s Information Technology Assurance Team. Joe is responsible for coordinating and conducting penetration testing services for clients in a variety of industries including financial, healthcare, and software. His expertise consists of internal and external network penetration testing, social engineering...
- Dr. Martin IgnatovskiCIO & CTO, Lightning Step
Dr. Martin Ignatovski is a recognized leader in AI, technology, cybersecurity, and healthcare. With extensive experience guiding organizations, he focuses on implementing ethical, secure, and explainable solutions, safeguarding data, and driving innovation. He shapes industry best practices through his vast experience, speaking engagements, a...
- Joe AlfonsiSr. Solution Architect, Recorded Future
Joe Alfonsi is a Senior Solutions Architect with over 20 years of experience in technology, specializing in Cyber Threat Intelligence, Attack Surface Intelligence, and Third-Party Risk Management. A United States Marine Corps veteran, Joe applies a mission-driven approach to helping Fortune 500 companies stay ahead of emerging cyber threats.<...
- Josh LinkenhokerStaff Sales Engineer, Proofpoint
Josh is an experienced Sales Engineer having held multiple director roles (Fortune 100, 500) focusing on Information Security, Cloud Security, and Email Security. Josh has worked with dozens of enterprises as a consultant and is focused on successful program building for Information Protection, Insider Threat Management, and Cloud Security.
- Thomas McNashSr. Sales Engineer, Proofpoint
Thomas is a Senior Sales Engineer with 13 years of experience as a Sales Engineer having started his journey at Oracle. At Oracle, Thomas worked in database security and Identity Management, and he eventually moved to Cyren, where he first began working in the email security space. From Cyren, Thomas moved to Tessian, where he worked for thre...
- Chris SimmSVP, Professional Services, Bulletproof
Christopher Simm is an executive leader at Bulletproof, providing strategic vision and direction over the professional services unit. With a strong data center and cloud architecture background and holding multiple technical certifications, he is a subject matter expert in delivering first-class solutions. Chris is now focused on building out...
- Jermaine GreenCritical Infrastructure Protection (CIP) Auditor, SERC Reliability Corporation
Jermaine Green, CISA, CISSP, and a 2024 Cisco Champion, is a seasoned Cybersecurity CIP Auditor at SERC Reliability Corporation. In his role, Jermaine ensures that power companies across the Southeastern United States maintain reliable and secure operations in compliance with critical infrastructure protection standards. With a robust backgro...
- Aaron ChowPrincipal Cryptographer, Director of Cloud Security Patterns and Policy-as-Code, Scotiabank
Aaron Chow is currently Principal Cryptographer and Director of Cloud Security Patterns and Policy-as-Code at Scotiabank, leading a diverse team to accelerate and secure the bank’s cloud transformation. As the Principal Cryptographer, he is responsible for the Cryptography domain at Scotiabank, providing cryptographic expertise and heads up t...
- Dr. Natalie JohnsonIT Security Administrator, Broward County Government; Co-Founder & Researcher, CyberMINDS Research Institute
Dr. Johnson is a dedicated technology professional with 15+ years in compliance, security, and governance with a track record of success in security and strategic planning. Dr. Johnson’s research on the underrepresentation of Women of Color in InfoSec showcases her dedication to fostering inclusivity in the field. She has advanced degrees in ...
- Dr. Alexis Perdereaux-Weekes (Dr. Privacy)Co-Founder CyberMINDS Research Institute/ Chair, Data Privacy Policy Committee / Institutional Review Board
Dr. Perdereaux-Weekes (Dr Privacy), a renowned Data Privacy expert, champions individuals' rights to own, control, and manage their personal information. With over 25 years of profound expertise, he is a leading Global figure in Data Privacy Regulation, Cybersecurity, Risk Management, and Compliance. His advocacy underscores the ethical handl...
- Avani DesaiCEO, Schellman
Avani Desai is the CEO of Schellman, the world’s largest niche cybersecurity assessment firm and the first ANAB-accredited ISO 42001 certification body. This accreditation positions Schellman to help organizations responsibly develop and deploy AI systems in line with the global AI governance standard. With expertise in information security a...
- James ThompsonDirector, Information Security, Hypertherm Associates
James brings more than 20 years of experience in Information Technology including seven years in cybersecurity within the manufacturing vertical. He has a passion for team development and attributes his program’s success to relationship and team building skills developed earlier in his career. He started his career in higher education and has...
- Alpha ChanCISO, Technology & Transformation Command, Toronto Police Service
Alpha Chan is the Chief Information Security Officer for the Toronto Police Service. As a former police Staff Sergeant, his 30 years of innovative investigative experiences include specialized functions that range from surveillance, covert projects, and cyber operations.
Along with cybersecurity responsibilities, Alpha created Toronto...
- Marina KaganovichFinancial Services Executive Trust Lead, Office of the CISO, Google Cloud
Marina engages Google Cloud’s financial services customers in the Americas by fostering meaningful relationships with CISOs and CxOs throughout their cloud journey and providing guidance on key areas impacting their strategic digital transformation initiatives with a focus on cybersecurity, regulatory compliance, risk management, governance a...
- Dr. Anton A. ChuvakinSecurity Advisor, Office of the CISO, Google Cloud
Dr. Anton Chuvakin works for the Office of the CISO of Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019. Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team.
Anton is ...
- Matt McCannRegional Director, Region 1, DHS CISA
As the digital and physical worlds become increasingly interconnected, the risks to critical infrastructure continue to evolve. In this session, CISA Regional Director Matt McCann will explore the convergence of cybersecurity and physical security, highlighting the growing threats that target operational technology (OT) controls and essential...
- Matthew JoseffDirector, Security Specialization, Splunk
Matthew's early passion for computers and game theory began with setting up computers at trade shows and managing an ISP while still in university. Raised across various countries, including Japan and Italy, as the child of government intelligence officers, he combined global knowledge with his tech interests. With over 30 years of experience...
- Yair HerlingChief Marketing Officer, Veriti
Yair Herling is the Chief Marketing Officer at Veriti, a cybersecurity company dedicated to enhancing organizational security postures while ensuring uninterrupted business operations. With a background in marketing and a passion for technology, Yair transitioned into the cybersecurity sector to address the growing challenges organizations fa...
- Roger AuingerHead of Information Security, Governance, Risk & Compliance, Spirit Airlines
Roger Auinger is a seasoned cybersecurity and risk management executive with extensive international experience in the financial services and aviation industries, currently leading GRC at a major airline. He has built and matured global cybersecurity frameworks, risk, and compliance programs. Previously, he advised financial institutions and ...
- Raphael Adeyemo, ModeratorPresident, ISC2 Toronto Chapter; Sr. Manager, Technology Risk Management, Manulife
Raphael Adeyemo is a seasoned risk management and cybersecurity leader with over 15 years of experience spanning IT risk management, cyber resilience, digital investigations, service delivery, process optimization, strategy, and digital transformation across banking, insurance, energy, technology, and academia. He is the Senior Manager of Inf...
- Camille KloppenburgVP & Treasurer, ISC2 Toronto Chapter; Director, Security Program Management, Security Compass
Camille Kloppenburg is a distinguished cybersecurity leader with more than 20 years of experience in financial services and cybersecurity technology sectors. Her unique blend of business acumen and technical expertise allows her to guide organizations in building secure products from the ground up.
Her career has been shaped by a diver...
- Hendra T. HendrawanProfessor, Seneca Polytechnic; Technical Counselor, Security & Privacy Practice, Info-Tech Research Group
Hendra T. Hendrawan has more than 25 years of experience in IT and cybersecurity.
He currently is a Technical Counselor in the Security & Privacy Practice at Info-Tech Research Group focusing on IS strategy initiative, policy development, risk management, and cybersecurity best practices. Prior to joining Info-Tech Research Group, Hend...
- Hila MellerCo-Founder, Leading Cyber Ladies
Hila Meller is a distinguished cybersecurity business executive with over 25 years of experience and the co-founder of Leading Cyber Ladies, a global movement dedicated to promoting diversity in the cybersecurity industry.
She has held senior leadership positions in globally recognized organizations, including her tenure as President a...
- Yasser FuentesPrincipal Solutions Architect (Cloud Security SME), Bitdefender
Yasser is a Principal Solutions Architect (Cloud Security SME) for Bitdefender and Security Practitioner with over 20 years of experience in Information Security. Along his career he has worked for Healthcare Providers, ISPs, MSPs and SOCs, among many other verticals and throughout multiple Information Security Domains. On his previous role a...
- Erika DeanChief Security Officer, Robinhood Markets
Erika Dean is Chief Security Officer of Robinhood Markets. She oversees the Security, Privacy and Corporate Engineering organizations, which include the information security and productivity functions. Erika has over 20 years of experience in the security industry. Prior to joining Robinhood, she spent over 20 years at Capital One Financial, ...
- Shawn MurphyCybersecurity Solutions Architect, WEI
Shawn Murphy has over a decade of experience in cybersecurity ranging from incident response and threat hunting to threat intelligence and automation. He is passionate about applying analytics and automation to modernize security operations. Shawn holds numerous industry certifications in incident handling, detection engineering and automatio...
- Frank WalshField CTO, HUMAN
Frank Walsh is the Field CTO at HUMAN, supporting the Public Sector Team in the fight against advanced cyber threats. With a strong background in cybersecurity leadership, he has held key roles at Virsec, Malwarebytes, and Tanium, where he played a pivotal role in designing and implementing cutting-edge security solutions. Frank brings a deep...
- Jeremiah SalzbergChief Security Technologist, CDW
Jeremiah Salzberg is a security leader with over 25 years of security leadership experience in the financial, telecommunications, and manufacturing sectors. He has held security positions responsible for engineering and architecture, pen testing and incident response, as well as numerous CISO-level positions. In his role as chief security tec...
- Maggie CalleVP & CISO, Varicent
Maggie Calle is the Chief Information Security Officer at Varicent, with more than 25 years of experience in cybersecurity leadership across the financial, insurance, retail, and technology sectors. She is known for successfully implementing cybersecurity and risk management programs that enable the business and drive innovation and digital t...
- Rich MakrisSr. Sales Engineer, ExtraHop
Rich has spent the last 15 years assisting organizations in identifying and resolving challenges with cybersecurity and visibility. He has held various roles, leading projects in modernization and hardening with organizations in software, finance, public safety, defense, and manufacturing. Rich is active in the security and operations communi...
- June LeungDirector, IAM, IGM Financial
Intuitive, result-driven Cybersecurity Leader with notable success directing a broad range of enterprise Cybersecurity initiatives with over 15 years of experience in the financial cybersecurity vertical. Defining Cybersecurity strategy and roadmap, implementing cloud security, managing an annual budget of over $4 million. Effective managemen...
- Sumona BanerjiFounder & Director, MindShield Institute
Sumona Banerji is a futurist, cyber-psychology expert, and founder of MindShield Institute, a think-tank developing products that build emotional intelligence, cyber-resilience, and cognitive security. The goal is to mitigate risks to human cognition, connection, and security, in the face of exponential technology, through innovation in educa...
- Mark AnnatiCISO, Executive Office of Economic Development, Commonwealth of Massachusetts
Mark Annati is an experienced IT and cybersecurity leader, currently CISO for the Executive Office of Economic Development, Commonwealth of Massachusetts. A board member of InfraGard Boston, he previously served as CISO for advansappz.com and Extreme Reach. With over 20 years in IT security and two successful startups, Mark has led security o...
- Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”
Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to curr...
- Tarik HaniffLead Information Security Engineer, TIAA
Tarik Haniff is currently a Senior Cybersecurity Engineer at TIAA, specializing in Network Security, Cloud Security, Endpoint Security, and Identity and Access Management. Prior to TIAA, he was a Senior Cybersecurity Engineer at SAS Institute, the world’s largest privately held software company, where he specialized in Microsoft Azure Securit...
- Rana KhurramDirector, Information Security, GRC, C&R Software
Rana Khurram is a seasoned security professional with 15+ years of experience working in different security domain such as GRC (Governance, Risk & Compliance), incident response, and customer trust. He has led security programs successfully across various industries (banking, business processing, credit unions, software development) and helpe...
- Carol GlennonSr. Director of Offensive Security, Walgreens Boots Alliance
Carol Glennon is the Senior Director of Offensive Security at Walgreens Boots Alliance, a trusted global leader with a 170-year heritage in healthcare, pharmacy and retail. Carol is a seasoned and strategic leader in the field of cybersecurity, incident response, and DevSecOps.
Some of her key achievements include leading innovative pur... - Ryan SteidlPartner, Constangy, Brooks, Smith, & Prophete, LLP
Ryan is a member of the Constangy Cyber Team in Seattle, specializing in compliance advisory services for data privacy and cybersecurity. He serves his clients in assessing, implementing, and enhancing their information governance programs under state, federal, and international laws.
Prior to Constangy, Ryan served eight years at Gran...
- Ali Abbas Hirji, ModeratorVP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 Global
With more than 16 years in IT leadership, Ali specializes in Governance, Risk and Compliance (GRC), aligning with ISO 27001, NIST and SOC 2 to build secure and compliant infrastructures. His expertise spans IT security, risk management, and developing high-performing teams.
In post-secondary education, he has taught at institutions acr...
- Allie HowevCISO, Confidential
Allie is a vCISO that helps AI startups with SOC2 compliance and AI security. She has a software engineering background, a Masters in Cybersecurity, and is on the OWASP working group for Agentic AI.
- Edna ConwayCEO, EMC ADVISORS; Former Chief Security & Risk Officer, Microsoft Cloud
Edna Conway is expert in identifying future trends and digital paths for business success. She is known for consistently ensuring that security and resiliency are “built in.”
Not one to sit still after recently “repurposing” from her operating executive roles, Edna is currently CEO of EMC ADVISORS, advising governments, CEOs, enterp...
- Len EvenchikProfessor, Boston College, Carroll School of Management
Professor Len Evenchik has more than 25 years of senior management and engineering experience in industry, government, and academia. He teaches courses on the strategic use of Information Technology (IT) and Data Analytics, and a course on Cybersecurity Strategy and Management. He has also served as the faculty supervisor for experiential lea...
- Gennady DuchovichPrincipal Cybersecurity Advisor, 1SEC Solutions Inc
Gennady Duchovich is an Information Security leader with more than two decades of experience in IT governance and security operations. His unique background combines military service with extensive industry expertise. Gennady specializes in driving transformation and adoption of next-generation cybersecurity solutions, aligning security polic...
- Gennady Duchovich, ModeratorPrincipal Cybersecurity Advisor, 1SEC Solutions Inc
Gennady Duchovich is an Information Security leader with more than two decades of experience in IT governance and security operations. His unique background combines military service with extensive industry expertise. Gennady specializes in driving transformation and adoption of next-generation cybersecurity solutions, aligning security polic...
- Mohsen AzariDirector of Cyber Defence, goeasy Ltd.
Mohsen Azari is a Senior Cyber Security leader. He is an advocate of agile cybersecurity program aligning to business missions. He enjoys public speaking and is well-versed in cybersecurity strategy, GenAI governance, DevSecOps, and business resilience. Mohsen has extensive leadership experience in manufacturing, retail and finance. He is c...
- Joe MariscalDirector of Cybersecurity, Ryerson
Head of Cybersecurity, 20+ years in InfoSec/ Cyber. MBA, Masters in Cyber, CISSP, CISM.
- Kayla WilliamsCISO, Devo
Kayla is the CISO at Devo Technology, a cloud-native security data analytics platform. She is an analytical and results-driven professional with experience in management of cybersecurity incidents, compliance management, corporate risks, information security, project and program management, and organizational controls surrounding many differe...
- Brian LongCEO & Co-Founder, Adaptive Security
Brian is the CEO and Co-Founder of a Adaptive Security, where we build software to protect companies from new cyber threats like deepfakes, GenAI phishing, smishing and more. Today, Adaptive is growing fast, working with leading businesses like regional and national banks, leading tech and software companies, and critical health systems.
... - Keavy MurphyVice President, Security, Net Health
Keavy Murphy is a Boston-based security professional currently serving as the Vice President of Security at Net Health. Passionate about cybersecurity, especially for new and emerging companies, she prioritizes using soft skills to manage compliance and risk management effectively in parallel with business objectives. Previously, she served i...
- Anthony O'NeillCommonwealth CISO & Chief Risk Officer, Massachusetts Executive Office of Technology Services and Security
- Itir ClarkeTeam Manager, Product Marketing, Proofpoint
I am an innovative product marketing and management professional with 20+ years of high tech and security industry experience. As a Product Marketing Group Manager at Proofpoint, my responsibilities include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to data and cloud security, d...
- Martin StrasburgerSVP & Chief Security Officer, Duke Energy Corporation
Martin Strasburger leads the Enterprise Security department at Duke Energy Corporation, a
Fortune 200 company, and one of the largest combined gas and electric utilities in the United
States. In this role, Martin works with company executives and the board of directors to define
the company’s security strategy across technol... - Brian McGowan, CISM, ModeratorVP, Global Security & Privacy, SharkNinja
Brian currently leads the cybersecurity and privacy program as Vice President, Global Security & Privacy at SharkNinja, a relentless innovator and global leader in the housewares industry. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed t...
- Val Dobrushkin, ModeratorPartner, AVA Compliance Solutions
Val Dobrushkin is an experienced cybersecurity and governance professional, whose career has spanned working at startups, Fortune 500 companies, and the U.S. government. His specialty is crafting Governance, Risk and Compliance (GRC) programs for startups, through which he has facilitated IPOs and multimillion dollar acquisitions. Val is also...
- Andy EllisPartner, YL Ventures
Andy Ellis is a seasoned technology and business executive with deep expertise in cybersecurity, managing risk, and leading an inclusive culture. He is the author of 1% Leadership, Partner at YL Ventures, and is an advisor to cyber security startups. He is the founder and CEO of Duha, a boutique advisory firm focused on providing strategic co...
- Mariano MatteiVP, Cyber and AI, Azzur Group
Mariano Mattei, VP of Cybersecurity and AI at Azzur Solutions, is an industry-leading expert with over 30+ years in cybersecurity, underscored by a deep commitment to AI innovation and software engineering excellence. Holding the title of Certified Chief Information Security Officer (CCISO), Mariano has pioneered AI integration within securit...
- Benson KamauDirector, Technical Account Management, Tanium
Benson has been in the tech space for more than 15 years. His background is in system engineering, where he helps install, configure, and maintain on premise and cloud infrastructure. He has held positions at Veracode, Edelman Financial Engines, and presently at Tanium.
- Derek Fisher, ModeratorDirector, Cyber Defense and Information Assurance Program, Temple University
- Jim GarrettSr. Systems Director, Cyber Security, Saint Francis Health System
Jim Garrett is an IT executive, leader, architect, and governance expert with enterprise executive experience at the Saint Francis Health System, State of Missouri, New York State, 3M, Honeywell, Ingram Micro, Washington Mutual, and Maytag. Also significant healthcare consulting experience at MediSys Health Network, Salinas Valley Memorial He...
- David Dumas, HostSecretary, Board of Directors, ISSA New England
David Dumas, CISSP, CISM, ISSA Distinguished Fellow. David is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. He has 32 years in the security field, working at Digital Equipment and Verizon. He has been on the ISSA New England Chapter Board since 1998.
- John Opala, PhD, ModeratorVP & Global CISO, Hanesbrands Inc.
Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and...
- Kenrick Bagnall, ModeratorToronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/Instructor
Kenrick Bagnall has 17 years of law enforcement experience, the last eight of which were in the Coordinated Cyber Centre (C3) as a Cybercrime Investigator. Prior to law enforcement, he spent two decades working in the Information Technology industry primarily in the financial services sector. During this time, he spent twelve years in Bermuda...
- Shruti MukherjeeDirector of GRC, GlobalVision
Shruti is a seasoned Governance, Risk, and Compliance (GRC) professional with over six years of experience designing and executing robust GRC programs for global organizations. With expertise in ISO certifications (9001, 27001, 27701, 27017/18, 42001), data privacy frameworks, and audit management, Shruti has consistently delivered improved c...
- Thomas PoreDirector, Solutions Engineering, Pentera
Thomas Pore is the Director of Product Marketing at Pentera. He is a network security expert with a 20-year background utilizing NetFlow and packets for network detection & response (NDR), encrypted traffic analysis, ethical hacking, and incident response. His expertise is rooted in diverse experience with product marketing, product managemen...
- Yaron Levi, InstructorCISO, Dolby Laboratories
Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ...
- Roger A. Grimes, ModeratorData-Driven Defense Evangelist, KnowBe4
Roger A. Grimes is a Data-Driven Defense Evangelist at KnowBe4. He is a 35-year plus computer security professional, author of 14 books and over 1,400 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. He is the author of the Ransomwar...
- Meg SperanzaResiliency Program Manager, MassCyberCenter
Meg Speranza is responsible for improving the collaboration, transparency, and effectiveness of the Massachusetts cybersecurity ecosystem in order to foster ‘cyber resiliency’ across the Commonwealth of Massachusetts’ key institutions and systems, including municipalities, businesses, critical infrastructure, and non-profit organizations. Pri...
- Max FathySr. Program Manager, MassCyberCenter
Max Fathy is responsible for supporting the MassCyberCenter’s workforce development efforts, including the Commonwealth Security Operations Center and Cyber Range Initiatives, the Cybersecurity Mentorship Program, and the Cybersecurity Training and Education Working Group, and building stronger relationships with the private sector cybersecur...
- Konnor AndersenVice President, Sales, Zluri
Konnor is the Vice President of Worldwide Sales & Partnerships at Zluri, an identity security platform helping IT and security teams manage and secure SaaS applications. With nearly a decade in tech sales and leadership—from early-stage startups to $10B+ public companies—he brings extensive experience in scaling teams and driving growth. Konn...
- Eric AvigdorChief Product Officer, Votiro
Eric Avigdor Is the Chief Product Officer for Votiro. He is a seasoned, innovative, and passionate Product Management executive with more than 20 years in the cybersecurity industry in both startups and large enterprise organizations. He leads the product organization at Votiro: defining the roadmap based on customer feedback and market needs...
- Sahil DhirSr. Risk & Security Manager, Amazon
As a Senior Manager at Amazon, I am experienced in ensuring regulatory compliance and cybersecurity through comprehensive product and process evaluations and have proactively managed risks in deploying generative AI systems. I am passionate about technology and building great products.
My core competencies include cybersecurity strateg...
- Gene MeltserCISO, State of Connecticut
Gene Meltser is the Chief Information Security Officer for the State of Connecticut. Gene has over 20 years in security industry, as technical leader, consultant and penetration tester. Prior to joining the State of CT, Gene was the VP of Security Advisory Services at New York City based NCC Group, where he was responsible for leading all asp...
- Joe VeroneauHead of Trust and Security, Conveyor
Joe is a risk management professional with experience across many security, risk and compliance domains. Past roles include advising on GRC software implementations at highly regulated customers and supporting data protection efforts at Aptible, a HITRUST Certified Platform-as-a-Service. Joe currently leads the Trust & Security function at Co...
- Wolfgang RohdeExecutive Partner of Innovation, AiSuNe
Dr. Rohde, a pioneer in applying cutting-edge technologies, co-founded IBM’s Web Services and SOA Excellence Team for Europe. He later developed Cloud solutions for an international solution provider. As global Director of Research at Siemens Digital, he focused on AI, GenAI, Blockchain, Cybersecurity, and Autonomous Factories in manufacturin...
- Max EverettVP, Cybersecurity & IT Compliance, Shaw Industries
Max Everett is a cybersecurity risk and information technology modernization expert whose work has spanned Federal government, political organizations, and private sector companies.
Max is currently the CISO for Shaw Industries, a wholly owned subsidiary of Berkshire Hathaway. He spent 20 years in Washington, DC where he served in nume...
- Steven PowersVP, Product Security, LPL Financial
Steven is a VP at LPL Financial leading the BISO team. Steven has been a part of the BISO department since inception 5 years ago. Steven has 20 years of experience across banking and utilities industries within Governance, Risk, Control, and Audit functions and holds CPA, CISA, CRISC, CISSP, and CCSP certifications.
- Sue ThomasInformation Security Executive - Global Supply Chain, Lenovo
Sue Thomas is a Global Technology & Cybersecurity Executive with over 25 years of experience across semiconductors, finance and technology industries and specializes in Infrastructure, Security, Technology Risk, Governance, regulatory compliance , business resiliency & Data Privacy. Sue worked as Deputy CISO for Analog Devices, Director of I...
- Justin ArmstrongFounder, Armstrong Risk Management LLC
Justin Armstrong is a security, privacy, and regulatory compliance consultant with over 25 years of experience in the Healthcare Industry. He worked as a vCISO at FractionalCISO, managed security at Healthcare Cybersecurity startup Tausight, and led Product Security at MEDITECH, a top three Electronic Health Record vendor. He has engaged with...
- Dr. Olga ShugurovaAssistant Professor, Jackson State University; Visiting Professor of Education and Technology, School of Educational Sciences, Universidad Nacional Abierta y a Distancia
- Jennifer FiteData Strategy and Data Information Architect, Bank of America
Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy ...
- Melecia McLeanSecurity Behavior and Culture Lead
Melecia McLean is a Security Behavior and Culture Lead at a leading tech organization, where she applies her expertise in human risk management, social engineering, and AI to develop and enhance a proactive security culture. She leads dynamic cybersecurity awareness programs that equip individuals to protect their data, fostering a culture of...
- Peter SamoraySr. Director, Cybersecurity, PCI Energy Solutions
Peter Samoray serves as a Senior Director of Cybersecurity at PCI Energy Solutions overseeing all aspects of strategic and operational security services. Peter comes from a very diverse security background with over 18 years of cybersecurity and technology experience across multiple industry sectors serving in various areas including operatio...
- Denis GouletCIO & Commissioner, Department of Information Technology, State of New Hampshire
- Ken WeeksCISO, State of New Hampshire
Ken Weeks is the Chief Information Security Officer for the State of New Hampshire. He spent most of his adult life as a Naval Officer, Special Duty, Cryptology and Information Warfare, and retired as a CAPT (O6). Although most of his time was spent in the Pacific Theater, he also enjoyed several all-inclusive trips to Somalia, Iraq, and Af...
- Tim BandosField CISO, Critical Start
With close to 20 years of experience in cybersecurity, I am a passionate and visionary leader who strives to protect organizations from cyber threats and enhance their resilience. I have a strong background in security operations, incident response, threat hunting, and digital forensics, as well as product management, marketing, and public sp...
- Tanya JancaHead of Community and Education, Semgrep
Tanya Janca, aka SheHacksPurple, is the best-selling author of "Alice and Bob Learn Secure Coding," "Alice and Bob Learn Application Security," and the "AppSec Antics" card game. Over her 28-year IT career, she has won countless awards (including OWASP Lifetime Distinguished Member and Hacker of the Year), spoken all over the planet, and is a...
- Larry Wilson, CISSP, CISASr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security P...
- Ashley HellerFocus Group Leader, E&O, Cyber Risks, Beazley
Ashley is responsible for the management of the Technology Liability portfolio at Beazley, a leading London-based specialty insurer. Prior to her time at Beazley, Ashley was an underwriting manager at AIG, where she underwrote Cyber for National Accounts.
- Erik MooreClinical Professor and Program Director, MS in Cybersecurity Leadership, Seattle University
Director of Cybersecurity Programs at Seattle University. I've developed and directed cybersecurity, field services, and large-scale infrastructure with a track record in leading technology. I'm currently the Editor-in-Chief of The Journal of the Colloquium for Information Systems Security Education and Chair of IFIP WG11.8 that runs the Worl...
- Bethan DanielsWest Zone Regional Manager, Cyber Practice, Marsh
Bethan Daniels is a West Zone Regional Manager, managing Seattle and Salt Lake Offices, based in Seattle, WA. Bethan’s current responsibilities include managing team members, driving the national strategy and advising clients on placing primary and excess Cyber, Technology, Media and Errors and Omissions insurance.
Previously she spe...
- Greg PepperSr. Security Architect, Check Point Software Technologies
Gregory (Greg) Pepper is a Senior Architect and a Check Point Evangelist. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. At Check Point, Greg’s main focus is to work with customers, partners and Check Point employees to help plan, design and implement security solutions across their ne...
- Stuart ButcherLead Application Security Solutions Engineer, Dynatrace
Stuart collaborates closely with global clients, guiding them in harnessing observability data to enhance their application security posture throughout the entire SDLC. He is a passionate sneakerhead with a strong background in cybersecurity and networking, particularly WAF and DDoS, as well as Bot Management and Zero Trust.
- Rich TeslowSr. Security Engineer, A-dec Inc.
Rich Teslow is a seasoned Senior Security Engineer at A-dec, Inc., a leading dental manufacturer in the U.S., based in the Pacific Northwest. With a career spanning over two decades, Rich has dedicated his professional life to the IT sector, specializing in safeguarding infrastructure and digital assets. His expertise covers a wide array of a...
- Amanda StowellInformation Security & Privacy Program, A-dec Inc.
Amanda Stowell is a passionate Information Security and Privacy Program Manager at A-dec, Inc., a leading dental manufacturer based in the Pacific Northwest. Over the past few years, Amanda has built A-dec’s cybersecurity program from the ground up, leveraging her expertise to design a robust framework that balances business needs with today’...
- Owen PickfordSr. Solutions Engineer, Snyk
Owen Pickford is a Senior Solutions Engineer at Snyk based in Seattle. Owen has 15 years of experience helping enterprise customers identify and implement software solutions that help them solve their most complex challenges.
- Ankit Kapoor, ModeratorSenior Security Program Manager, Microsoft
Ankit has been with Microsoft for over 12 years spanning roles from building and leading adoption of the most secure cloud native Microsoft managed Detection and Response platform. Over the years, he worked in several product teams as Cloud Compute and Security leader, ideated, defined and led cyber security initiatives from the ground up. In...
- Dr. Chase CunninghamZero Trust and Cyber Warfare Expert, Thought Leader, Speaker, Podcaster, and Author
- Frank SimorjayPrincipal Security Architect, Power Platform, Microsoft
Frank Simorjay is a Principal Architect for the Power Platform team at Microsoft. He has developed an extensive library of security content as a cloud security architect and content developer. A CISSP and an ISSA Distinguished Fellow, Frank is recognized for his significant contributions to cybersecurity. He founded the ISC2 Seattle chapter a...
- Susan YoungManaging Director, Cyber Strategy & Growth Leader, US & Canada Cyber Practice, Marsh
Susan Young is part of Marsh’s North American Cyber Practice based in the Seattle office. She specializes cyber risk, media liability, and technology errors and omissions. Susan is also responsible for the growth strategy of the US & Canada Cyber Practice. Susan acts as a holistic cyber/E&O risk advisor for her clients – advising on cyber ri...
- Bryan TurriffFounding Director of Product Marketing and Growth, Observo.ai
Bryan Turriff is a seasoned technology and marketing professional with over 25 years of experience in data, security, and AI. He is currently the Founding Director of Product Marketing and Growth at Observo.ai, where he focuses on expanding the company's reach and impact in security and AI-driven data pipelines. His career spans product and m...
- Rodney MoseleyCyber Security Infrastructure Architect, Microsoft Corporation
Rodney Moseley, is a cyber security professional, Author, Speaker with expertise in defense protections , security compliance and threat mitigation. He started his Career from Texas Tech University and led his way to completing his Masters in eBusiness from the University of Phoenix. He is a husband and father of 3 currently living in the ...
- Ken MalcolmsonCustomer Security Officer, Microsoft Corporation
Ken Malcolmson is a Customer Security Officer in the Microsoft Security Solutions Area. In this role, he helps organizations develop and refine their security strategy, understand the evolving threat landscape, adjust their security posture to protect against threats, and realize value from the security and data protection technologies in Mic...
- Basma BasemSenior Security Engineering Program Manager, Microsoft Corporation
Basma is a cybersecurity professional with over 17 years of experience, specializing in solving complex operational challenges. Basma holds an M.Sc. in Cybersecurity Engineering and has been recognized with an award for Basma master's research paper, in addition to receiving the prestigious Microsoft Diamond Technology Award.
Basma is ...
- runZero Representative
- Mike EllerhorstDenver Club Host, The Cyber Breakfast Club
Mike Ellerhorst is the Founder and CEO of NTM Advisory. With over 15 years of experience in consulting and industry, he specializes in delivering transformative programs for his clients at the intersection of business and technology, with a focus in the Information Security and IT Risk domains. He holds a Bachelor's in Computer Science from ...
- Peter BasseyHead of Cybersecurity Audit, BNY Mellon
Senior Cyber Security, Technology Risk and Audit Professional with over 18 years of result-oriented experience in financial services and manufacturing focused on Cyber Security, Technology Risk Management, Third Party Risk Management and IT Audits. Problem solver with proven ability for team building, process enhancements, professional mentor...
- Peter Bassey, ModeratorHead of Cybersecurity Audit, BNY Mellon
Senior Cyber Security, Technology Risk and Audit Professional with over 18 years of result-oriented experience in financial services and manufacturing focused on Cyber Security, Technology Risk Management, Third Party Risk Management and IT Audits. Problem solver with proven ability for team building, process enhancements, professional mentor...
- Nicholas MattaSr. Sales Engineer, Netwrix
With over fifteen years of experience, I am passionate about providing technology governed solutions to growing businesses of all sizes. I have worked with MSP and channel partners to offer managed security as a service (MSSP) and to ensure security and auditing compliance for various regulations and standards, such as HIPAA, CMMC, NIST, PCI,...
- Chris Niggel, ModeratorRegional CISO, Okta
Chris is the Regional CISO, Americas at Okta, where he is responsible for corporate security compliance, third-party risk, and responding to customer security inquiries. Prior to Okta, Chris spent 6 years leading the adoption of Cloud Technologies at LinkedIn, helping them grow from 350 to over 6,800 employees. He started his career designing...
- Mario Duarte, ModeratorCISO, Aembit
Mario has 20+ years of experience as a security professional working in the tech, retail, health care, and financial sectors. He has built and managed security teams and developed and implemented security programs for private and public organizations. He serves as an advisory board member at several cybersecurity companies as well as an inves...
- Matthew WebsterCISO, Author, and Mentor
Matthew Webster's IT and cybersecurity journey began in 1997, quickly rising through the ranks at a university computer center. Soon, he was navigating federal cybersecurity at the Center for Medicare and Medicaid Services, mastering frameworks like NIST SP 800-53 and IRS 1075. This rigorous environment, with up to 8 audits annually, prepared...
- Teressa GehrkeFounder, PopCykol
Teressa Gehrke is the Founder of PopCykol, a trusted online safety resource for families and kids. PopCykol stands for Protecting Our Precious Curious Kids Online. PopCykol teaches internet safety concepts in a fun, easy, and interactive style.
She has worked in cybersecurity since 2014 as a technical writer, user experience designer,...
- Rick VincentDirector of System Engineering, Rockies Enterprise Team, Fortinet
Rick Vincent is the Director of System Engineering for the Rockies Enterprise team at Fortinet. His career has included roles in product development and engineering for security, networking, storage, and cloud disciplines. He is an avid outdoorsman and father who loves all the activities the Rocky Mountains have to offer. With Rick, look forw...
- Micah McCutchanManaging Director, Strategic Advisory Group, SentinelOne
Micah McCutchan is Managing Director at PinnacleOne, SentinelOne’s strategic advisory service, where he helps large companies in the critical infrastructure value chain leverage geopolitical intelligence to enhance their digital security and resilience strategies. Prior to this, Micah was President and Chief Operating Officer of the Krebs Sta...
- Robert CowansVice President/Chapter Leader, Cyversity
Robert Cowans is a seasoned professional with a diverse background and a proven track record of success in various industries. Throughout his career in the United States Army, Dep. Of Homeland Security, and American Airlines. He has held numerous positions in leading organizations, where he has consistently demonstrated his ability to drive g...
- Saleem KhanVice President/Chapter Leader, Cyversity
Saleem Khan is a seasoned IT security leader with over 20 years of experience in enhancing organizational cybersecurity and aligning it with business objectives. His impressive career spans roles at ServiceNow, Emory University, AT&T, and The Coca-Cola Company, where he excelled in IT risk management and GRC processes. Known for his strategic...
- Niv GoldenbergCo-Founder & CPO, Linx Security
Niv Goldenberg is an experienced product leader with more than 20 years of technology leadership experience in cybersecurity in startups, enterprises and the IDF. Niv is the Chief Product Officer and co-founder of Linx Security. Prior to Linx, Niv was the VP of Product for Transmit Security, the head of product and group product manager of Mi...
- Afzal Khan, ModeratorGlobal CISO, OPKO Health, Inc.
Afzal Khan is a distinguished leader in the field of technology security and risk management, bringing over 26 years of expertise to his role. Currently serving at OPKO, he provides strategic direction and guidance on technology risk management, IT, OT, and cybersecurity, ensuring compliance with IT regulatory standards across domestic and in...
- Ahmer MirzaSolutions Architect, Aqua Security
Ahmer Mirza is a seasoned Solutions Architect at Aqua Security, where he has been making significant contributions for the past three years. With a robust background in computer engineering technology, his role at Aqua Security involves implementing cutting-edge security solutions and leveraging his expertise to address complex challenges in ...
- Troy BatterberryCEO & Co-Founder, EchoMark
Troy Batterberry is the founder and CEO of EchoMark, a Software-as-a-Service (SaaS) company pioneering a new standard in information protection. The company was founded on that trust is central to empowering everyone to do their best work. Troy brings years of product and technology experience, including 25 years at Microsoft, where he most r...
- Jenifer Clark, ModeratorInformation Security & Compliance Engineer, Costco Wholesale
Experienced Information Security Professional with a demonstrated history of working in the retail industry. Skilled in Operations Management, Sales, Management, Point of Sale (POS) / Fuel Systems, and Inventory Control. Strive to find ways information security can enable and support business and operations teams with solutions. Actively supp...
- Dan MiglioreSolutions Manager, West Region, Fortinet
Dan Migliore brings over 25 years of experience in the cybersecurity space, with an extensive security related background contributing to industry leaders such as VeriSign, Varonis, Accellion, and Verint. Currently, he serves as a Regional Manager at Fortinet, where he has dedicated the last six years to advancing enhanced security technologi...
- Milosz GoralczykLead Software Engineer, Salesforce
Milosz Goralczyk is a Lead Software Engineer, Scrum Master, Security Champion, and VTO rockstar for the AI Platform team at Salesforce. He owns services in model training areas for Generative AI and Predictive AI, expanding Salesforce Einstein AI impact in cutting-edge AI products. With a deep passion for ML, experimentation, and security, he...
- Katie Boudreau, ModeratorCyber Talent Director, Mastercard; Secretary & Founder, WiCyS St. Louis Metro
- Sandy TaylorCISO, USC
Strategic and people centric information security leader with 20+ years of experience with notable success in designing, planning, analysis, and implementation of large and complex security initiatives across federated organizations. Strength in providing comprehensive and practical security risk reduction plans and roadmaps to the business. ...
- Douglas SantosDirector, Advanced Threat Intelligence, Fortinet
With more than two decades of experience in the cybersecurity field, I possess a unique blend of sales soft skills and deep technical acumen, making me a well-rounded individual who is at ease working in both technical and non-technical environments. My keen understanding of the cyber threat landscape allows me to communicate potential threat...
- Paul Underwood, ModeratorVP, Cybersecurity, Neovera
Paul has more than 30 years of experience working in the Information Security space including 8 years with the US Air Force. Paul was a principal at Digital Signature Trust back in the 90’s working on Public Key Cryptography utilizing Hardware Security Modules to create Root certificates for the Browsers for trusted Root Certificates includin...
- Chrissy PetersDirector of Elections, State of Missouri
Chrissy Peters is the Director of Elections for the State of Missouri. She has spent the majority of her professional career in state government and public service. She has worked at the Secretary of State’s office in the Elections Division for 16 years.
- Charlie MarmonColorado Cybersecurity Coordinator, DHS CISA
Charlie Marmon serves as the Colorado Cybersecurity State Coordinator (CSC) for the United States Cybersecurity and Infrastructure Security Agency (CISA). He supports the CISA mission of strengthening the security and resilience of the nation's critical infrastructure. His daily responsibilities include coordinating risk management and incide...
- Shawn GraffRegional Director, Region 8, DHS CISA
Serving Region 8, the Rocky Mountain Region, since 2016, Regional Director Shawn Graff leads operations across six states to bolster resiliency in both government and private sectors as they manage cyber and infrastructure security risk.
Selected as the first Director for the Region, Mr. Graff develops protocols and procedures in align...
- Terra CookeResident Magic Girl
With 15 years in the realm of security, Terra Cooke honed a knack for forging strong partnerships and pioneering innovative security programs. Her leadership style blends strategic vision with hands-on collaboration, ensuring that our defenses evolve alongside emerging threats and regulatory landscapes. Whether deciphering complex compliance ...
- Nicholas DiColaVP, Customers, Zero Networks
Nicholas DiCola is a Security Jedi and the VP of Customers where he leads a global team. Before joining Zero Networks, Nicholas led the Cloud Security Customer Experience Engineering team helping customers unblock deployments and improving products. He also spent 22 years with the United States Marine Corps and retired as a Defensive Cybersp...
- Or ShoshaniCEO, Stream Security
Or Shoshani is the co-founder and CEO of Stream Security. After serving in an elite IDF cyber unit, Or founded a startup that was acquired by NVIDIA, where it played a key role in advancing AI technology security.
Today, Or leads Stream Security, a leader in cloud detection and response. His vision drives the company's mission to help s... - Aaron ShahaCISO, CyberMaxx
Aaron Shaha, CISO at CyberMaxx, is a Strategic Information Security Executive and subject matter expert with a record of pioneering cyber security trends by developing novel security tools and techniques that align with corporate objectives. Known for building and leading strong teams that provide technology enabled business solutions for sta...
- Joe DiverVP & CIO, Signature Healthcare
Joe Diver is Vice President & Chief Information Officer for Signature Healthcare in Brockton, MA. The organization includes Brockton Hospital 219 beds, Signature Medical Group with over 400 doctors and advanced practitioners on staff, Cancer Center and Signature School of Nursing. In February of 2023 the hospital experienced a major fire and ...
- Trevor DunlapPrincipal Research Scientist, Chainguard
Trevor Dunlap is a Principal Research Scientist at Chainguard. Trevor obtained a Ph.D. in Computer Science focusing on automatically enhancing vulnerability data to help provide richer information. He has been involved in research ranging from access control, robocalls, and the use of large language models in security domains. Beyond his tech...
- Daniel McLaughlinPreSales Engineer, Netwrix
With over eight years of experience at Netwrix, Dan McLaughlin currently serves as the Solutions Engineering Team Lead, where he leverages his extensive knowledge in Data, Identity, and Infrastructure. Prior to this role, Dan honed his skills in post-sales and product management, ensuring that clients achieve optimal security solutions tailor...
- Renaldo McKenzie, HostPresident, Cyversity North Texas Chapter
Renaldo McKenzie is a seasoned professional & cybersecurity leader with a diverse background of proven success in various industries and critical sectors such as Information Technology, Healthcare, Communications, Financial, Transportation, and Government.
His knowledge and expertise are in program development, management, and advancem...
- Alpesh ShahVP, Cybersecurity Solutions, Myriad360
Alpesh is an information security leader with a comprehensive background in cyber security architecture, cloud security, service delivery, physical and IoT security. With more than fifteen years of experience and expertise in requirements gathering, development of complex cyber security solutions, testing, production support, project manageme...
- Shaun StalkerRegional VP, Security Solution Sales, NORAM, Dynatrace
Shaun M Stalker, a seasoned professional in the technology sector for over 28 years, has dedicated the last 19 years to the field of cyber-security. He has collaborated with CISOs and security teams, aiding them in enhancing their security posture and mitigating evolving threats. His expertise spans across application security, threat hunting...
- Michael MarxMySQL Master Principal Solution Engineer, Oracle
Michael Marx, one of Oracle MySQL’s talented solutions engineers with a flair for transforming complex database challenges into seamless solutions.
When Michael isn’t decoding the mysteries of MySQL, he’s probably perfecting his latest recipe for the ultimate data-driven cocktail or plotting his next tech adventure. With a knack for ma...
- Renita Rhodes, ModeratorAdjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University
Renita M. Rhodes is a seasoned professional with over 22 years of distinguished experience in Information Technology (IT), IT Audit, Risk Management, Compliance, and Cybersecurity. She currently holds the role of Vice President, Audit Manager - Cybersecurity Manager at a prominent global bank, where her expertise is instrumental in safeguardi...
- Patrick HarrInvestor, Mentor, Volunteer, and Entrepreneur
Patrick Harr is an Investor, mentor, volunteer, entrepreneur, and frequent speaker on the dangers and misuse of AI. He has invested in multiple AI, edge, cyber and new GPU companies. He sits on the board of DEOSphere and on the advisory boards of Kobai, BlueFlag, Sales Advisors, and several new stealth companies. Patrick is also a mentor to c...
- Patricia Clay, ModeratorAVP & CIO, Hudson County Community College
Trisha is a strategic Information Technology focusing on the why of Higher Education. She is particularly interested in innovation in teaching and learning, collaboration, business resilience, and information security in the space. She leads information technology as the Associate Vice President and CIO at Hudson County Community College. Pat...
- Dimitri McKayPrincipal Security Strategist, Splunk
Dimitri McKay is a Principal Security Strategist and CISO Advisor for Splunk with 20+ years of infosec experience, ranging from penetration testing, vulnerability assessment work, security program creation and maturation. His role today focuses on all aspects of Security: people, process and technology, and has a breadth of knowledge built up...
- Paul UnderwoodVP, Cybersecurity, Neovera
Paul has more than 30 years of experience working in the Information Security space including 8 years with the US Air Force. Paul was a principal at Digital Signature Trust back in the 90’s working on Public Key Cryptography utilizing Hardware Security Modules to create Root certificates for the Browsers for trusted Root Certificates includin...
- Kirsten StonerTechnologist, Product Strategy Team, Veeam
Kirsten Stoner is a Technologist on the Product Strategy team at Veeam Software. With 10 years of software experience, Kirsten has a specialized focus in all things data management including storage, cloud, cybersecurity, and analytics. Through her years working at Veeam, she leads the creation of technical content for product demonstrations...
- John O'MalleySecurity Researcher
With over 20 years of experience in information security, I am passionate about protecting data, systems, and networks from unauthorized access, threats, and attacks. I have a strong background in identity and access management, security tools, quantum cryptography, and disaster recovery, and I hold two certifications from The Linux Foundatio...
- Wade ElleryField CTO & Sr. Technical Evangelist, Radiant Logic
Wade Ellery, Field Chief Technology Officer and Senior Technical Evangelist with Radiant Logic. Wade has extensive experience in enterprise IT direct and channel software, and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, PAM, ZTA, risk and compliance and IT security challenges. Wade has con...
- Yiannis VassiliadesCISO in Residence, Zscaler
Yiannis Vassiliades is currently serving as CISO in Residence at Zscaler, the global leader in Secure Access Service Edge (SASE) and Zero Trust IT Transformation. With over 25 years of experience in cybersecurity, Yiannis has been deeply committed to productizing transformative technologies that align with organizations’ strategic cybersecuri...
- Rob SloanVP, Cybersecurity Advocacy, Zscaler
Rob Sloan is the Vice President of Cybersecurity Advocacy at cloud security company Zscaler. Rob began his career in cybersecurity in 2002 working for the UK government and led some of the earliest investigations into state sponsored cyber attacks before moving to a London-based security consultancy to set up and lead an incident response div...
- Matt Stamper, ModeratorCISO, Executive Advisors Group, LLC
Matt Stamper is a multi-time CISO with extensive experience in cybersecurity, information security, cloud security, IT audit, risk management, privacy, and governance. Matt is a former research director and security analyst at Gartner (NYSE:IT) and has extensive experience in cloud services and IT service management including international ex...
- Kim WoodruffDirector, Information Security Office / Deputy CISO, Rice University
Kim Woodruff currently serves as a Director on the InfraGard National Members Alliance (INMA) Board and previously served as the Houston InfraGard Chapter President from 2018 to 2023. With over 20 years of work experience, her background includes roles in cybersecurity management and strategic consulting at Texas Children’s, MD Anderson, and ...
- Renaldo McKenzie, HostPresident, Cyversity North Texas Chapter
Renaldo McKenzie is a seasoned professional & cybersecurity leader with a diverse background of proven success in various industries and critical sectors such as Information Technology, Healthcare, Communications, Financial, Transportation, and Government.
His knowledge and expertise are in program development, management, and advancem...
- Josh TomkielManaging Director, Penetration Testing Team, Schellman
Josh Tomkiel is a Managing Director on Schellman’s Penetration Testing Team based in the Greater Philadelphia area with over a decade of experience within the Information Security field. He has a deep background in all facets of penetration testing and works closely with all of Schellman's service lines to ensure that any penetration testing ...
- Kent BlackwellDirector, Penetration Testing Team, Schellman
Kent Blackwell is a Director at Schellman, helping lead their penetration testing and offensive security practice. Kent has over fifteen years of experience serving clients in a multitude of industries, including the Department of Defense and top cloud service providers. He got his start in penetration testing evaluating systems as a civilia...
- Daniel AyalaChief Security & Trust Officer, Dotmatics
Daniel Ayala (@buddhake) is the Chief Security & Trust Officer at Dotmatics, providers of technology solutions for scientific R&D. Throughout his nearly 30 year career, he has led security, privacy and compliance groups in banking and financial services, pharmaceutical, information, higher education, research and library organisations around ...
- Danny ManimboPrincipal | ISO Practice Director | AI Assessment Leader, Schellman
Danny Manimbo is a Principal with Schellman based in Denver, Colorado. As a member of Schellman’s West Coast / Mountain region management team, Danny is primarily responsible for leading Schellman's AI and ISO practices as well as the development and oversight of Schellman's attestation services. Danny has been with Schellman for 10 years and...
- Tim HearlSpecial Agent, Active Shooter Coordinator, FBI Detroit
• 28 Years in Chicago and Detroit Divisions
• Criminal & Counterterrorism Investigations
• SWAT Team member & Sniper Team Leader
• Firearms Instructor
• Tactical Instructor
• Active Shooter Coordinator
• Civilian Response Training - ASAPP/CRASE
• Law Enforcement Response Training - ALERRT - Ian RileySr. Security Operations Analyst, Blumira
Ian Riley is a seasoned cybersecurity professional with over a decade of experience in the IT world, including more than six years specifically focused on cyber security. His career highlights include roles as a Senior Security Operations Analyst at Blumira and Cloud Ops at Amazon Web Services (AWS). Ian's expertise lies in security incident ...
- Chris MontgomerySolutions Architect, Proofpoint
Chris Montgomery is a Solutions Architect at Proofpoint where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he can be found consulting with security practitioners and OEM suppliers focused on utilizing threat intelligence to improve cyber security situatio...
- John BrennanManaging Partner, Holly Ventures
John Brennan is the Managing Partner of Holly Ventures, a seed stage venture capital fund that exclusively invests in and supports cybersecurity entrepreneurs at their earliest stages. John has invested in over twenty security startups, with a focus on supporting founders from day one. Having previously served as a Senior Partner at YL Vent...
- Marc Ashworth, ModeratorCISO & SVP, First Bank
Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...
- Arlenee Lopez-FergusonSVP & CISO, Pendulum Holdings, LLC; CISO, MarcyPen Capital Partners, LLC
Arlenee Lopez-Ferguson is a dynamic cybersecurity professional with proven expertise in strategizing, developing, and leading change across organizations.
She is currently the Chief Information Security Officer at Pendulum Holdings, LLC, a strategic investment and advisory platform that seeks to accelerate opportunity and value creatio...
- Jennifer WomackManager, Cybersecurity Operations, Puget Sound Energy
Jennifer Womack has worked for Puget Sound Energy since 2008. She has held various roles within Infrastructure Security, Compliance and Security & Risk. She currently is the Manager of Cyber Security Operations.
- Zabrina McIntyre, ModeratorDirector, Advisory, KPMG; BISO, WiCyS
Zabrina McIntyre is a Director with KPMG focusing on large scale cybersecurity transformations for clients with a focus on compliance. She holds the CISSP and PMP certifications and is working on her PCI QSA. She is a dedicated supporter of Women in Cybersecurity (WiCyS) and is currently on the leadership board for the Business Information Se...
- Jaki FerenzSVP, Global Risk Advisor & Insurance, Marsh
Jaki Ferenz is a client risk advisor in the risk and insurance industry with over two decades of experience. She helps clients navigate operational and organizational risks to empower strategic business initiatives. Jaki has extensive experience and knowledge regarding privacy and security (cyber), errors & omissions, directors & officers, pr...
- Josh KnoppVP, CISO, Enterprise Mobility
Josh Knopp is Vice President & CISO for Enterprise Mobility. In this role, Knopp is responsible for developing and overseeing the implementation of Enterprise’s global information security strategy in a manner that enables business and reduces friction. Knopp joined Enterprise in April 2016. He has more than 24 years of experience working in ...
- Karla Thomas, HostBoard Member, InfraGard Michigan Members Alliance
After holding leadership positions in IT and cybersecurity for well over 20 years, Karla Thomas now focuses on consulting and board involvement. In addition to being on the InfraGard board, she is an active member of the CXO Xchange board and the CyberRisk Alliance Michigan chapter, as well as other advisory boards.
- Shelly ThomasSVP, South Central Zone Regional Manager, Cyber Practice, Marsh
Shelly is the Southcentral Zone Regional Manager within Marsh’s Cyber Practice in Dallas, TX. Responsibilities include advising a number of Marsh’s clients across various industries on risk transfer solutions and helping clients tactically navigate the evolving cyber and technology landscape. Shelly strives to cultivate strong relationships w...
- Mike WilkesFormer CISO, MLS; Adjunct Professor, NYU
Senior professional with broad experience designing, building, and securing high-availability mission critical infrastructures for the infosec, financial services, energy, healthcare, travel, media, and retail sectors.
- InfraGard Michigan Members Alliance
- Tim ApplebyPresident, InfraGard North Texas Members Alliance
Tim Appleby is President of the InfraGard North Texas Members Alliance, and he is a senior leader in the federal team at Mandiant. In his role, he is responsible for the opportunities and programs focused in the Federal, State, Local and Global Government. Prior to joining Mandiant, Tim was the Global Information Assurance Head at Citigroup w...
- Heather ReedHead of Cybersecurity, Nestlé Purina North America
Currently heading cybersecurity for Nestlé Purina Petcare North America, Heather Reed has a proven track record of making a positive impact on her organization and those she leads. With more than seven years of experience in security and compliance, she utilizes her unique background in marketing and learning & development to foster a cybersm...
- Dennis MastinSolutions Architect, CyberArk
Dennis Mastin, CISSP, is a security professional focused on securing the identities of humans and automated workloads. He has been in industry for over 30 years as a software engineer, field sales specialist, and consultant. The past two decades, Dennis focused on Identity and Access Management while at Netscape, Sun Microsystems, and Oracle....
- Erica WilsonVP, Global Cybersecurity and Privacy Risk Management, Reinsurance Group of America
Erica Wilson has more than twenty-five years of IT experience, majority of which have been directly in cybersecurity. She has worked in various industries including manufacturing, higher education, financial services and most recently reinsurance. She has served in all capacities of security, including the role of Chief Information Security ...
- Frank Simorjay, ModeratorPresident, ISC2 Seattle Chapter
Frank Simorjay (CISSP, ISSA Distinguished Fellow) is a cloud security and compliance subject matter expert. Frank works for Microsoft Azure global ecosystem organization as the Lead PM of the Azure automation Blueprint program, that includes the PCI automation blueprint. Frank has written an extensive library of papers, and blogs (http://clou...
- Jean PawlukDirector at Large, ISC2 Seattle Chapter
Jean is an Executive Consultant, ISSA Distinguished Fellow, and honored as a 2015 SC Magazine “Woman of Influence”. With a global focus on strategy, architecture, and technology in the high tech and financial industries, she alternates between technical and executive leadership roles. Once focused on security and cryptography for the financi...
- Jake Bernstein, Esq.Vice President, ISC2 Seattle Chapter
Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense cou...
- Talib AliSolutions Architect, Aqua Security
Talib Ali is a seasoned Solutions Architect at Aqua Security, where he has been making significant contributions for the past two years. With a robust background in computer engineering technology, Talib earned his Bachelor of Science in Computer Engineering from University of Houston. His role at Aqua Security involves designing and implemen...
- Bernie Frazier, SPHRSpeaker, Author & Career Strategist, CAREERCompass, LLC
Author of the highly acclaimed book, “Your Success is in YOU!: Empowering and Equipping You to Create Your Best Career Ever!”, Bernie Frazier, SPHR, is an author, speaker, career coach/strategist, and talent acquisition expert whose mission is to help people overcome barriers to create greater career success. Bernie has over 30 years of exper...
- Minhal GardeziSolutions Architect, Aqua Security
Minhal Gardezi is a seasoned Solutions Architect at Aqua Security, where he has been making significant contributions for the past three years. With a robust background in computer science, Minhal earned his Bachelor of Arts in Computer Science from Case Western Reserve University. His role at Aqua Security involves designing and implementing...
- Allan ReyesStaff Security Engineer, Vanta
Allan Reyes is a Staff Security Engineer at Vanta, leading application security, cloud security, and detection and response. Allan built several programs and initiatives at Vanta, including the product security, static analysis, and sensitive log filtering programs. He has a decade of experience working in software, security, and reliability,...
- Brock BauerSecurity Architect, Varonis
Brock Bauer is a Security Architect from the Incident Response Team at Varonis. He helps customers achieve their security goals through the Varonis platform by enabling them to detect and respond to threats, reduce their attack surface, and mature their security programs. Brock has worn various hats during his career in Enterprise IT Administ...
- Mike Reterstorf, ModeratorCISO, Plante Moran
Mike Reterstorf is the Chief Information Security Officer at Plante Moran, a 100-year-old global Tax, Audit, and Wealth Management firm based in Southfield, Michigan. Mike has over 25 years of professional technical experience covering time in application development, system architecture, and most recently over a decade in Cybersecurity. Thro...
- Adedolapo (Ade) GonzalezSr. Director, Security GRC & Data Security, Docusign
Ade Gonzalez is a Senior Director of Security GRC and Data Security in Docusign. With over 15 years of experience, her expertise spans across building/managing high-performing teams and delivering board-critical programs around Security Governance, Strategy, Risk, Compliance, Data Protection and Cloud Security across various industries (finan...
- Kathryn PattersonSr. Lead Information Security Business Manager, TIAA
Kathryn Patterson supports the Global Cybersecurity & Fraud Management organization at TIAA. In prior roles, she managed 3rd Pty Assessment, Regulatory Exam Mgmt and Audit support, and RCSA. Her career spans three industries: healthcare, telecommunications, and financial services, with additional background in program management, business res...
- Elizabeth SchaedlerSecurity Advisor, Splunk
Elizabeth Schaedler is a Splunk Security Advisor and works with customers to develop strategies aligning security and business risks, and how to use risk-based-alerting to address fraud. Elizabeth has an expansive 20-year data center and security background and has spent time in the HPC world in senior positions at Cray Research, HP, RSA, Sun...
- Marc Menninger, ModeratorInformation Security Officer, AstrumU
Marc Menninger is a seasoned corporate information security and risk management professional with more than twenty years of experience. He has held the Certified Information Security Systems Professional (CISSP) certification since 2000 and the Certified in Risk and Information System Controls (CRISC) certification since 2016. Marc’s career s...
- Aman RahejaSVP, CISO, Humana
Aman Raheja has been at Humana since 2020. In this role, Aman is transforming the Information Protection program leveraging threat and risk-based approaches. He is building a strong team and proactive culture, while keeping the focus on serving our members and associates.
Prior to joining Humana, Aman served as Global CISO for BMO Fina...
- Chris Scheels, ModeratorVice President, Gurucul
Chris has been aligning people, processes and technology to drive companies forward for over 20 years. He has a decade of cybersecurity experience in product marketing and product management. His passion is helping businesses succeed through the strategic use of technology. Most recently he was helping customers accelerate their Zero Trust jo...
- Nathan HammesConsulting Field Solutions Architect, Pure Storage
Nate Hammes is a Field Solutions Architect for Pure Storage, responsible for driving Cyber Resiliency through Pure and Alliance vendor solutions. Nate has over 25 years of experience, from end user to IT Architect (with 15 of those years in technical pre-sales roles) in areas including Cyber Resilience, data protection, storage, virtualizati...
- Michelle Linders WagnerVP, Head of Internal Audit, Docusign
Michelle Linders Wagner, a seasoned risk management executive, brings 25+ years of experience in enhancing compliance and risk posture for Fortune 500 firms. With cyber, compliance, and audit expertise, she builds high performing teams, swiftly identifying fit for purpose solutions that align with business strategy. While she is currently lov...
- John P. DurkinRegional Director, Region 2, DHS CISA
John P. Durkin is the Regional Director for Region 2 within the Cybersecurity and Infrastructure Security Agency (CISA), where he leads the effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure for New York, New Jersey, Puerto Rico, and the U.S. Virgin Islands. Prior to this position, he was CISA’s Chi...
- Richard Staynings, ModeratorBoard Member and International Healthcare Cybersecurity Luminary; Teaching Professor, University of Denver
Richard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised...
- Aaron HuntDirector, Information Security, KP LLC
An Information Security leader with experience establishing resilient security strategies and procedures enhancing the corporate security posture, through evaluation of risk, promoting security awareness and privacy training, management of incident response, managing relationships with customers and business partners, and ensuring continued c...
- William SwoffordDevSecOps Engineer, Lockheed Martin
Navy Veteran with a current role as a Dev Sec Ops engineer focusing in infrastructure resiliency. Past careers in banking software, web application, and construction worker while through college. (Construction applies more to security than I ever thought) Also love coffee.
- Dr. Peter HolowkaDirector of Educational Technology, West Point Grey Academy, Vancouver BC
Dr. Peter Holowka is passionate about digital transformation and technology leadership, particularly in education. His doctoral research was in cloud computing adoption and organizational leadership. His professional work and academic research centre on the digital transformation journey, particularly the journey from legacy systems towards...
- Becky FrickerHead of Security Assurance and Operations, DAT Freight & Analytics
Becky Fricker is the Director of Information Security at DAT Freight & Analytics, where she plays a pivotal role in protecting the company’s digital infrastructure. She oversees Security Operations and Product Security, including areas such as Endpoint Protection and Response, Continuous Threat Exposure Management, Incident Response, and Netw...
- Nazira CarlageCISO, LTK
As a Chief Information Security Officer at LTK, Nazira Carlage oversees Security and IT functions at the company. LTK is a global community of more than 700 team members, top-tier Creators, 8,000 retailers, and 1 million brands across more than 165 countries. Prior to LTK, Nazira held key leadership roles at Salesforce and Dell focusing on p...
- Scott BensonDirector of Cybersecurity and Infrastructure, Mud Bay, Inc.
Scott Benson is the Director of Cybersecurity and Infrastructure at Mud Bay, with over 25 years of experience in the field. He holds certifications such as CISSP, CEH, and PCIP. Scott leads a team responsible for cybersecurity, infrastructure, and help desk services, ensuring successful business outcomes and compliance with industry standards...
- John GardinerCOO & CFO
Winning in the software industry doesn’t come from faking it or even making it. Instead, it takes being great at it, because being exceptional results in a sustainable competitive advantage. Having been a part of great companies that have been honored with awards from Inc. 5000 Fastest Growing Companies, Deloitte Fast 500, Top 50 Best Places ...
- Chris DuffeyIndustry Technical Specialist Lead, Splunk
Chris Duffey is a Splunk Industry Technical Lead specializing in OT cybersecurity. With a focus on security and observability, Chris guides organizations in leveraging Splunk's capabilities to safeguard critical operational technology environments. He has developed specialized content and integrations such as the OT Security Add-on for Splunk...
- Eric Warfel, ModeratorDirector of Strategy & Operations, AI Platform, Salesforce
Eric is the Director of Strategy & Operations for Salesforce's AI Cloud, where he works on the company’s Trust commitments and leads strategic cross-functional initiatives. He is privileged to work with an exceptional team dedicated to delivering the most trusted AI CRM software on the market.
Before joining Salesforce, Eric built and...
- Florian DoumencCEO, Trout Software
As the CEO of Trout Software, I lead a team of talented and diverse professionals who are passionate about delivering innovative and integrated security solutions for industrial and defense companies. With over seven years of experience in the cybersecurity field, I have a strong background in information technology, cloud engineering, and qu...
- Ryan BraunsteinTeam Lead of Security Operations, Automox
A passionate Security Engineer with seven years of experience, committed to safeguarding data and networks. Skilled in identifying vulnerabilities and mitigating threats, while collaborating with teams to develop comprehensive security policies. Enthusiastic about staying current with emerging technologies, ensuring the highest level of prote...
- Greg SissonCo-Founder & Chief Operating Officer, CI-Discern
Greg is a co-founder and Chief Operating Officer of CI-Discern, a veteran owned professional services and solutions firm focused on improving Critical Infrastructure security and resilience. Founded by senior executives from the government and private sector, CI-Discern is committed to creating and implementing solutions that enhance governan...
- Jason WalkerDirector Technical Strategy, Cyber Resiliency, Pure Storage
Jason has been with Pure Storage since 2019, bringing Pure Storage’s Cyber Resiliency message to the market.
At Pure Storage, Jason is the face, voice, and conscience of the practice and has consulted with thousands of customers on the best approach for their desired outcomes.
Jason has 25+ years of experience in this space and...
- Gurucul Representative, Moderator
- Adam MullinsVP, Cyber Administration, BlackRock
Adam Mullins is a valued member of the Cyber Administration team at BlackRock, where he applies his educational expertise to the realm of cybersecurity. His responsibilities include crafting annual compliance trainings and micro-trainings on a variety of security topics, drawing on his background in education to enhance the organization's cyb...
- Titus BickelGlobal Head of Cyber Training & Awareness, BlackRock
Titus Bickel, CISSP, is Information Security's Global head of Cyber Training & Awareness. Titus manages firm-wide messaging of security policies and guidlines and offers annual compliance, virtual, and micro-trainings covering numerous security topics. Prior to his position with BlackRock, Titus produced intelligence and risk assessments for ...
- Tony PierceField CTO, Cyber Security & Infrastructure, Splunk
As Field CTO for Cyber Security and Infrastructure, Tony focuses primarily on Client Cyber and Infrastructure Resilience mapping, Cybersecurity strategy, Data Strategy and Data to outcome goals for Cisco and Splunk clients across all sectors in AMER (Canada, LATAM and US). He partners heavily with internal teams in Product development, Intern...
- Alejandro AyalaCurriculum Developer and Integrator, NCAE Co-Op, Norwich University
Alejandro Ayala is a rising professional in the field of cybersecurity, pursuing a PhD in 2025 through an NSF Fellowship. Alejandro currently serves as a technical lead, ensuring program integration across multiple universities and industry. Alejandro contributes to the University of Washington’s Certificate in Risk Management in multiple rol...
- Lalitha SubramanianProgram Management Director, Academic Programs, UW Continuum College (UWC2), University of Washington
Lalitha Subramanian, Program Management Director at University of Washington Continuum College, has over a couple of decades of experience designing, developing, and delivering large-scale learning and development strategies and certification programs that empower working professionals build the right strengths, skills, and behaviors for orga...
- Janette BarrettoGlobal IT Security Governance Manager, Yazaki North America
As a cybersecurity leader, Janette drives global cybersecurity and information security programs, ensuring enterprise-wide protection and compliance with evolving regulations. Her curiosity fuels her passion for learning and staying ahead in the field.
Collaboration is key to success, whether working with C-suite executives, peers, or ...
- Eric FeyDirector of Elections, Saint Louis County Election Board
Eric is a lifelong St. Louisan and has been serving as the Democratic Director of Elections in St. Louis County since 2015. Eric received a BA in Political Science from Webster University and a MPPA (Public Policy Administration) from the University of Missouri St. Louis. Eric’s professional life has been devoted to public service, having wor...
- Robert GrahamCybersecurity Advisor and Coordinator for Missouri, DHS CISA
Mr. Graham serves as a Cybersecurity Advisor and Cybersecurity Coordinator for Missouri. Currently, based in Columbia, MO he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.
His programs coordinate cyber preparedness, risk mitigation and i...
- Zachary Lewis, ModeratorAVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis
Zach is a seasoned IT executive with a distinguished career spanning strategic IT management, cybersecurity, risk mitigation, and budget oversight. As the AVP IT and CISO for a private higher education institution, Zach has orchestrated transformative initiatives that have fortified the institution's cybersecurity landscape while driving stra...
- Maggie Amato, ModeratorVP, Product Security, Salesforce
Maggie Amato is a dynamic cybersecurity leader with deep expertise in cloud security, AI security, and risk management across technology, healthcare, and federal sectors. As the Business Information Security Officer (BISO) for AI Cloud + CRM Apps at Salesforce, she plays an integral role in advising two Chief Technology Officers on holistic r...
- Eric WarfelDirector of Strategy & Operations, AI Platform, Salesforce
Eric is the Director of Strategy & Operations for Salesforce's AI Cloud, where he works on the company’s Trust commitments and leads strategic cross-functional initiatives. He is privileged to work with an exceptional team dedicated to delivering the most trusted AI CRM software on the market.
Before joining Salesforce, Eric built and...
- Kaustubh SarkarLead Product Security Engineer, Salesforce
As Lead Product Security Engineer at Salesforce, Kaustubh works closely with engineers from the Salesforce AI Platform to ship secure-by-design products. Kaustubh leverages strong relationships with product teams and other stakeholders to reduce overall risk and security debt for the platform. He also helps scale security impact via automatio...
- Mozhdeh KoushkiPrincipal Security, Generative AI and Cloud Security, Salesforce
Charismatic, enthusiastic thought leader, strategy planner and achiever.
- Karim FanadkaDirector of Software Engineering, Salesforce
As the Director of AI Infrastructure at Salesforce, Karim leads a key team responsible for designing and implementing cloud-based infrastructure and platform tools for the Salesforce AI Platform. Karim and his team focus on architecture, scaling, performance optimization, and infrastructure development to enhance system performance and scalab...
- Sean CarrollTechnical Product Engineer, Action1
Sean Carroll has 10 years of IT experience in both MSP and internal IT, giving him a deep understanding of IT operations and what teams need to succeed.
- Erik KleinDirector, Americas Security Solutions Engineering, Dynatrace
Following an 18 year career in software design, development, leadership, and architecture, Erik Klein embarked on a 7 year journey (2007 - 2014) as a pre-sales engineer to evangelize, help develop, and help mature the value of first generation software security tools (SAST, DAST) from obscurity to dominance in order to begin the process of ha...
- Brandon ReidField CTO, Mimecast
Field Chief Technology Officer with more than 15 years' experience designing, deploying, and selling enterprise technology solutions. Currently helping enterprises secure their email, brand, and reduce risk.
- Erika CarraraVP, Chief Technology & Security Officer, The Greenbrier Companies
Erika Carrara is a seasoned cybersecurity and technology expert with over two decades of experience. Skilled at helping businesses navigate cyber risks, data governance, and digital transformation, Erika has led several corporations through a security maturity curve in the defense industrial base, federal sector, and twice in manufacturing, n...
- Brian Shea, ModeratorBISO, Salesforce
Brian is an IT Executive with 29 years of experience from Security Operations and Support, Compliance, Risk Management, Technology Innovation, IT Operations and Supportand. Currently, Brian is a Business Information Security Officer (BISO) supporting multiple business units at Salesforce, delivering security and compliance across our people, ...
- Maggie AmatoVP, Product Security, Salesforce
Maggie Amato is a dynamic cybersecurity leader with deep expertise in cloud security, AI security, and risk management across technology, healthcare, and federal sectors. As the Business Information Security Officer (BISO) for AI Cloud + CRM Apps at Salesforce, she plays an integral role in advising two Chief Technology Officers on holistic r...
- Gowri QuickBISO, Salesforce
Gowri is a mission-driven, people-centric senior cybersecurity leader with 15 years of experience in Threat Intelligence, Security Operations, Risk Management, and Compliance. As a former FBI agent, Gowri proudly served her country and has also worked in Corporate Security. She holds a Master's Degree in Information Science from the Universit...
- Jake Rasko, ModeratorHead of Security Engineering & Architecture, DAT Freight & Analytics
Jake Rasko is a passionate technology leader with an unwavering belief in the transformative power of technology to change the world. With a diverse career spanning both IT and Security, he has honed his expertise in building, running, and maintaining critical infrastructure securely at a global scale.
Over the course of Jake’s profess...
- Matt BeauparlantDirector, Enterprise & Commercial Sales, America Data Protection Solutions, Entrust
Matt has more than 10 years of experience in cybersecurity, covering hardware security modules, encryption key management, tokenization, and CIAM solutions. Based in Austin, Texas, Matt is responsible for helping enterprise businesses improve efficiencies and protect valuable data through Entrust’s Data Protection Solutions. Matt oversees the...
- Travis Nichols, ModeratorDirector of Information Security, Shelter Insurance
Travis Nichols is a seasoned leader in Information Security at Shelter Insurance, where he spearheads the safeguarding the organization’s digital assets. With a robust background in software development, cybersecurity, and management, Travis has consistently demonstrated his commitment to excellence and innovation. His journey is marked by a ...
- Matt HoffmannCIO, KORE Software
Matt Hoffmann is a technology executive with 20+ years in the industry working across development, privacy. security, IT, infrastructure and devops. Throughout his career he has primarily worked with private-equity backed SaaS companies and has been the point person on multiple mergers and acquisitions on both the buy and sell side. In his cu...
- Mike LeFeverMember, U.S. Global Leadership Coalition's National Security Advisory Council; EVP of National Security, Concentric Advisors; Executive Chairman, Illuminate; Former Commander and Senior Military Representative, Office of the U.S. Defense; Representative to Pakistan, U.S. Embassy, Islamabad
Vice Admiral (Ret.) Mike LeFever, USN, currently serves as Chief Executive Officer for Concentric. Concentric is a risk management consultancy that specializes in delivering strategic security and intelligence services. In addition, he is a member of the network of national security experts for “The Cipher Brief,” a digital based conversatio...
- Chirag PatelSenior Attorney, Clark Hill LLP
Chirag H. Patel is a solution-oriented technology and commercial attorney with extensive experience in emerging technologies, artificial intelligence (AI), data privacy, cybersecurity, contracts, e-commerce, and trade secrets. His multi-channel experience encompasses compliance, transactional review, and litigation.
Chirag’s practice s...
- Maria Graham, ModeratorCo-Founder, Mind Over Cyber
Maria is a highly experienced cybersecurity account executive with over a decade of experience in the industry. Her approach to leadership is centered around human relationships and leveraging human capital as a part of her sales process. She is an enthusiastic champion of her clients and focuses on solving their problems, rather than just hi...
- Ed ReynoldsDigital Security Consultant, Americas DPS, Entrust
Ed has over 20 years’ experience in cybersecurity, covering SSL/VPN, Intel chip security technologies, endpoint protection, DLP, data at rest/in motion encryption technologies, key management, and managed security services. Based in Austin, Texas, Ed is a member of the Entrust Digital Security Solutions Center of Excellence for Data Protectio...
- Rees Machtemes, P.EngDirector of Industrial Security, Waterfall Security Solutions
Rees is the lead threat researcher for the annual Waterfall / ICSStrive OT Threat Report and writes frequently on the topic of OT / ICS cybersecurity. Being solutions-focused, he champions INL’s Cyber-Informed Engineering program and regularly provides advice and commentary to government agencies and standards bodies issuing OT security guida...
- Mike McGrailSr. Manager, Data Solutions Engineering, SentinelOne
Mike McGrail leads SentinelOne's data solutions engineering team, focused on using data to uplevel the security posture of customers moving on from legacy SIEM troubles.
After over a decade as a practitioner in the insurance industry, he moved to the vendor space to help more customers solve similar problems. Mike holds a master's degre... - Dillon White, ModeratorDirector, KMicro Tech
Meet Dillon White, a Solutions Engineering whiz and the driving force behind sales engineering at KMicro Tech. With a knack for hybrid cloud solutions and services, Dillon combines his extensive industry experience with a dash of innovation to spark business growth. Before diving into the tech world, Dillon served eight impactful years in the...
- Derek BoothSpecial Agent, U.S. Secret Service
U.S. Secret Service Supervisory Special Agent Derek Booth is a founding member and coordinator of the Mountain West Cyber Fraud Task Force (MWCFTF) which consists of 300+ members of federal, state and local law enforcement, network security personnel, private business owners, and academia partners in the Rocky Mountain Region. The MWCFTF’s m...
- Adam ZollerSVP & Global CISO, Providence
Adam Zoller is the Chief Information Security Officer for Providence, a system of passionate providers focused on partnering with people to simplify health care. With 50+ hospitals, 1000+ clinics, and hundreds of locally driven programs administered by over 120,000+ caregivers, Providence is improving the health of communities, especially the...
- Arvin BansalCISO, C&S Wholesale Grocers
Arvin Bansal is Chief Information Security Officer for Nissan Americas. Arvin is a Cyber Security subject matter expert with proven ability to design, build, and successfully implement global cyber security and risk programs for Fortune 30 firms, including Citigroup, Experian and Verizon.
Arvin’s work has gained recognition across the...
- Brandi JohnsonDeputy CISO, Toyota Financial Savings Bank
Dynamic, strategic, results-driven Cybersecurity executive with deep proven experience in ensuring the security of business systems. Uses thoughtful analysis to reduce enterprise risk, cyber risk, and operational risk by deploying focused proven solutions. Leader in Cybersecurity, emerging technologies, data platforms and Governance Risk and ...
- Rob DavidsonCISO, Pacific Blue Cross & PBC Solutions
Rob Davidson brings many years of experience to his role as Chief Information Security Officer at Pacific Blue Cross and Pacific Blue Cross Solutions. His career started with Dell Canada and has progressed though several senior strategic and leadership positions at industry-defining organizations such as Microsoft and Hootsuite. Prior to his ...
- Chuck MarkarianCISO, PACCAR
As PACCAR's CISO, I am responsible for strategy, investigations, forensics work, policy and procedure creation and review, security risk assessments and project management. This is a global position, with information security responsibility for all PACCAR locations.
- Bill HornPrincipal Product Security Architect, Bayer
Bill is an IT professional with over 20 years of experience driving DevOps, secure SDLC, cloud security, and security architecture initiatives. Holding both a Bachelor's and Master's degree in Cybersecurity and Information Assurance, he brings a strong academic foundation to his work. Bill's certification portfolio includes CISSP and GWAPT, a...
- Hong-Lok LiChief Technology Officer, Alma Mater Society of UBC, Vancouver
Hong-Lok Li is the Chief Technology Officer at the Alma Mater Society of UBC Vancouver (representing 60,000+ UBC students). He has a strong technical background and 20+ years of experience in large organizations in a multi-platform, integrated computing environment. Hong is a Chartered Engineer (CEng) who earned his Master of Science (MSc.) i...
- Erez TadmorCTO, Tufin
Erez Tadmor holds a two-decade career in the ever-evolving information security field, marked by his diverse background in managing various product portfolios and verticals. His expertise spans cloud and network security, automation & orchestration, IAM, fraud detection and prevention. As Tufin's Field CTO, he bridges the gap between customer...
- Dawn ParzychDirector, Product Marketing, Cloudflare
Dawn Parzych is the Director of Developer and AI Product Marketing at Cloudflare. She makes technical information accessible avoiding buzzwords and jargon whenever possible. Dawn is an accomplished speaker, author, and traveler, having recently achieved her goal of visiting all 50 U.S. states.
- Sybrand CnossenITAS Sr. Associate, Weaver
Sybrand has more than three years of experience in information technology and IT risk advisory services. He has consulted with a wide range of clients, including Fortune 50 companies and government agencies. He is well versed in controls testing performed in UNIX / LINUX, and Microsoft (Windows Server and Active Directory) environments, utili...
- Erika Voss, ModeratorCISO, DAT Freight & Analytics
Erika Voss offers two decades of extraordinary success in a series of high level roles at top tier companies that include Capital One, Salesforce, Oracle Public Cloud, Microsoft Corporation and Amazon Web Services.
Erika’s invaluable expertise and broad business range have powered a history of developing successful process improvements...
- Brittany George, ModeratorPartner, IT Advisory, Weaver
Brittany George, CISA, CISM, PCIP, QSA, has over two decades of experience, including former Big Four experience with a focus on public company audits. Her current focus includes cybersecurity, system and organization controls (SOC) reporting, evaluation and testing of IT general controls (ITGCs) and regulatory compliance (including Payment C...
- Mike HughesCISO, REI
As the Chief Information Security Officer at REI, I lead a team of cybersecurity professionals who are passionate about protecting the company's data, systems, and customers. I have over 10 years of experience in cybersecurity, spanning various domains such as incident response, forensics, malware analysis, network security, and data protecti...
- Ambrish SrivastavaGlobal Head of Cybersecurity, Expedia Group
Highly experienced & technically proficient leader with extensive experience in security engineering, product development, operations and compliance. Laser focused on Security architecture, design & implementation, risk reduction, compliance & business orientation. Strong cross-functional skills due to extensive experience in Information Secu...
- Mukesh Dixit, ModeratorCTO, Washington State Department of Labor and Industries
Chief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...
- Shawn E. Tuma, ModeratorCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small...
- Matthew WarnerCTO & Co-Founder, Blumira
Matthew Warner is the Chief Technology Officer and co-founder of Blumira, bringing nearly two decades of cybersecurity experience to the company. Prior to founding Blumira, Matthew served as Director of Security Services at NetWorks Group, an MSSP focused on compliance and ethical hacking.
Seeing a gap in the market, Matthew developed ...
- Ryan Mostiller, ModeratorSr. Manager, IT Security, BorgWarner
Ryan Mostiller is a security leader in the Metro Detroit community, currently serving as the Security Operations Manager for BorgWarner. After more than a decade in both technical and management roles in security, Ryan enjoys any opportunity to engage with fellow practitioners and share learnings. Ryan has worked across various industries and...
- Ahmeed AhmeedDirector, Cyber & Information Security, Inteva Products
Ahmeed is the Director of Cyber and Information Security at Inteva Products, a global Tier-I automotive supplier. In his role, he oversees three key areas: Cyber Defense, Information Security, and Data Privacy (with a particular focus on privacy requirements for the company’s EU entities). His strategic oversight and leadership ensures the or...
- Shirish MunshiPartner, Cyber Risk & Regulatory, PwC
Shirish is a Cybersecurity Partner at PwC and a seasoned and visionary cybersecurity executive with a distinguished career in leading global organizations to safeguard their technology and business assets using automation and advanced techniques (e.g., AI, ML). He has over 15 years of experience leading, managing and successfully delivering l...
- Brian ReedSr. Director, Cybersecurity Strategy, Proofpoint
Brian Reed is Senior Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors r...
- Chirag AroraCISO, Dorf Nelson & Zauderer LLP
Chirag Arora, an esteemed Cyber Security Executive Advisor and CISO at Dorf Nelson & Zauderer LLP in New York, is widely acclaimed for his outstanding contributions to the cybersecurity domain. With a distinguished career spanning more than 15 years, Mr. Arora has garnered numerous awards and accolades for his exemplary leadership and experti...
- Jonathan CiaramellaSr. Threat Intel Analyst, Fortune 500 Convenience Retail
Accomplished Senior Threat Intelligence Analyst and expert threat hunter with a robust background in cybersecurity, holding certifications in Penetration Testing and Bug Bounty. Proficient in Incident Response, Threat Hunting, Intelligence, Computer Forensics, Red Teaming, Penetration Testing, Vulnerability Assessment, and Audits. Skilled in ...
- Nick MullenIT Governance Manager, Mutual of Omaha
Nick Mullen is a passionate technology leader that views information security as a genuinely noble cause. Over the last decade and change, he has been helping all sorts of teams deliver all sorts of solutions of all shapes and size, mostly in the GRC space. Today his primary focus is building and leading the IT Governance program at Mutual of...
- Itai TevetCEO & Co-Founder, Intezer
Itai Tevet is the CEO of Intezer, a leading provider of AI-powered technology for autonomous security operations. He previously led a government Computer Emergency Response Team of elite specialists in incident response, digital forensics, malware analysis, and reverse engineering. His experience led him to co-found Intezer in 2016, with a mi...
- Yosi AttiasPresident, ISSA South Florida; Membership Director, ISACA South Florida
Yosi has an extensive career that spans leading SaaS firms and the development of cutting-edge cloud technology companies. His contributions to national initiatives have fortified the digital landscape and enhanced corporate security measures. As the President of ISSA South Florida and Membership Director of ISACA South Florida, Yosi continue...
- Heather MengarelliManager, Solutions Engineering, Snyk
Heather Mengarelli is a Manager of Solutions Engineering at Snyk, with more than 20 years of experience. Heather is a dedicated and client-focused professional who enjoys helping enterprise clients solve complex use cases in the area of DevSecOps, Web Security, and Web Performance. Her experience includes five years at Accenture as systems sp...
- Stephen ChristiansenPrincipal Security Consultant - Hybrid Cloud, Stratascale
Stephen Christiansen is a Principal Security Consultant at Stratascale, with an emphasis on Security for Data and AI. Stephen has over 20 years of technical, consulting, and managerial success working with Fortune 100 companies in areas such as hybrid & multi-cloud strategy, zero trust architecture and methodologies, and architectural design,...
- Dr. Domingo CastilloCISO, Miami Dade College
Dr. Castillo is the Chief Information Security Officer of the Miami Dade College (MDC) since 2020. Founded in 1959, MDC is the second-largest college or university in the United States, and it is the #1 in associated degrees awarded in Liberal Arts and Sciences, General Studies, and Humanities. Mr. Castillo’s prior roles include Chief Informa...
- Ryan OistacherDirector of Product, Netwrix
Ryan Oistacher is an accomplished product marketing leader and business technologist with extensive experience in the Microsoft ISV partner ecosystem. His expertise in market research, operations, and enterprise technologies has allowed him to successfully connect the worlds of IT and business, enabling organizations realize greater value fro...
- Brent PutnamDirector of Membership, ISSA South Florida Chapter
Brent Putnam is a Certified Information Systems Security Professional with more than two decades experience in IT and IT security operations, management, and compliance in companies such as Ernst & Young, Novell, and The TJX Companies. More recently, Brent led the implementation of a NIST-based information security program at the Broward Coun...
- Ryan BensonSr. Solutions Engineer, Cloudflare
Ryan Benson is a seasoned networking & security engineer, technologist, and industry thought-leader with more than 20 years of experience in the field. He is an Electrical Engineer originally from Louisiana, with experience guiding clients in the energy, defense, government, and mostly large commercial enterprise space in the Southeast U.S. <...
- Steven Aiello, InstructorInformation Security (Focusing on Payments), X
Steven Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.
- Chris SullivanBoard of Directors, Vice President, InfraGard Atlanta Members Alliance
Mr. Sullivan is a seasoned leader with over 20 years of cybersecurity experience. He has a robust track record in developing and deploying cybersecurity solutions at scale for the world’s leading companies. Christopher currently serves as the Managing Director at VoSec, a management consulting firm, and holds key positions as Vice President a...
- Akshay ShettyDeputy CISO, Guidewire Software
Akshay Shetty has been working within the security domain for more than 14 years. A security professional by chance, he has graduated to being passionate about it, having successfully created, scaled, and optimized security programs within various stages of their maturity journey. Akshay has prior Big 4 security consulting experience, and has...
- Kyle MetivierSr. Principal Product Manager, Veracode
Kyle is a Principal Technical Product Manager helping Veracode apply bleeding edge technologies to practical applications in the interest of a cybersecure future. Kyle has worked for over 10 years across private industry and the DoD empowering software teams to develop secure code at scale.
- Mark HamelPrincipal Sales Engineer, BlackBerry
Mark Hamel has worked in technology for more than 30 years, with experience in Mobility, Mobile Security, and Cybersecurity. As a Principal Sales Engineer at BlackBerry Cybersecurity, he provides technical and security guidance to global enterprises interested in implementing AI-based endpoint security solutions. He holds a degree in Computer...
- Kevin HeinemanCISO, Lyric
A forward-thinking Chief Information Security Officer with more than 20 years of progressive success in leading NIST cybersecurity, engineering, and operations functions and developing business-aligned strategies to mitigate enterprise cyber risk. A respected visionary leader recognized for expertise in enterprise risk, cybersecurity, complia...
- Jacob Prosser, ModeratorDirector of Cyber Defense, Cox Communications
Jacob Prosser is a seasoned cybersecurity professional with more than 14 years of experience in the field. As a Director of Cyber Defense at Cox Communications, he and his team play a critical role in keeping the company and its customers safe from cyber threats. His expertise spans various domains within cybersecurity including application s...
- Tennisha MartinFounder & Executive Director, BlackGirlsHack
Tennisha Martin is the Founder and Executive Director of BlackGirlsHack (BGH Foundation), a national cybersecurity nonprofit organization dedicated to providing education and resources to underserved communities and increasing the diversity in cyber. She has worked in a consulting capacity for more than 15 years and in her spare time is a CEO...
- Eduardo Ortiz-RomeuGroup VP, Global Head of Cybersecurity, Techtronic Industries
A change leader, Eduardo Ortiz is considered one of the leading corporate authorities in building effective cybersecurity programs for global operations.
He has spent his career guiding the design, build, evolution, and strength of Information Systems (IS) and Cybersecurity programs for global and domestic companies across diverse ind...
- Alex DavidovSr. Solutions Engineer, Oasis
Alex Davidov is a Senior Sales Engineer at Oasis where he helps customers with a new era of Non Human Identity management. He has over 15 years’ of experience with Cyber Security including Application Security Posture Management at Apiiro, Privilege Access Management at Cyberark and Web Application Security at Akamai.
- Saryu Nayyar, ModeratorChief Executive Officer, Gurucul
Saryu Nayyar is an internationally recognized cybersecurity expert, author, speaker and member of the Forbes Technology Council. She has more than 15 years of experience in the information security, identity and access management, IT risk and compliance, and security risk management sectors. She was named EY Entrepreneurial Winning Women in 2...
- Kevin McDermottCTO, Cook County Clerk's Office
Mr. McDermott has more than 35 years of management and consulting experience in the IT field, with broad background in government, banking, and financial services, as well as experience in healthcare, higher education, the convention and trade show industry, and the not-for-profit world. Mr. McDermott holds an MBA degree from the University o...
- Chris KnauerSVP & Global CSO, Foundever
As Chief Security Officer at Foundever, Chris Knauer is responsible for defining the company’s overall security strategy and improving the effectiveness of global security for the organization. In this role, Chris drives initiatives that enhance the group’s people-driven culture with security programs that align with the group’s core values a...
- Daniel PollackSales Specialist, Harmony Enterprise, Check Point
Daniel is a 25-year veteran within the Security, Mobile Services, and Networking industry. Daniel helps businesses understand the risk and impact of cyberthreats that enterprises face in today’s always changing environment. As security risks continue to evolve from signature-based attacks to behavioral attacks, it is imperative that organizat...
- Virginia JacomeDirector, Cyber Security Risk Management, Florida Cancer Specialists & Research Institute
- Kenneth TownsendGlobal CISO, Ingredion Incorporated
Kenneth Townsend is a proven results-oriented CISO with a successful track record of delivering business value by leveraging technology and leading transformational cybersecurity strategies. Kenneth’s understanding of the digital technology stack across the enterprise and cyber risk management has allowed him to successfully operate in a vari...
- Richard HalmSr. Attorney, Clark Hill PLC
Rick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private pract...
- Sanjana MahadeshwarTechnical Security Engineer, Yahoo
A dedicated Security Engineer with a passion for safeguarding Yahoo resources against cyber threats. With more than three years of experience in the realm of cybersecurity, I have honed my skills in securing applications, identifying vulnerabilities, and implementing robust solutions. With a Master's degree in Cybersecurity, my expertise exte...
- Elyse RinneSr. Software Development Engineer, Yahoo
I thrive on building security software that empowers Yahoo's cybersecurity team. My software engineering background grants me a unique perspective, allowing me to develop essential tools for attack recognition and defense. This fuels my continuous learning and drives me to contribute more broadly to our security programs.
- Bonnie ViteriPrinciple Technical Security Engineer, Yahoo
Building security programs and devising simple solutions to complex problems is what I do. I didn't travel the traditional path into cyber, and I don't plan to conform now.
A behavioral psychologist at heart who is always watching and actively listening when everyone else is waiting to respond, paired with an M.S. in Criminology, make...
- Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more t...
- John Bryant, CISSPCybersecurity Advisor, Region 7 (IA,KS,MO,NE), CISA
Mr. John Bryant serves as a Cybersecurity Advisor for Region 7 (IA, KS, MO and NE) for the Cybersecurity & Infrastructure Security Agency (CISA), Integrated Operations Division. Based in Kansas City, Missouri he supports the Department of Homeland Security’s (DHS) mission of partnering with industry and government to understand and manage ris...
- Jarrod Forgues SchlenkerSpecial Agent, Kansas City Division, FBI
Jarrod Forgues Schlenker is a Special Agent with the Kansas City Division of the FBI, investigating cybercriminal violations. Previously, he investigated violent crimes against children and human trafficking in Kansas City and worked as an Intelligence Analyst at FBI Headquarters in Washington, DC. Before joining the Bureau, he worked in the ...
- Dr. Joye Purser, CISSPField CISO, Veritas Technologies
Dr. Joye Purser is Field CISO at Veritas Technologies, the number-one maker of data backup systems. She is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.
In 2022, Dr Purser was the first-ever senior executive Regional Director in CISA Region 4, the U.S. Cybersecurity and Infrastructure Security Agency. Before CISA, ...
- Steve HodgesCISO, State of Georgia
Steve Hodges serves as the Chief Information Security Officer (CISO) for the State of Georgia, where he leads the charge in safeguarding critical digital assets and infrastructure against cyber threats. With a career spanning more than three decades in information technology and cybersecurity, Steve brings a great deal of experience and exper...
- Angela HintonEducation Working Group Lead, HISPI AI Think Tank - Project Cerebellum
Angela M. Hinton was the first Chief Counsel to the City of Atlanta’s Department of Information Technology. Over 13 years, Ms. Hinton served the City’s CISO and the Information Security Governance Board. She tailored Information Security policies, and related compliance and education strategies for all levels of City Government. As Senior Cor...
- Taiye Lambo, ModeratorFounder, HISPI AI Think Tank - Project Cerebellum
Taiye Lambo is a Serial Entrepreneur, Cybersecurity, and Risk Management Pioneer. He co-founded HISPI, eFortresses, CloudeAssurance, and recently LamboPublishing.com. He is a Self-Published Author of Attribution: Social and Cyber Spaces, a fictional novella available on Amazon.
He has 33 years of experience in the area of Information T...
- Kenneth MorasSecurity GRC Lead, Plaid
Kenneth Moras is a recognized leader in the cybersecurity Governance, Risk, and Compliance (GRC) space, with extensive experience in building GRC teams from the ground up at Plaid and scaling large GRC programs at notable organizations such as Meta and Adobe. His expertise also extends to cybersecurity consulting for Fortune 500 companies dur...
- Jarrod Forgues Schlenker, ModeratorSpecial Agent, Kansas City Division, FBI
Jarrod Forgues Schlenker is a Special Agent with the Kansas City Division of the FBI, investigating cybercriminal violations. Previously, he investigated violent crimes against children and human trafficking in Kansas City and worked as an Intelligence Analyst at FBI Headquarters in Washington, DC. Before joining the Bureau, he worked in the ...
- Tracey 'The Safety Lady' Hawkins, ModeratorAward-Winning Safety Speaker and Writer
Tracey Hawkins, aka “Tracey, the Safety Lady,” is a leading safety and security expert. She’s a powerhouse speaker, writer, trainer, and international content creator who has created and delivered safety and security programs, in-person and virtually, since 1995. She hosts the new "Drive with NAR: The Safety Series" podcast, which debuted in ...
- Kelly RogersBusiness Information Security Lead (BISO), Blackbaud
Kelly also serves as First VP, Board of Directors, for the ISACA Philadelphia Chapter.
- Donna RossCISO, Radian Group Inc.
Dynamic leader and board member demonstrating over 20 years of diverse risk, compliance, information security, technology, and operations experience within the manufacturing, insurance, banking, financial services, and retail sector. Adept in developing and implementing strategic technology and risk solutions, performing research and analysis...
- Yaron Levi, ModeratorCISO, Dolby Laboratories
Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ...
- Michelle GarciaDirector, Information Security & Compliance, Carnival Cruise Line
Michelle is recognized as a leader in the fields of IT and OT Cyber Security with an extensive foundation of knowledge in ecommerce, security operations, technology globalization, and pioneering where cybersecurity and vessel safety converge. In Michelle's 30-year career, she has extensive experience leading diverse teams across multiple tech...
- Josh Vander VeenSenior Counterintelligence Officer (SCIO), Kansas City National Security Campus
Josh Vander Veen has worked in the counterintelligence profession for over 20 years and currently directs the Counterintelligence division at the Kansas City National Security Campus (KCNSC). Josh previously worked Multi-Discipline Counterintelligence (MDCI) activities within the Intelligence Community, and is a former U.S. Army CI Agent with...
- Chul ChoiSr. Solutions Architect, Okta
For more than 25 years, Mr. Choi has been involved in more than 100 security and identity management projects. His experience spans multiple industries and public segment entities. He has served diverse roles in these IAM programs and holds a patent for entitlement management. Since 2019, he has been working as a Senior Solutions Architect fo...
- Shefali MookencherryCISO & CPO, University of Illinois at Chicago
Shefali is a seasoned professional with expertise in information security, privacy, higher education, HIPAA, research, healthcare policy and strategy, promoting Interoperability (PI), and compliance. With 20+ years of cybersecurity, privacy, and higher education experience—including 30+ years of healthcare experience. She is acknowledged as a...
- Jay LongleySolutions Architect, Envision
Jay is a seasoned tech professional with over 27 years of experience in the industry, including a remarkable 14-year tenure as CEO. His accomplishments have garnered him prestigious national and state-level awards, notably earning the title of Businessman of the Year in the State of Rhode Island.
After successfully selling his previous...
- Theresa PaytonFirst Female White House CIO, CEO of Fortalice Solutions, and 2019 Woman Cybersecurity Leader of the Year
Payton is the cybersecurity expert that organizations turn to for discreet help during data breaches and to improve IT systems and strategies. She made history as the first female to serve as White House Chief Information Officer and currently helps organizations in both the public and private sectors protect their most valuable resources.
Quinten SepeSr. Solutions Engineer, Rapid7Quinten Sepe is a Senior Security Solutions Engineer at Rapid7 with over 12 years of experience in enterprise IT. Possessing a passion for cloud security, he brings his background in both enterprise sales and network/systems administration with him everyday to help creatively solve challenges in the cybersecurity space.
Throughout his ...
Kelly RogersFirst VP, Board of Directors, ISACA Philadelphia ChapterKelly also serves as the Business Information Security Lead (BISO) at Blackbaud.
Rosko (Ronald) GoingsSolutions Engineer, Perception PointRosko brings with him a diverse background in IT security and compliance. He has worked in a wide array of technical roles including Technical Support, Network Security, Solution Engineer, as well as Customer Success. Throughout all of his experiences, Rosko has dealt with a number of regulatory and compliance organizations. In his current ro...
Steve ToolePrincipal Solutions Consultant, SailPointSteve Toole is a Principal Solutions Consultant with SailPoint Technologies. With almost 20 years' of Identity Security experience, he is responsible for helping clients around the world understand Identity Security and how to apply it to achieve business goals and objectives.
Joe ShopeStaff Solutions Engineer, SnykJoe Shope is a Staff Solutions Engineer for Snyk. They support Fortune 500 customers with modernizing AppSec practices and adopting a fix-based DevSecOps culture. With over a decade of cybersecurity experience, Joe has led programs ranging from Physical Security to Information Security, and from Vulnerability Management to Cloud Modernization...
David LindnerCISO, Contrast SecurityDavid Lindner is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security ...
Michael CalderinCISO, YAGEO GroupMichael Calderin is a seasoned executive with 30 years of information technology, security, and risk mitigation experience for major global companies. Recognized for demonstrating a natural aptitude for process improvement, as well as for driving efficiency while containing costs, he has a verifiable history of contributing directly to compan...
Andrei TchouvelevChief Innovation Officer, SyxsenseAndrei Tchouvelev, Syxsense Chief Innovation Officer, is a critical thinker, ideator, speaker, evangelist, and an accomplished executive with a breadth of strategic and operational expertise. Andrei has an extensive knowledge of the technology space, and a wealth of market positioning and business acceleration experience. His current role as ...
Tad BrissonEnterprise Solutions Engineer, OktaTad is a Solutions Engineer who has served Okta's enterprise customer base for close to three years. Tad is committed to helping organizations understand what they can achieve with Okta and is experienced in all stages of the product lifecycle, including demos/PoCs, system architecture, and product implementation. He has spent 10+ years in t...
Arron HarrellSr. Solution Architect, Picus SecurityArron Harrell is a cybersecurity engineer with 25 years' experience for various cybersecurity manufacturers. Arron has spent the last eight years of his career in the Breach and Attack space for various BAS providers. Arron is an Army Veteran that served in Operation Desert Shield/Desert Storm. He resides outside of Dallas, Texas, on an off-g...
Ben CarrChief Security & Trust Officer, HalcyonBen is a Security & Risk Executive and recognized thought leader with more than 25 years of results driven experience in developing and executing security strategies. Currently, Ben is the Advisory CISO for Halcyon. Halcyon has built the first anti-ransomware engine to address one of the most prevalent threats in the cyber industry today. Ben...
Sule TatarSr. Product Marketing Manager, Arctic WolfSule Tatar is a Senior Product Marketing Manager at Arctic Wolf, where she does research on security trends and brings groundbreaking cybersecurity products and services to market. She has extensive experience in the B2B cybersecurity space and holds a bachelor's degree in computer engineering and an MBA.
Carlos Guerrero, ModeratorCo-Founder & Community Director, Mind Over CyberGiven that his roots are in fine arts, Carlos Guerrero's journey into the world of cybersecurity and compliance might seem unconventional. However, it is precisely this artistic background that has shaped his distinctive approach and allowed him to thrive as a Senior Account Executive at 360 Advanced, a leading cybersecurity audit and complia...
Lisa Plaggemier, ModeratorExecutive Director, National Cybersecurity AllianceLisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t b...
Jonathan CarrCybersecurity & Compliance Manager, Flow Control Group, Perception PointMeet Jonathan Carr, a cybersecurity and compliance manager with a passion for fortifying digital realms and collecting tangible treasures. With an extensive background in cybersecurity and compliance, Jonathan is the go-to guardian for securing data and ensuring regulatory adherence.
Off the clock, you'll find Jonathan on the basketbal...
Eric C. Botts, ModeratorDirector, Global Cybersecurity Program, University of St. ThomasEric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a cours...
Devin KruglyDirector, Practice Advisor, Rapid7Devin Krugly is the senior security executive with an ardent focus in establishing and maturing an enterprise security strategy to reduce cyber risk by strengthening attack surface and risk management programs. Devin has over 21 years of experience with numerous Fortune 500 companies as a practitioner and consultant in managing technical and ...
Anahi Santiago, ModeratorCISO, ChristianaCare Health SystemAnahi Santiago is the Chief Information Security Officer at ChristianaCare Health System, the largest healthcare provider in the state of Delaware. Prior to CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. In her role as CISO, Anahi has overall responsibility for the organization's ...
David Lingenfelter, ModeratorCISO, Penn EntertainmentDavid Lingenfelter is the Chief Information Security Officer at Penn Entertainment, responsible for ensuring the highest possible level of security for the rapidly changing risk landscape. David manages teams that oversee IT security and compliance for both the retail and digital aspects of the business. David believes that in order to implem...
Jessie GibbonsTechnical Director, Skybox SecurityJessie Gibbons is a dynamic IT professional specializing in cybersecurity, with a strong focus on partner and account management. With over twenty years of experience, he has excelled in nurturing strategic partnerships and managing key client accounts within the cybersecurity sector. Leveraging his expertise, Jessie has successfully cultivat...
Ray CottenPrincipal Solutions Architect, ElasticWith over 20 years of experience in information security, this accomplished expert addresses security challenges and vulnerabilities by crafting innovative solutions for organizations. They have successfully managed large, complex programs for Fortune 500 companies, exhibiting both technical expertise and exceptional cross-functional team lea...
Bryan Bechard, ModeratorCISO, Flagship Credit AcceptanceBryan is a 20+ year InfoSec career professional currently serving as CISO for an auto finance company and teaching the next generation of InfoSec pros.
Luke McNamaraDeputy Chief Analyst, Mandiant Intelligence, Google CloudLuke McNamara is the Deputy Chief Analyst with Mandiant Intelligence, with over a decade of experience in cyber threat intelligence focusing on emerging threats and trends. His research has appeared in Bloomberg, CNBC, CNN, The Hill, The Nikkei, Lawfare, and other media outlets. Luke has presented at security conferences such as RSAC and Blac...
Garry ColdwellsSr. Manager, Systems Engineering, Palo Alto NetworksGarry has 25+years of cybersecurity experience. He has worked on security projects of global scale and reach and has spoken at conferences for 20+ years on what he has seen and learned in the field. Today, Garry is part of the global solutions consultant group at Palo Alto Networks, where he works with key clients on possibilities for their S...
Bill Lawrence, CISSPChief Delivery Officer, ITEGRITI CorporationBill Lawrence, Chief Delivery Officer, ITEGRITI (CISSP, MS International Relations, MS Military Science, BS Computer Science), is a cybersecurity executive who previously served as the NERC VP/CSO and Senior Director of the E-ISAC. He led 40 employees in a 24/7 information sharing and analysis center to defend the North American electric grid...
Adam EvansSVP & CISO, RBCAdam Evans is Senior Vice President (SVP) & Chief Information Security Officer (CISO) for RBC.
As CISO, Adam sets RBC’s cyber vision, strategy and program to reduce cyber risks and keep clients, employees, and systems safe. He manages an evolving threat landscape and the global expansion of cyber security services as RBC’s businesses c...
Greg MurraySVP, Information Security & CISO, Rogers Communications Cda Inc.A Canadian and United States dual citizen with over 25 years of international executive experience. Greg is widely recognized as a business‐focused technology and cyber security expert. He has a proven track record of establishing intricate public‐private partnerships and delivering transformational technological solutions by building high pe...
Zaira PirzadaVice President, Hive ProZaira Pirzada is the VP of Product Marketing at Hive Pro. Prior to joining Hive Pro, she was a Security Analyst with Gartner, Inc., covering the DLP, File Analysis, and Data Masking markets. Zaira was also featured on CBS as a main actress in the prime-time television show “Hunted”, Wired for her technical acumen, and is currently a popular-s...
Gabriel NwajiakuCommissioner, City of Austin's Community Technology and Telecommunications CommissionGabriel Nwajiaku is a seasoned cybersecurity expert, army veteran, and community leader. Holding a diverse array of certifications including CISM, PMP, Security+, and CySA+, Gabriel brings a wealth of knowledge and experience to the table. His journey began in the military, where he honed his skills in strategic planning and risk management, ...
Tony Meholic, ModeratorDirector of Cybersecurity / CISO, The Bancorp BankAnthony is currently Director of Cybersecurity, Chief Security Officer at The Bancorp Inc. in Wilmington, Delaware. He has worked extensively with application development including creation of simulation software for emergency medical providers, work with local government agencies on EMS trending and metrics and customized user interfaces for...
Lonnie BestManager, Detection & Response Services, Rapid7Lonnie Best has spent over 13 years in security, with his introduction to the field working physical security at a commercial nuclear power generating plant, and the last 6+ of those years helping organizations detect and respond to security incidents as part of Rapid7's Managed Detection and Response (MDR) practice. His experience during tha...
Simon-trésor ShabaniSr. Security Solutions Engineer II, Rapid7With more than 13 years of experience, Simon-trésor Shabani is a skilled cybersecurity expert with a demonstrated history of working in the industry both in EMEA and the Americas. As Sr. Security Solutions Engineer II at Rapid7, he strives to raise awareness on the importance of best security practices and to constantly educate clients and pa...
Randy CressAssistant County Manager / CIO, Rowan County, NCRandy J. Cress is the Assistant County Manager and Chief Information Officer for Rowan County, bringing over two decades of service in enhancing government technology and digital strategies. As CIO since October 2015, he has led the development of a fully virtualized data center and the adoption of cloud services to improve efficiency. His wo...
Krista Arndt, ModeratorAssociate CISO, St. Luke's University Health NetworkKrista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs i...
Andreea AndersonIT Manager, AMNI International PetroleumIT Manager for AMNI International Petroleum, with over 15 years of experience in leading technical teams and leading strategic IT initiatives. With a robust background in technical architecture and design, Andreea has consistently delivered innovative solutions to enhance operational efficiency and align IT with business objectives.
Ho...
Chris JohnsonAssistant Director of Technology Services, City of Independence, MissouriChris Johnson is currently serving as the Assistant Director of Technology Services for the City of Independence, Missouri. In this role he is responsible for strategy and execution of all technology needs for the various City departments. These functions include HelpDesk, deskside support, applications management, data center/server admin, n...
Benjamin Corll, ModeratorCISO, Americas, ZscalerBen is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, a...
Tim TsujiiElections Director, Forsyth CountyTim Tsujii is the elections director for Forsyth County. Prior to joining Forsyth County, Tsujii worked at the Guilford County Board of Elections from 2005 to 2016, serving as early voting director and eventually deputy director of elections.
He leads an organization responsible for conducting elections in Forsyth County, maintaining v...
Tony CookSr. Director, DFIR & Threat Intelligence, GuidePointTony Cook is the Senior Director responsible for DFIR & Threat Intelligence on GuidePoint Security’s consulting team, where he manages digital forensics, threat intelligence and incident response engagements on behalf of the firm’s clients. His career background includes high-level national security activities in cybersecurity operations for ...
John BrownSr. Security Evangelist, Team CymruJohn Brown is a Senior Security Evangelist and member of the Team Cymru Outreach team. Prior to joining Team Cymru, he was CTO of a regional ISP that provided Internet and Voice services via fiber optic and microwave technologies. Mr. Brown has actively been involved with Internet technologies since 1984, when as a high school student he conn...
Vince SimonowiczCIO / ITS Director, City of Rock Hill, SCVince Simonowicz graduated from the University of Houston in electrical engineering and is a certified CIO from the University of North Carolina School of Government and has been in the engineering and technology fields for more than 40 years. Vince has been an integral participant and leader for building complex secure enterprise based digit...
Rob SolomonSenior Cloud Solutions Architect – Alliances, CrowdstrikePrior to his current role at CrowdStrike, Rob Solomon was a Senior Solutions Architect in the ISV segment at AWS, helping software companies migrate and modernize on AWS to accelerate their pace of innovation and operational efficiency. From past roles in SaaS operations and during his time at AWS, Rob experienced first-hand the challenges of...
Berris Bramble, ModeratorDirector of Information Security, Commercial Real Estate IndustryBerris Bramble holds a Computer Science degree, is a founding member of the local InfraGard Technology Cross Sector Council, and regularly volunteers at local cyber conferences and events. He is a 20-year active member in the local InfraGard Houston chapter participating at the Board and leadership levels. He has spent the bulk of his caree...
Andy StoneCTO, Americas, Pure StorageAndy Stone is an accomplished IT executive with a passion for technology and creating innovative solutions that solve business problems and deliver results. As CTO, Americas, at Pure Storage, Andy is focused on delivering next-gen data storage and protection technologies that help companies get better insights, improve time-to-market, and mak...
Jake ThomasEngineering Manager, OktaJake currently manages the Data Foundations team at Okta after transitioning from Principal Engineer on Okta's Defensive Cyber Operations team. He previously led data platform teams at Shopify and CarGurus, has taught various O'Reilly courses, and regularly contributes to data-oriented OSS projects.
Sanjit GanguliVP, CTO in Residence, ZscalerSanjit Ganguli is VP, CTO-in-Residence at Zscaler, specializing in zero trust strategy, network transformation and digital experience monitoring engagements. For more than 20 years, he has worked in a variety of roles, including as a Gartner analyst and Deputy CTO at Riverbed. Sanjit was among the original analysts that coined and defined the...
Brian CederdahlBoard Director, Membership, Cloud Security Alliance, Delaware Valley ChapterBrian has more than 25 years of technology expertise in IT Infrastructure, cybersecurity, semiconductor, and systems sales with Appgate, Rackspace, RealCloud, CoreSite, and Verizon Terremark. He is a graduate of Villanova University with B.S. in Electrical Engineering.
Sherry HunyadiChief Security Architect, ChevronSherry Hunyadi is the Chief Security Architect for Chevron, a role she assumed in May 2021. Sherry leads Chevron’s Cybersecurity Engineering and Innovation team, responsible for strategic direction and technical execution of security-by-design practices across information technology (IT) and operational technology (OT). She is a member of Che...
Scott DickinsonCISO, AnMed HealthScott Dickinson is passionate about Information Technology and Information Security and has over 20 years in the fields of information security and information technology. He has worked with Federal and State governments to include FBI, DOD, Veteran Affairs, State of SC, and the private sector. He has been a CIO, a CISO, a virtual CISO, Cyber...
Alamdar HamdaniUnited States Attorney, Southern District of Texas, DOJAlamdar Hamdani is the 24th United States Attorney (USA) for the Southern District of Texas. Nominated by President Biden in October 2022 and confirmed by the United States Senate in December 2022, Hamdani is the chief federal law enforcement officer for the Southern District of Texas (SDTX). The district was established in 1902 and encompass...
Cheri Sigmon, ModeratorvCISO, ConfidentialLeveraging 21 years of experience in leadership, information security and workforce development, as a Chief Information Security Officer (CISO), Office of the Secretary of Defense (OSD), Cheri secured sensitive military networks/communications/technology. The Joint Staff; USSTRATCOM Joint Task Force-Global Network Operations; Headquarters Air...
Bjorn BoePrincipal Solutions Engineer, LaceworkBjorn is a Principal Solutions Engineer at Lacework with over 20 years experience helping customers find better ways to build, run, manage and secure their software workloads.
Pure Storage RepresentativeChristine WeberCISO, N.C. State Board of ElectionsChristine Weber recently joined the NC State Board of Elections team as the Chief Information Security Officer. With over 20 years of experience in Information Technology and Cybersecurity, she brings a wealth of knowledge to her role. Her expertise spans both the Defense and Academic Industries, where she has contributed significantly to saf...
Steve McCullarPrincipal Solutions Architect, OktaSteve McCullar is a Principal Solutions Architect at Okta. In this role, Steve advises Okta's customers and prospects on how Okta's solutions will help them solve complex Identity and Access related issues. Steve has more than 30 years of experience in crafting Identity and Access based solutions for customers, including almost six years at O...
Jim CoylePublic Sector CTO, LookoutJim Coyle is the U.S. public sector CTO at Lookout Security, utilizing his 20+ years of knowledge and expertise to help close the security gap many government agencies and organizations face today. A cybersecurity industry thought leader exploring geo-political cyber related issues, the latest threats and defense strategies, as well as indust...
Brian SchwarzkopfSr. Director, Systems Engineering – New England, FortinetBrian Schwarzkopf is the Senior Director of Engineering for New England Enterprise at Fortinet. As an active leader in Fortinet’s wider engineering team, Brian and his team help organizations achieve their cybersecurity objectives with solutions for tooling, staffing and processes that enable greater security effectiveness. Whether in areas o...
James Kimble, ModeratorSr. Director, Enterprise Security Architecture, CISSP, C|CISO, Lowe'sJames Kimble serves as the Senior Director of Enterprise Security Architecture, where he is instrumental in orchestrating collaboration with executive leadership and key stakeholders to establish and sustain strategic frameworks for securing applications and infrastructure. He is tasked with the role of guiding the mission, vision, strategy, ...
Sherri LeachDeputy CISO, Ingersoll RandSherri Leach is a proven tactical and strategic innovator, harnessing over 27 years of technical leadership experience across multiple fields within cybersecurity. She is currently the Deputy CISO at Ingersoll Rand, and has previously served in operations and engineering roles at Trane Technologies, MITRE, and ManTech.
Her skills have ...
Mike HortobagyiSr. Manager, Solution Engineering, OktaWith more than 20 years in Canadian InfoSec, Mike Hortobagyi is an accomplished engineer and technical leader. Based in Toronto, he currently leads Okta's Commercial Presales team across Canada. Mike has experience in a wide variety of security technologies, including Zero Trust, Identity, and Cloud Security.
Lior YaariCEO & Co-Founder, Grip SecurityLior has vast experience in cybersecurity having worked as a practitioner, investor, and entrepreneur, providing him with a deep understanding of identifying key innovations and the business dynamics of building successful companies. Prior to Grip, Lior was CTO for YL Ventures and a member of the YL Ventures Insiders Network, and served as a ...
Chris BaroneSecurity Architecture Lead, Convenience RetailCurrently the Lead Security Architect at Wawa, Chris has had multiple roles developing process and evangelizing security functions to the rest of the organization. Chris' undergraduate degree is from Drexel University, and he holds a Master's in Cybersecurity Strategy from George Washington University.
Grip Security PlaceholderFortinet RepresentativeAkshit GoelCybersecurity Architect, Schlumberger (SLB)Akshit Goel is a Cybersecurity Architect at SLB where he leads a team of security engineers to deliver secure software solutions to the Energy industry. He helps the teams design, build, and test security solutions and tools. His focus areas are Application Security, Cloud Security, and DevSecOps. He is an automation enthusiast and pursues th...
Sara Ricci, ModeratorRisk and Resilience PractitionerSara Ricci is an accomplished executive with a proven track record in global leadership roles, building new capabilities and enhancing organizational resilience. She is experienced in Risk Management and Technology Enablement in highly regulated financial and energy sectors. Sara excels at building trust and credibility with executives, clear...
Henryk CiejekVP, Information Security, PayScale, Inc.Henryk has actively been part of the technology space for over 25 years. He has worked at various companies ranging from start-ups to established global Fortune organizations. Throughout his career, he's worn many hats and titles, focusing on his passion for cybersecurity, business goals, and program building. Having been the first security l...
Jared LeeSr. Security Engineer, HubSpotWith nearly 10 years at HubSpot, Jared leads automation initiatives within the Corporate Security team, elevating security measures to new levels. With extensive experience in the cybersecurity field, he is dedicated to building automated solutions to safeguard HubSpot's environment, driven by a passion for detection and incident response.
Stephen Head, ModeratorNational Director – Cyber Risk Center of Expertise, Jefferson WellsAs the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both pub...
Jimmy PhippsRegional VP of Sales – East, LightBeam.aiData Security, Privacy, and Governance Evangelist at LightBeam.ai With more than 11 years of experience in selling cloud-based and enterprise-focused technology solutions, Jimmy has developed strong skills in new business development, customer relationship management, and strategic partnerships. He has also gained domain expertise in DPA, clo...
Amy BogacCISO, Baker Tilly USAmy Bogac was most recently the CISO and Vice President of Enterprise Security and Infrastructure at The Clorox Company. With a passion for securing great brands, Amy previously led the Global Information Security and Infrastructure department for CF Industries, was the Director of IT Security Operations for the Walgreen Company, a member of ...
Todd KnappCEO, Envision Technology AdvisorsTodd has been providing IT services nationally for over 25 years and draws inspiration and insight from participation in a wide range of executive boards and industry associations. He has an extensive background in strategic planning and implementation of business technology solutions, and founded his firm Envision Technology Advisors. As a p...
Amanda BerlinDirector of Incident Detection Engineering, BlumiraAmanda Berlin is the Director of Incident Detection Engineering at Blumira, bringing nearly two decades of experience to her position. At Blumira she leads a team of incident detection engineers who are responsible for creating new detections based on threat intelligence and research for the Blumira platform.An accomplished author, speaker, a...
Blaise FelloSolutions Architect, SyxsenseBlaise is currently a Solutions Architect at Syxsense and has been working in the IT field for the last 12 years as part of retail, MSP contracted to educational systems, and systems administrator for a spectral imaging startup company. He currently holds A+, Network+, Server+, and Security+ Certifications.
Jon CassellSr. Solutions Architect, SyxsenseJon Cassell is currently a Senior Solutions Architect at Syxsense and has been working in the IT and Infrastructure industries for the last 15 years. Before working at Syxsense, Jon was an IT Manager for a large financial services firm and has a background in Accounting and Tax consultation. He currently holds an MCSA in Server Infrastructure...
AccessIT RepresentativeCharles GarzoniDeputy CISO & Staff VP, Cyber Defense Operations, Centene CorporationCharles Garzoni is deputy CISO Centene Corporation and responsible for cyber defense operations. His career spanned multiple industries, law enforcement, and the military specializing in building teams to investigate, analyze, and attribute both nation-state and criminal cyber attacks. Over his career he has worked hundreds of high-profile i...
Rocco FioreSolutions Architect, SyxsenseRocco Fiore is a Solutions Engineer at Syxsense. Rocco has an eclectic experience profile within IT and Security, helping customers over the past seven years successfully implement transformational technologies in the areas of network security, wireless communications, and endpoint security. Experienced as a customer advocate and technical ex...
Alkin GorgunSr. SASE Leader, Canada, CloudflareAlkin specializes in helping drive Digital Transformation and Cybersecurity initiatives in the enterprise. At Cloudflare, he leads the SASE (Secure Access Service Edge) product portfolio for Canada, working with organizations across all verticals to build a safer, faster, more reliable Internet. Previously, Alkin was head of MIS3’s Cybersecur...
Manoj Tripathi, ModeratorVP, Global Information & Product Security, PindropManoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C...
Cátia PereiraManager, North American Sales Engineering, KiteworksHelping CISOs achieve complete visibility of the sensitive content across the enterprise network, and recognize and mitigate risk associated with that content.
Carlos BacquetPrincipal Solutions Architect, LaceworkCarlos Bacquet is a Principal Solutions Architect at Lacework where he solves Cloud Security problems for enterprise customers in the Toronto region. Before joining Lacework Carlos spent the last 15 years working on network management and security applications in the Telecommunications, Cable and Streaming Media industries. Carlos holds a Bac...
Clinton HergetField CTO, SnykClinton Herget is Field CTO at Snyk, the leader in Developer Security, where he focuses on crafting and evangelizing our strategic vision for the evolution of DevSecOps. A seasoned technologist, Clinton spent his 20-year career prior to Snyk as a web software developer, DevOps consultant, cloud solutions architect, and engineering director. C...
Ashley-Yvonne HowardSr. Cloud Security Strategist, PantherAshley-Yvonne Howard is an experienced cloud security strategist with a master's degree in Cybersecurity from the University of Denver, complementing her undergraduate degrees in German Language and Literature & Film Studies, which reflects her unique fusion of art and science. With a career marked by unwavering determination and adaptability...
Lina Dabit, ModeratorRCMP Officer in Charge, Cybercrime Investigative Team TorontoLina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while...
Amit ZimermanCo-Founder & CPO, Oasis SecurityAmit Zimerman, Co-Founder and Chief Product Officer at Oasis, is a seasoned leader with a diverse technical and product background. Before co-founding Oasis, he played pivotal roles at CyberMDX, and Microsoft, bringing a wealth of product and security expertise. Amit also had significant contributions during his seven-year tenure in Israeli M...
Tommy PerniciaroVP, Solution Architecture, HalcyonTommy Perniciaro is a highly experienced cybersecurity professional with over 20 years of experience in protecting critical network assets and data against cyber threats. Tommy has extensive experience with security technologies, including DDoS mitigation, intrusion detection and prevention systems, firewalls, SIEMs, and vulnerability scanner...
Andrei VelicanuPrincipal Solutions Engineer, OktaAndrei is a Principal Solutions Engineer who has served Okta's enterprise customer base for over six years. Andrei is committed to helping organizations understand what they can achieve with Okta and is experienced in all stages of the product lifecycle, including demos/PoCs, system architecture, product implementation, and user training. He...
Travis KaylorSr. Special Agent, Boston Field Office, U.S. Secret ServiceSenior Special Agent Travis Kaylor has spent the last 22 years in a variety of roles both domestic and abroad, focused on the dual mission of the United States Secret Service across both protection and investigations. He began his career as a Uniformed Division Officer assigned to the White House Branch and later as a Special Agent in the Was...
Sean DonlonSr. Special Agent, U.S. Secret Service – Burlington, VTA 22-year veteran of the United States Secret Service, Senior Special Agent Sean Donlon currently manages the Burlington office, overseeing investigations of cyber and financial crimes in the state of Vermont. Prior to his post in Vermont, Senior Special Agent Donlon served as an assistant attaché for the Secret Service in the United States ...
Peter LaRocheNetwork Intrusion Forensic Analyst, U.S. Secret Service – Manchester, NHPeter LaRoche has served as a Network Intrusion Forensic Analyst (NIFA) with the US Secret Service out of the Manchester Resident Office since September 25, 2023. As a NIFA, Mr. LaRoche is responsible for providing expert guidance to the Secret Service as well as federal, state, and local partners in network and digital forensics. This inclu...
Gabrielle BryantVP, Cyber Practice Leader, Cadence InsuranceAs the Cyber Practice Leader, Gabrielle Bryant focuses on the strategic and operational vision regarding how cyber exposures will impact our clients as well as researching methodologies to mitigate emerging cyber threats and their intersectionality with other lines of coverage.
Before becoming Cyber Practice Leader, Gabrielle Bryant wa...
Chris UssermanChief Technologist, InfobloxChris Usserman is the Chief Technologist with Infoblox Federal. Chris has over 33 years’ experience in the U.S. Intelligence Community helping clients understand and incorporate cyber business intelligence to improve cyber security programs. With a focus on the U.S. Government and public sector, Chris brings a public/private perspective to en...
John NewsomeSolutions Engineer, ClarotyJohn is a 30-year industry veteran in IT and cybersecurity and has worked for some of the most recognizable brands in cybersecurity such as Palo Alto Networks, Cisco Systems, Blue Coat (now Symantec), and Websense (now Forcepoint). John has been a guest speaker and panelist at numerous industry events and tradeshows and has served as a subjec...
Scott Margolis, ModeratorCISO, Massachusetts Bay Transportation Authority (MBTA)Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business cont...
Michael FergusonDirector, Security Transformation, NetskopeMichael Ferguson is the Global Director for Security Transformation at Netskope. He is a highly customer-focused security professional, having worked in the cyber security industry for over 15 years across the Asia Pacific Region. Michael has been CISSP certified for over 7 years, speaking at various industry events (e.g. Gartner, AusCert, an...
Nick DudaSecurity Architect, HubSpotWith over 25 years of experience in the cybersecurity industry, he has dedicated a decade to HubSpot, concentrating on safeguarding the corporate environment through the deployment of various cutting-edge security tools. Nick holds multiple vendor certifications, including Netskopes NSCO&A and NSCI&I. As a client of various security vendors, ...
Justin RaineySVP, CISO & CPO, UMB BankJustin Rainey serves as Chief Information Security Officer and Chief Privacy Officer at UMB Financial Corporation. In this role, he is responsible for establishing strategy and overseeing implementation of an effective, integrated, and proactive information security and privacy program. He is also responsible for advising and partnering with ...
Dr. Howard GoodmanSr. Technical Director, Skybox SecurityHoward Goodman, with a distinguished career spanning two decades, has emerged as a pivotal figure in cybersecurity, seamlessly integrating strategic planning with hands-on cybersecurity applications across numerous sectors. His significant contributions to organizations like Skybox Security highlight his prowess in navigating through the intr...
Tom O'Malley, ModeratorAdvisor to The Identity Theft Resource Center; Founder, Frozen Pii LLCTom O’Malley is the founder of FrozenPii.com, a public service website promoting free security credit freezes and help for identity theft victims. He also serves as a consultant to the non-profit Identity Theft Resource Center. Previously, Tom was a career state (5 years) and federal prosecutor (32 years) in South Florida and Western North C...
Thomas Watson, CISM, CISSPCISO, isolved HCMTom Watson has more than 25 years of experience in Information Risk Management and Security. His focus is on enabling businesses to be more productive while not losing focus on security and integrity of key corporate data. He has knowledge and experience working for multinational organizations as well as having fulfilled international assignm...
Mike Brannon, ModeratorDirector, Infrastructure & Security, National GypsumMike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."
Eric Robuck, InstructorCybersecurity Specialist and Founder of The Valander GroupEric Robuck is a seasoned cybersecurity expert with over two decades of experience in the industry. As the owner and founder of The Valander Group, he leads a team of top-notch business experts dedicated to providing comprehensive cybersecurity solutions for business owners.
Eric's extensive military background as a Warrant Officer fo...
Dan Murphy, ModeratorChief Architect, InvictiDan Murphy has 20+ years of experience in the cybersecurity space, specializing in web security, distributed systems, and software architecture. As a Chief Architect at Invicti, his focus is on ensuring that Invicti products across the entire organization work together to provide a scalable, performant, and secure dynamic analysis experience....
Kevin WernerSystem Director, IT Security Operations, Main Line HealthKevin is the System Director of Security Operations at Main Line Health, a mid-sized hospital system in Suburban Philadelphia, where his team oversees all non-GRC aspects of information security. He has more than a decade of information security experience and is a licensed attorney in Pennsylvania and New Jersey. He currently holds a CISSP c...
Lisa Jones-HuffSr. Director, Global Security Specialists, ElasticLisa Jones Huff is a seasoned cybersecurity expert with over two decades of experience in the field. As the Senior Director of Global Security Specialists, SA Team at Elastic, she brings a wealth of knowledge and a consultative approach to the table.
Lisa's passion lies in helping organizations identify and tackle their ongoing securit...
Erik GastonVP, Global Executive Engagement, TaniumErik comes to Tanium from AppDynamics (part of Cisco), where he spent almost five years in field sales. For the past two years, he was the CTO for the East Sales Team, which is responsible for generating more than half of the company's revenue with a focus on large financial firms in the region. Prior to that he built out and headed the Busin...
Aruna SreeramSr. Director, Product Management, Information Protection, ProofpointAruna leads the Enterprise DLP and Insider Threat Management solutions at Proofpoint and joined the company in 2019 through the acquisition of ObserveIT. She has 20+ years’ experience in leading cybersecurity product and strategy at several organizations including Leidos, RSA, and Axeda (PTC). She is currently working within her organization ...
Chad HicksCISO, MercuryGate InternationalChad is a proven InfoSec leader, with nearly 10 years' experience as a CISO. He has significant experience managing people, process, and technology to reduce risk and deliver business value. He has successfully led multinational companies through mergers and acquisitions, divestitures, and rapid security certifications.
An experienced ...
Brent Bigelow, HostPresident, Charlotte Metro ISSA ChapterBrent is a seasoned Cybersecurity Leader with 36+ years of IT and Information Security experience and a passion for enhancing Cybersecurity through awareness training, architecture design, thought leadership, policy, people, process, and technology. He has worked in many industries including healthcare, aviation, financial, government, automo...
Julie RizzoPartner, K&L Gates LLPJulie Rizzo is a partner in the firm's Capital Markets practice group. Julie has substantial experience representing companies in a variety of capital markets and corporate governance matters. She focuses her practice on advising clients on SEC reporting and disclosure issues, stock exchange compliance, and environmental, social and governanc...
Sean Goodwin, Guest SpeakerSenior Manager, Wolf & Company, P.C.Sean is a Senior Manager in Wolf’s DenSecure group. His role entails developing security reviews and managing projects, including security reviews, penetration tests, social engineering, and threat emulation. Sean has over ten years of experience in consulting and has worked extensively in the financial, healthcare, education, and software se...
Representatives from North Carolina State Board of Elections; State of North Carolina; and Mecklenburg County ElectionsLina Dabit, InspectorRCMP Officer in Charge, Cybercrime Investigative Team TorontoLina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while...
Molly Dodge, ModeratorInformation Security Analyst, Federal Reserve Bank of PhiladelphiaMolly Dodge has worked as a cybersecurity analyst in positions focused on risk assessment and awareness, internal training, and outreach. She currently works at the Federal Reserve Bank of Philadelphia, and was previously employed at Penn Medicine, the hospital network owned by the University of Pennsylvania. She is a Penn State graduate and ...
Dan ElliottPrincipal, Cyber Security Risk Advisory, Zurich Resilience Solutions (ZRS) CanadaDan Elliott is the Principal for Cyber Security Risk Advisory at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting Zurich’s clients in making risk-based cyber security decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a...
Debra BrownVice President, SavvyDebra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate l...
David van HeerdenProduct Evangelist, AutomoxDavid has worked as an IT professional in Asset/Fund Management, property development, hospitality, entertainment, and now tech. His passion is to help people solve problems with technology that is easy to use, easy to manage and to have fun along the way. He is spending his time at Automox as the IT Operations Manager and Product evangelist,...
Bryan PerkolaVP, Information Security, First Community Credit UnionBryan Perkola, CISSP, CISM, is a passionate cybersecurity professional and IT veteran with over thirty years of experience primarily in organizations associated with manufacturing, retail, and finance. Bryan holds multiple bachelor's degrees from the University of Houston in Marketing and Organizational Behavior and Management and has receive...
Mike Ste Marie, ModeratorSecurity Program Manager, Office of the Secretary, Commonwealth of MassachusettsMike has more than 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, ...
Lisa AngeloCyber Liability & Data Privacy Attorney, Angelo Law Firm PLLCLisa M. Angelo has a law practice focused on cyber liability & data privacy. With over a decade of experience, Lisa is one of the first attorneys in Texas to earn a board certification in privacy law, a credential issued from the International Association of Privacy Law Professionals and recognized by the State Bar of Texas. In addition, Lisa...
Matthew MaynardAnalyst, Security Incident Response III, BJC HealthCareMatthew Maynard a seasoned cybersecurity professional with a wealth of experience in IT security and incident response. Currently serving as an IT Security Incident Response Analyst at BJC HealthCare, Matthew specializes in monitoring operations, networks, and infrastructure for security issues. His expertise extends to ethical hacking, penet...
Tony BryanExecutive Director, CyberUpTony, CyberUp’s Executive Director, has served the nonprofit community for more than 14 years. He spent nine years serving in the United States Army, where he was known as the youngest Military Police Sergeant in Brigade. Succeeding his time in the Military, Tony was appointed by the Governor of Missouri to serve on the Workforce Development ...
Thomas HeverinCybersecurity Teaching Professor and Pentesting Project Lead, Drexel UniversityFormer Navy researcher turned cybersecurity educator, Dr. Thomas Heverin ignites minds at The Baldwin School, an all-girls college preparatory school, and Drexel University. He empowers future ethical hackers, sparks innovation with tools like ChatGPT, and uncovers critical ICS vulnerabilities. Google hacks, new hacking modules, new GPTs, and...
James Thompson, ModeratorDirector, Information Security, Hypertherm AssociatesJames brings more than 20 years of experience in Information Technology including seven years in cybersecurity within the manufacturing vertical. He has a passion for team development and attributes his program’s success to relationship and team building skills developed earlier in his career. He started his career in higher education and has...
Dana TannattSr. Sales Engineer, ThalesDana Tannatt graduated from Norwich University with a master’s degree in information security and assurance. He is also a member of the Upsilon Pi Epsilon honor society for Computing and Information Disciplines. He has been a Security and Privacy software specialist for more than 18 years. He has extensive experience with Identity Access Gove...
Dominic KellerFirst Vice President & Senior Consultant, Alliant InsuranceDominic Keller has global experience across the cybersecurity, law and risk management fields. Dominic has worked as an attorney in Australia and California, a cyber risk consultant, and a cyber insurance broker with domestic and international companies across many industries. He holds the CISSP certification and has studied Corporate Strateg...
Graham BrooksLead Solutions Architect, SyxsenseGraham is a Pre-Sales Manager at Syxsense and has been working in the IT and Security industries for the last seven years. Before working at Syxsense, he was an IT Analyst for a major DOE and DOD Security manufacturing company. He currently holds the RHCE and Security Plus certifications.
Margaux WeinraubCyber Practice Leader, Graham Company, a Marsh & McLennan Agency LLC CompanyIan ForrestGlobal VP of Solutions Engineering, HuntersAs the Global VP of Solutions Engineering at Hunters, Ian brings two decades of technology experience, specializing in application and database security, SOC operations, and SOAR. With a background in leading industry players, Ian’s contributions include several patents in the SOAR space, showcasing a sustained commitment to advancing cyberse...
Nancy HunterBoard President, WiCyS Delaware Valley AffiliateNancy Hunter is certified in Risk and Information Systems Controls (CRISC) and holds a B.A. in Mathematics from Temple University.
Graeme BarriePresident & CISO, Netmechanics Inc.Graeme is a CISO with more than 25 years in IT risk and security governance in government, healthcare, and manufacturing sectors. He fell in love with computers when he discovered a Tandy TRS80 at the public library in the rural Ontario town he grew up in. Fast forward to today, where Graeme assists business leaders in understanding that cybe...
Evgeniy Kharam, ModeratorCybersecurity Architect and EvangelistEvgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with...
Evgeniy KharamCybersecurity Architect and EvangelistEvgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with...
Ian Schneller, ModeratorCISO, Health Care Service CorporationA 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...
Mark Eggleston, CISSP, GSEC, CHPS, ModeratorCISO, CSCMark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, ...
Idan GourCo-Founder & CTO, Astrix SecurityIdan Gour is the CTO and co-founder of Astrix Security, a leading enterprise solution securing app-to-app interconnectivity. Having served as a leader in the elite class of the Israeli Military Intelligence Unit 8200, his hands-on offensive and defensive cyber experience affords him a unique attacker point of view. Previously, Gour also led s...
Phil Curran, ModeratorCISO & CPO, Cooper University Health CarePhil Curran has more than 25 years of experience in information security and privacy in the military, government and private sectors. As the Chief Information Assurance Officer and Chief Privacy Officer at Cooper University Health Care in Camden NJ, he is responsible for managing governance and regulatory compliance, risk assessment and manag...
Kevin Powers, J.D., ModeratorProfessor; Founder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston CollegeKevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Program at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College’s Carroll School of Management’s Business Law and Society Department. Along with his teaching at Boston College, Kevin is a C...
William KyrouzInformation Security Director, Paul, Weiss, Rifkind, Wharton & Garrison LLPWilliam (Bill) Kyrouz is Information Security Director at Paul Weiss, one of America’s most prestigious law firms. Bill has worked in the legal industry for about twenty years, with a four year stint in Higher Education Technology , and has served in dedicated Information Security roles for the last 12. Prior to Information Security he work...
Ben HowardVP, IT & Cybersecurity, InariBen originally asked ChatGPT to write his bio, but felt it was self-aggrandizing, pompous, and unbearably long. After many efforts to tell ChatGPT to tone it down a bit, he gave up and wrote it himself. Ben is a Cybersecurity and IT leader with over 25 years of experience. He specializes in rapidly maturing cybersecurity programs from scratch...
Daniel PinskyCSO, CDW CanadaDaniel is an accomplished cybersecurity professional with more than two decades of experience, serving diverse clients across North America and Europe across the financial, public, and technology sectors. His expertise encompasses technical roles and leadership positions, including leading the implementation and certification of essential sec...
Dan HopkinsVP of Engineering, StackHawkDan Hopkins, VP of Engineering at StackHawk, has been a software engineer for 20 years, working at high-growth startups such as VictorOps and LivingSocial and large high-tech companies such as Splunk. For the last ten years, he has focused on building tools for progressive engineering teams adopting DevOps and DevSecOps practices.
Stuart SmithEnterprise Security Architect, Delta Air LinesStuart Smith is the Enterprise Security Architect for Delta Air Lines reporting to the CISO. He is one of the senior security advisors to the security organization and is responsible for providing security input into various business and technology initiatives across the company. Stuart has over 23 years of professional experience in the cybe...
Ali Abbas HirjiVP, Cybersecurity & Technology, Computek College; Special Advisor, Cybersecurity & ICT Initiatives, 369 GlobalWith more than 16 years in IT leadership, Ali specializes in Governance, Risk and Compliance (GRC), aligning with ISO 27001, NIST and SOC 2 to build secure and compliant infrastructures. His expertise spans IT security, risk management, and developing high-performing teams.
In post-secondary education, he has taught at institutions acr...
Audrey LongGaming Senior Cloud Security Architect, MicrosoftAudrey Long is a Senior Security Software Engineer at Microsoft. She is passionate about making security accessible both to software engineers and as a career for girls in STEM. She holds DoD secret clearance and a Master of Science degree in Cyber Security from Johns Hopkins University.
Rhea Michael AnthonyProduct Security Architect – Associate, SAPRhea Michael Anthony is a Product Security Architect Associate at SAP's Global Security team. Her mission is to research and develop robust software security and secure software development practices that support innovation and champion a security-first culture that impacts products across SAP. She is actively engaged in researching threats a...
Syxsense RepresentativeEnvision Technology Advisors RepresentativeSnyk RepresentativeRapid7 RepresentativeNatalia Bakhtina, MBA, CRISCDirector of Cybersecurity and IT Risk Management, BFL CANADANatalia Bakhtina is a strategic CISO-level leader and is globally recognized as the Women in IT Canada Finalist 2022. Natalia holds a Master’s of Business Administration Degree from Dalhousie University and is Certified in Risk and Information Systems Control (CRISC).
Experienced results-oriented strategic professional in cybersecurit...
Paul Lynch, ModeratorDirector, Information Security, CubeSmartPaul Lynch, who has more than 20 years of experience in information technology, is Director of Information Security and Infrastructure for CubeSmart Self Storage. He has established security governance programs and best practices for government, non-profit, private, and publicly traded organizations ranging from technology startup to city. He...
Steve Naphy, ModeratorCIO, Morgan, Lewis & Bockius LLPSteve Naphy serves as Morgan Lewis's Chief Information Officer. In his role, Steve concentrates on leveraging data analytics and process to drive efficiency and effectiveness in both business operations and the delivery of legal services. He has over 20 years of experience working in information technology (IT), including previously running i...
Violet Sullivan, ModeratorAdjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & ForsterViolet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to de...
Justin Armstrong, ModeratorFounder, Armstrong Risk Management LLCJustin Armstrong is a security, privacy, and regulatory compliance consultant with over 25 years of experience in the Healthcare Industry. He worked as a vCISO at FractionalCISO, managed security at Healthcare Cybersecurity startup Tausight, and led Product Security at MEDITECH, a top three Electronic Health Record vendor. He has engaged with...
John FanaraDirector, IT Security, Plymouth Rock AssuranceJohn Fanara is the Director of IT Security at Plymouth Rock Assurance, a leading auto and home insurer in the Northeast. Before joining Plymouth Rock, John served as CISO at the Risk Management Foundation of the Harvard Medical Institutions (CRICO). John has been overseeing Security and IT Infrastructure teams for over 22 years and has a pas...
Rob BarberiDirector, Chief Client Officer, FINEX NA Cyber Security & Professional Risk, WTWAndrew Smeaton, ModeratorCISO, JamfAndrew Smeaton brings over 25 years of global information security experience, having successfully navigated complex, multi-stakeholder environments across Europe, North America, and the Middle East. As the Chief Information Security Officer (CISO) at Jamf, he is responsible for shaping Jamf’s information security vision, leading a global tea...
Greg GarciaExecutive Director, Health Sector Coordinating Council Cybersecurity Working GroupGreg served as former (and nation's first) Assistant Secretary for Cybersecurity and Communications at the U.S. Department of Homeland Security, appointed by President Bush in 2006. He also led the Financial Services Sector Coordinating Council, and served in Congress and senior industry executive roles in technology and security.
Keith McMenaminVP of IT, Visit PhiladelphiaKeith McMenamin is the Vice President of Information Technology at VISIT PHILADELPHIA®, the region’s official tourism marketing agency. In his 17 years with VISIT PHILADELPHIA®, Mr. McMenamin is credited with building and securing the technical infrastructure for an award-winning organization that was responsible for creating $11 billion doll...
Mendsaikhan AmarjargalFulbright Scholar, MSISPM Student, Carnegie Mellon UniversityMendsaikhan Amarjargal, a Fulbright Scholar and a GXPN certificate holder (1103), is pursuing his graduate studies in Information Security Policy and Management at Carnegie Mellon University. Before embarking on his academic journey, Amarjargal amassed nine years of industry experience, during which he worked from an Information Security Anal...
Delgerbayar LochinFulbright Scholar, MSISPM Student, Carnegie Mellon UniversityDelgerbayar Lochin is a Fulbright Scholar and 2nd-year master’s student in the Information Security Policy and Management program at Carnegie Mellon University. Preceding his degree pursuit at CMU, he accumulated 8 years of experience in both private and public sectors. During this time, he held key roles such as Team Leader at the Cybersecur...
Hemanth TadepalliCybersecurity and Compliance Engineer, May MobilityHemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and other...
David AndersonVice President, Cyber Liability, Woodruff SawyerDavid focuses on complex cyber, privacy, technology, and professional liability issues and is a dedicated and fierce advocate for his clients.
Diana Riley, ModeratorBoard Member, InfraGard BostonDiana knows what is required to develop and enhance an information security program. She specializes in gathering evidence, preparing for and conducting information security audits, and due diligence visits. Additionally, she is an expert in assisting small to mid-size companies in presenting their information security posture to potential bu...
Josephine WolffAssociate Professor, Computer Science; Engineering Director, The Fletcher School at Tufts UniversityJosephine Wolff is an associate professor of cybersecurity policy at The Fletcher School at Tufts University. Her research interests include liability for cybersecurity incidents, international Internet governance, cyber-insurance, cybersecurity workforce development, and the economics of information security. Her first book "You'll See This ...
Glen Sorensen, InstructorvCISO & Managing Director, Cyber Risk Opportunities LLCGlen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information ...
Maxime CartierHuman Risk Management Advisor, HoxhuntMaxime has built Security Awareness, Behavior, and Culture programs for global companies in manufacturing, aerospace, and at H&M Group. His goal is to help organizations switch from just raising awareness to effectively changing behaviors and culture.
Connie GlaspieRegional Vice President of Sales, ForgeRockRVP of Sales serving Western North America & LATAM for the global digital leader ForgeRock. Leading a team of security sales professionals, responsible for managing some the world’s largest enterprises throughout Western Canada & USA, Argentina, Chile, Peru, Columbia, Mexico and Brazil.
Connie brings over 19+ years of digital identity...
Glen SorensenvCISO & Managing Director, Cyber Risk Opportunities LLCGlen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information ...
Glen Sorensen, ModeratorvCISO & Managing Director, Cyber Risk Opportunities LLCGlen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information ...
Peter TseHead of Information Security, CTBC Bank New York BranchPeter is the head of Information Security for CTBC Bank New York branch, where he oversees the Cyber Security Program. With more than 25 years of experience in financial services, information security, and information technology, Peter has expertise in cybersecurity governance, risk management, and cybersecurity technologies.
Jenny MosheaCIO / CISO, Sellen ConstructionMy magic spans numerous industries where I've led teams to new worlds. I speak tech and love geeks. I'm the bridge between business and technology. I eat risk for breakfast yet am passionate to the pixel. I inspire new thinking and brand everything. Experts seek me out and people want to be part of what I create. I forged the role of CIO wher...
Benjamin BenhanGlobal Privacy and InfoSec Attorney, eBayWith over six years of experience in privacy and data governance, Ben is a passionate and driven global privacy and infosec attorney at eBay, where he helps the company navigate the complex and evolving regulatory landscape of data protection and cyber security. He has a strong background in computer science, cyber security, network engineeri...
Anne PurtellCommunity Manager, CREST USAAn experienced professional transitioning from a successful career in occupant protection engineering to technical community management, Anne blends technical expertise with exceptional communication and leadership skills. Her unique background in ensuring the safety and effectiveness of critical civilian and military equipment now informs my...
Jessica LabouveSales Engineer, CymulateJessica LaBouve, eCPPTv2, CEH, has spent her entire career specializing in offensive security. She started as a penetration tester performing application, network-level assessments, and social engineering. This experience ultimately led her to become a Solutions Architect at Bishop Fox, where she helped facilitate the scoping and sale of offe...
Mike ShewardHead of Security, XealMike Sheward is Head of Security at Xeal, an EV Charging hardware startup. Mike has around 18 years experience building security programs. Originally from the UK where he worked mostly in penetration testing and digital forensics, Mike moved to the US in 2011, where he has been focused on running security teams for SaaS companies ever since. ...
Robert KraczekGlobal IAM Strategist, One IdentityRobert Kraczek, Global Strategist with One Identity, has more than three decades of security experience, with a specialization in Identity Security. Over the years, Robert has worked with, implemented solutions, and advised customers in all major industries as well as local, state and federal governments. Robert’s responsibilities include wor...
Robert Mazzocchi, ModeratorVP, Identity & Access Management for Global Information Security & Compliance, AIGRobert Mazzocchi was the Vice President Identity & Access Management for Global Information Security & Compliance at AIG for 16 years. In this role, he had corporate responsibly for the implementation of the AIG’s Identity & Access Management Strategy and Program across AIG’s global business lines.
Prior to joining AIG, Mr. Mazzocchi h...
Arlenee Lopez-Ferguson, ModeratorSVP & CISO, Pendulum Holdings, LLC; CISO, MarcyPen Capital Partners, LLCArlenee Lopez-Ferguson is a dynamic cybersecurity professional with proven expertise in strategizing, developing, and leading change across organizations.
She is currently the Chief Information Security Officer at Pendulum Holdings, LLC, a strategic investment and advisory platform that seeks to accelerate opportunity and value creatio...
Henry JiangCISO, Therapy BrandsHenry is a seasoned executive with over 20 years of experience in IT and cybersecurity. With a strong vision for disruptive technologies, he has extensive hands-on experience and is a champion for businesses that prioritize risk management. He is able to define and develop KPIs and KRIs to communicate the effectiveness of the cybersecurity pr...
Pari SarnotRisk Advisory Practice - Cyber Privacy and Risk, Grant Thornton LLP (US)Privacy Consulting Director with Blueprint Technologies- Over 10 years of international consulting and industry experience, with Fortune 500 clients across US and Europe. Consulting Practice Lead including Managed Services for Strategy and Risk, focused on clients in Technology, Retail and Payment sectors.
Possess a strong understandin...
Alexander VitrukSr. Associate Attorney, BakerHostetlerAlex Vitruk advises clients in complex data privacy and cybersecurity matters, offering practical solutions to help companies comply with rapidly evolving privacy and data protection laws and defending class actions in this cutting-edge space. Alex advises and defends clients across different industries on multifaceted issues such as biometri...
Vlad BrodskySVP, CIO, and CISO, OTC Markets Group Inc.Vlad Brodsky serves as the Senior Vice President, Chief Information Officer, and Chief Information Security Officer at OTC Markets Group, a regulated publicly traded financial institution that operates the world’s largest OTC equity electronic marketplace. In this role, Vlad leads the firm's information security strategy, program, and process...
Tom Brennan, ModeratorExecutive Director, Americas Region, CRESTTom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrast...
Lana DeMariaHead of Data Governance and Privacy, Alaska AirlinesLana is a motivated and results-oriented leader with 20+ years of international experience.
She is experienced in supervising and training teams, building global enterprise-wide programs from the ground up, and leading, planning & executing projects in a variety of industries, ranging from aviation to software, to manufacturing, to tel...
Jake OlcottVice President, Government Affairs, BitSightJacob (Jake) Olcott has been in the cybersecurity industry since 2005 and currently serves as the Vice President of Communications and Government Affairs for BitSight. In his role, he helps organizations benchmark their cybersecurity programs using quantitative metrics and provides thought leadership and recommendations regarding the role of ...
Alexander AbramovHead of Information and Cyber Risk, Santander Capital MarketsAlex Abramov is senior leader in Technology and Cyber Governance, Risk, and Compliance with strong track record of accomplishments across all three lines of defense - Controls, Risk, and Audit. He had created and led highly effective IT and Cyber risk management programs that addressed regulatory requirements and enabled business growth, expa...
Thanh ThaiCISO, VP, ConstellisAs a technology leader with 15 years of experience, Thanh develops IT strategic plans, creates governance frameworks and processes, and aligns IT organization priorities with business strategy. He leads digital transformation to create innovative business models, optimize technology capabilities, and develop competitive advantages. His deep e...
Jared PfostIndependent ConsultantJared is a builder and leader of information security teams and products with more than 20 years of learnings. From startups to global enterprises, he's worked across multiple industries with expertise in secure development, risk management, visual story-telling, and consulted across all InfoSec domains. Over the past few years, he's invested...
Jeff EdstromDirector, Infrastructure Security, AccessIT GroupJeff Edstrom is the Director of Infrastructure Security at AccessIT Group (AITG). Jeff is a cybersecurity leader with over twenty years of experience managing infrastructure, security, compliance and support teams across North America and Europe. Jeff enjoys solving complex problems, getting to the root cause and deploying robust solutions th...
Andy StewartISSA-PS Board Secretary; Division Cybersecurity Officer, PNW, CommonSpirit HealthAndy Baker, ModeratorRegional Director, OptivAndrew Baker built a base of skills starting with the earliest implementations of 4th Generation Languages, originator of operator company wide voice mail systems, to seeing the product development and deployment of the first off switch Home Location Register and Authentication Center (HLR/AC) which dramatically improved AT&T’s call handling ...
Saketh MachavarapuBusiness Development Manager, SSH Communications SecurityWith over 13 years of experience working in Unix and Cybersecurity teams in Fortune 500 companies, Saketh currently is responsible for Pre-sales, Architecture and Strategic Accounts in Americas. Prior to SSH, Saketh spent most of time in enterprise architecture and evaluating solutions that are eventually deployed into Production along with D...
Kartik MaddaliSenior Solutions Engineer, OktaAccomplished Business and Technology professional with over a decade focused on strategic account software sales, advanced enterprise software applications, modeling, business process optimization, solution development and software implementation. Strong technical and business acumen with the ability to execute a wide range of strategies desi...
Ian MooreCybersecurity State Coordinator/Advisor, Region 10, State of WA, DHS CISAIan serves as the Cybersecurity State Coordinator for the State of Washington for CISA, based in Olympia, WA. He supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.
His program coordinates cyber preparedness, risk mitigation, and incident resp...
Oren KorenCo-Founder & CPO, VeritiOren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings 19 years of experience in cybersecurity, advanced threat analysis, and product management,. Prior to founding Veriti, Oren was a Senior Product Manager at Check Point Software Technologies, where he led AI-based innovations and advanced data analytics projects redef...
Jake Bernstein, Esq., ModeratorPartner - Data Protection, Privacy & Security Group, K&L Gates LLPJake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense cou...
Zabrina McIntyre, HostWiCyS BISO AffiliateZabrina McIntyre is a Director with KPMG focusing on large scale cybersecurity transformations for clients with a focus on compliance. She holds the CISSP and PMP certifications and is working on her PCI QSA. She is a dedicated supporter of Women in Cybersecurity (WiCyS) and is currently on the leadership board for the Business Information Se...
Philip Conrod, ModeratorCEO, Kidware Software LLCPhilip Conrod has served in various IT leadership roles (Manager, Director, ISO, CISO & SVP/CIO) during his 35-year career for companies like Raytheon Technologies (Sundstrand), Safeco Insurance, CRU (FamilyLife), Kenworth Truck Company, PACCAR, and Darigold. Philip has been a CISM since 2003. Philip currently serves as the CEO of Kidware Sof...
Bryce CarterCISO, City of ArlingtonBryce Carter is a nationally-recognized leader known for his transformative impact on organizational culture and his ability drive cybersecurity as a key business enabler. Bryce has not only developed groundbreaking security strategies that safeguard data, but has also focused on the broader welfare of communities. His visionary approach has ...
David BalcarSecurity Strategist, VMware Carbon BlackBalcar has over 18 years of experience in security and extensive knowledge of security research, network penetration testing, incident response and computer forensics. At VMware, he is responsible for the activities of the VMware Carbon Black portfolio, including EDR, App Control, Cloud Endpoint, Cloud Enterprise EDR, Cloud Audit and Remediat...
Biagio DeSimoneEnterprise Solutions Architect, Aqua SecurityBiagio DeSimone is an experienced Solutions Architect with a history of working in the cloud native application space. Skilled in Kubernetes, Containers, Cloud Platforms and Pre-Sales, Biagio is currently an Enterprise Solutions Architect at Aqua Security. In his role, Biagio works to educate organizations on the importance of container and c...
Jeffrey Jones, ModeratorCISO, MillimanJeff Jones is the Chief Information Security Officer (CISO) for Milliman, Inc., an actuarial consulting and solutions firm headquartered in Seattle. Jeff is responsible for managing the information security program that encompasses 130 Practices in 80 cities, and supports over 8000 clients and more than 500M participants worldwide. Jeff was ...
Kevin Murphy, ModeratorBusiness Information Security Officer (BISO), T-Mobile USAKevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT sec...
Chris BoykinSoftware Engineering Director, CyCognitoChris Boykin joined CyCognito in 2022, his first job on the vendor side, after spending over 20 years on the VAR side. Starting his career at NASA as an electronics technician, he eventually worked his way into computer networking, where he obtained the coveted CCIE certification. He has spent the last 15 years focusing on cybersecurity, wher...
Sara RicciRisk and Resilience PractitionerSara Ricci is an accomplished executive with a proven track record in global leadership roles, building new capabilities and enhancing organizational resilience. She is experienced in Risk Management and Technology Enablement in highly regulated financial and energy sectors. Sara excels at building trust and credibility with executives, clear...
David SigmanCortex Systems Engineer, Palo Alto NetworksDavid Sigman has spent the last 20 years working with enterprise customers to make informed decisions about their cybersecurity challenges. He is a passionate cybersecurity evangelist and likes working closely with customers on turning endless alerts into actions through the power of automation. When not working, David likes to spend time pla...
John WangVP, Product Management - Platform, SaviyntJohn Wang currently serves as Saviynt’s VP of Product Management for its Enterprise Identity Cloud Platform, the industry’s most complete identity security solution. In this role, John is responsible for supporting the platforms IGA, PAM, AppGRC, and third-party identity security capabilities. He has more than 20 years of product development ...
Sabino MarquezCISO & Chief Trust OfficerSabino Marquez' approach to leading cybersecurity as a ‘Trust Product Practice’ has led to substantial returns on security investments, higher value-generation velocity, and enhanced equity valuations. Sabino leads the Trust Product organization as a go-to-market leader, working alongside the productive business to enable and defend value, an...
Cliff SteinhauerDirector, Information Security & Engagement, National Cybersecurity AllianceCliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the ...
Benjamin CorllCISO, Americas, ZscalerBen is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, a...
Petri KuivalaCISO Advisor, HoxhuntWith more than 25 years of experience, Kuivala was most recently the Vice President of General IT and User Experience at NXP Semiconductors. Prior to this role, Kuivala was a long-time security executive at Nokia, serving as the company's CISO and CSO throughout his tenure of more than a decade. He helped form a streamlined and co-operative s...
Tony UcedaVelezVice Chairman, Penetration Testing Focus Group Sub-Committee, CRESTAfter nearly 25 years of IT/ InfoSec work across a vast range of industries, experience has fueled my drive to deliver a better information security consulting practice. In 2007, I started VerSprite (aka VerSprite Security) with the idea of developing a team of 'security hybrids' - consummate security professionals that personify both technic...
Kelly RobertsonPrincipal Security Practitioner, Horizon3.aiOver 30 years of professional information security experience in 30 countries across various disciplines, technical areas and market segments. Holds key industry certifications including CISSP #409644, F5 and Imperva WAF, Microsoft ISA, CheckPoint, CSI Encryption, and WhiteHat web security analyst. Also serves on the board of Silicon Valley I...
Chris TillettSr. Engineer, Strategic Product Intelligence, Palo Alto NetworksChris currently works for Palo Alto Networks in R&D, helping customers stay ahead of threat actors and helping our products stay customer focused. His experience with UEBA and IAM helped drive the ITDR module to not only focus on Identity based attacks, but also the entire Identity lifecycle helping to improve outcomes for customers and detec...
Mary Greenlee, ModeratorField CTO & Principal Solutions Engineer, OktaMary Greenlee serves as a Field CTO and Principal Solutions Engineer at OKTA, where she leads programs to mitigate the security risks of large-scale integrations of enterprise applications. Her multifaceted expertise in databases, networking protocols, and server systems coupled with her business acumen allows her to address today’s unique cy...
Davin DarntCISO, Americas, Louis VuittonWith a dynamic career spanning 20 years, including seven years at prestigious luxury retail company, Louis Vuitton. Davin Darnt currently excels as the Chief Information Security Officer (CISO) for the Americas region. His journey in the company has been marked by significant leadership roles, including Head of IT Operations and Head of Tech...
Andrew WilderAdjunct Professor, Cybersecurity, Washington University in St. LouisAndrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security E...
Samantha ZeeEnterprise IT Policy Manager, State of WashingtonAs Washington State’s Enterprise IT Policy Manager, Samantha Zee shepherds the IT policy updates and waiver requests. She previously managed a 24/7 answering service, leveraging the latest technology to encourage human connections serving government, private, and non-profit clients. She earned her MBA while serving as Western Washington Unive...
Renita RhodesAdjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State UniversityRenita M. Rhodes is a seasoned professional with over 22 years of distinguished experience in Information Technology (IT), IT Audit, Risk Management, Compliance, and Cybersecurity. She currently holds the role of Vice President, Audit Manager - Cybersecurity Manager at a prominent global bank, where her expertise is instrumental in safeguardi...
Ariel WeilVP, GTM Strategy, CyeraWith more than 20 years of cross-functional knowledge and experience focusing on data security, compliance, risk management, cloud adoption, digital transformation, and modern application architectures, Ariel (Ari) Weil leads Cyera’s go-to-market (GTM) efforts as the Vice President of GTM Strategy. As a hands-on executive, Ari brings his know...
Steve PettitSr. Manager, Operations IT – Applications Security, VerizonSteve holds the CISSP certification.
Steve CurtisChief Cyber Business Officer, CYGNVSSteve is a global cybersecurity executive helping organizations prevent, prepare for, and respond to a cyberattack. Over 20 years in cybersecurity, Steve has worked with the leaders in cybersecurity including Palo Alto Networks, Accenture, and PwC. He has served hundreds of organizations around the world, envisioned, and launched multiple new...
Yolanda ReidDirector, Business Strategy and Growth, Raytheon BBNPassionate about addressing the problems related to cybersecurity and technology of the future. People speak about innovation, but Yolanda encourages innovation from workplace entry to developing new tools, solutions, and techniques. As a former U.S. Department of Defense civilian for more than 20 years, she has been "doing cyber" before we h...
Parrish GunnelsSVP & CISO, Sunflower Bank, N.A.Parrish is currently SVP & CISO of Sunflower Bank and has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information s...
Roftiel Constantine, HostGlobal CISO, Barry-WehmillerRoftiel also serves as Vice President of the InfraGard Saint Louis Members Alliance.
Andrew NevilleDirector, Channel & Sales Engineering, WithSecureAndrew has more than 10 years of experience in strategic alliances at BitSight and Recorded Future, currently leading the WithSecure Product and Services commercial and sales engineering teams in North America.
Michael ClintonDetective, St. Louis County Police Department, Intelligence Operations BureauCraig Reeds, ModeratorSenior Controls Surveillance & Compliance Analyst, AmerenCraig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Complia...
Dr. Adrian M. Mayers, ModeratorVP & CISO, Premera Blue CrossDr. Adrian M. Mayers joined Premera Blue Cross in November 2019 as Vice President, IT and Chief Information Security Officer (CISO) for Premera Blue Cross. Dr. Mayers is responsible for providing and optimizing an enterprise-wide security program and architecture that minimizes risk, enables business imperatives, and further strengthens Preme...
Matt HillaryVice President of Security & CISO, DrataMatt Hillary is the Vice President of Security and CISO at Drata—a continuous security and compliance automation company—where he oversees Drata’s global security, IT, compliance, and privacy strategy and programs. With 15+ years of security experience, Matt has a track record of building and leading exceptional security programs. He has been...
Albert CaballeroAmericas Field CISO Director, SentinelOneAlbert Caballero is a patented cybersecurity expert, systems integrator, and published technologist with a passion for security engineering, cloud computing, and threat intelligence. Currently Field CISO at SentinelOne, he has acted as Global Head of Security Engineering at Warner Bros. Discovery and BISO with WarnerMedia and ATT. Co-founded ...
Robb ReckCo-Founder & Podcast Host, Colorado = SecurityRobb Reck, MBA, CISSP, is an information security and risk professional, with over 20 years of experience in IT, Compliance, and Information Security. Reck has created comprehensive application security programs for multiple financial institutions.
Anmol AgarwalSr. Security Researcher, NokiaAnmol Agarwal is a security researcher at a Fortune 500 Company and is focused on securing AI and Machine Learning in 5G and 6G. She holds a doctoral degree in cybersecurity analytics from George Washington University and a master’s degree in computer science from the University of Texas at Dallas. She previously worked at the U.S. Cybersecur...
Josh YostSr. Director, Systems Engineering, Palo Alto NetworksJosh is an experienced cybersecurity leader with over 20 years in security and networking. He has spent the last decade at Palo Alto Networks where he has held multiple roles, beginning with Next Generation Firewalls and Network Security, and now leading the Cortex Systems Engineering and Solutions Architecture teams for North America. Josh a...
Tina LampeDirector, IT Software Engineering, DIRECTVTina Lampe, CISSP, CISM, PMP, is a highly-effective, seasoned, and influential technology delivery leader with 20+ years of experience working in varied Critical Software Development and Strategic Technical Program Management roles including groundbreaking automation. Tina recently obtained a Master of Science in Cybersecurity – Leadership fo...
Robin PurnellSr. Security Engineer, Trend MicroRobin Purnell currently works as a Senior Security Engineer at Trend Micro. With almost two decades of experience, he has made significant contributions to the global security landscape, partnering with organizations worldwide to tackle their most pressing security challenges. His expertise spans diverse industry sectors, including corporate,...
Brittany WeinsteinVP, AI Risk Governance , Goldman SachsPassionate risk and security leader committed to safeguarding the digital landscape with extensive experience in critical infrastructure. Experienced in regulatory compliance across the United States, Europe, and Asia. My passion lies in shaping strategic directions and implementing robust controls meticulously tailored to meet regulatory req...
Erika VossCISO, DAT Freight & AnalyticsErika Voss offers two decades of extraordinary success in a series of high level roles at top tier companies that include Capital One, Salesforce, Oracle Public Cloud, Microsoft Corporation and Amazon Web Services.
Erika’s invaluable expertise and broad business range have powered a history of developing successful process improvements...
Armando AguilarSolutions Engineer, OktaArmando is a Solutions Engineer whose expertise lies in developing comprehensive strategies that enable organizations to manage identity and access privileges efficiently while mitigating security risks around the Okta Identity Cloud. Armando has a deep understanding of industry best practices and a proven track record of successful implement...
Madi BrumbelowDigital Forensics Analyst, Bank of AmericaMadi Brumbelow (she/they) works as a Digital Forensics Analyst at Bank of America. She has been working at the Bank since June of 2020, when she started as an intern in the Technology Analyst Program. As a Digital Forensics Analyst, Madi works on investigations to reduce and mitigate risk to the Bank, its employees, and its customers. Madi re...
Lumakar ChallaIT Director, JBS; Secretary, ISC2 Denver ChapterLumakar Challa is a transformational technical leader who transforms application and database infrastructure for large, complex Global Fortune 500 companies. His greatest talent is creating Trusted Advisor relationships with senior technology, corporate, and business line stakeholders. He defines strategies to deliver savings and improvements...
Robert BlytheVP, InfoSec & Technology Risk Manager, WWERobert has over 30 years of Information Technology experience and has been a leader in the cybersecurity space for almost a decade. His areas of expertise are in Cybersecurity Operations and Threat Intelligence, Cybersecurity Engineering, Information Security and Governance, Data Privacy and Compliance, and Technology Risk Management.
Thomas ScottvCISO & CEO, Cyber SherpasThomas Scott (Tom) is the Executive Director of the South Carolina Cybersecurity Association and Foundation. As the inaugural Director of the SC Cyber Consortium, he has been a key leader in the cyber education, cyber workforce development, and cyber protection efforts in both South Carolina and across the Nation. He is the CEO of CyberSherpa...
Dan Shoemaker, ModeratorProfessor and Graduate Program Director, UDMDaniel P. Shoemaker, PhD, is a Full Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy, where he has worked for over 35 years. He has retired from his administrative position as Department Chair, PI for the NSA Center and Subject Matter Expert for DHS and NIST. He is enjoying more time with his ...
Kip Boyle, ModeratorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial ...
SentinelOne RepresentativePalo Alto RepresentativeCymulate RepresentativeRajesh NanwaniDirector, Information Security, RoushRajesh is the Chapter President of ISSA Motor City.
Violet SullivanAdjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & ForsterViolet Sullivan works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and n...
Nick HayesSr. Director, Cyber Solutions, SureCloudAs part of the SureCloud cyber services division's leadership team, Nick is responsible for developing and executing the strategy for the cyber testing team. Along with the responsibility for developing tech-led consulting service propositions that combine our expertise, the SureCloud platform and technology. Additionally, Nick oversees and d...
Juan RodriguezCTO & Founder, WhisticAfter graduating from college, Juan joined numerous startups in the Los Angeles area, specifically focusing on the early stages of what we now know as SEO. During that time, Juan established himself as a seasoned engineer and learned the ins-and-outs of running a company.
In 2011, a large eCommerce company approached Juan, and he and h...
Jake BernardesCISO, WhisticJake is a technology leader with significant experience in funding rounds, delivering security transformation and building best in class security functions.
Passionate, innovative & pragmatic with an understanding of what makes businesses tick and how to take them from start up or growth phase to enterprise level security capabilities,...
Andrew JohnsonSolutions Architect, Washington Technology Solutions (WaTech)Andrew Johnson is a Solutions Architect based in Olympia, WA. Andrew serves as the Principal Architect overseeing the state’s adoption of zero trust, Secure Access Service Edge, SD-WAN, and Secure Service Edge. Andrew is responsible to interconnect state government with cloud-based resources and external business partners. Andrew spearheads t...
Mike CostelloStrategic Planning & Design Manager, State of WashingtonMike Costello is a strategic planning & design manager based in Olympia, WA. Mike oversees solution architecture, systems engineering, and capacity management to develop effective IT strategies. His expertise in networking, computing, and security allows him to harmonize and integrate diverse infrastructure technologies into comprehensive des...
Marwan YoussefThird Party Cybersecurity Program Leader, General MotorsMarwan Youssef is an accomplished cybersecurity and risk management expert with over 25 years of experience leading information security and technology programs at large organizations. Marwan is currently serving as the Third Party Cybersecurity Program leader at General Motors.
Prior to GM, Marwan was the Client Management Executive f...
Marie OlsonFormer Deputy Chief Privacy Officer (CPO), BoeingMarie Olson is an internationally recognized leader for her expertise in global regulatory compliance, privacy engineering, cybersecurity, digital governance, and risk management. Marie is a Fellow in Information Privacy (FIP). She also holds four other privacy certifications (CIPP/US, CIPP/E, CIPM, CDPSE), and two information security certif...
Cynthia DamianCISO, ValonCynthia Damian is the Chief Information Security Officer at Valon Technologies, an up and coming fintech company innovating the financial and homeowner industry through technology. Cynthia has over 20 years of experience in cybersecurity and risk management holding security leadership and practitioner roles across small to large scale, global...
Tom ClineVP, Cyber Risk, Skybox Security15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include - designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO's.
Sam Masiello, ModeratorCISO, The Anschutz CorporationSam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to The Anschutz Corporation, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the pro...
Zachary LewisAVP of IT & CISO, University of Health Sciences and Pharmacy in St. LouisZach is a seasoned IT executive with a distinguished career spanning strategic IT management, cybersecurity, risk mitigation, and budget oversight. As the AVP IT and CISO for a private higher education institution, Zach has orchestrated transformative initiatives that have fortified the institution's cybersecurity landscape while driving stra...
Tyler ThornsberrySOC Analyst and Red Team Operative, Universal Logistics HoldingsTyler Thornsberry is a SOC Analyst for Universal Logistics who holds a Bachelor’s Degree in Information Security from Oakland University. He provides an offensive perspective in the threat landscape with his experience in pen-testing. Ranging from Active Directory to web applications, Tyler has engaged in numerous red-team exercises in an eff...
Joe WilsonSr. Security Engineer, BI IncorporatedWith over 15 years in IT and 5 years in cybersecurity, Joe is a recognized leader in safeguarding global digital landscapes. His experience and commitment IT and cybersecurity has seen him contributing to large and high-profile assignments such as the 2020 US Census Bureau Project through the Department of Commerce to his current task with th...
J.D. PerhamSolutions Architect, AcronisWith five+ years of experience as a sales engineer with Acronis, John currently works with some of the company’s largest enterprise customers, helping them develop, deploy, and maintain software to ensure system uptime and business continuity. John’s expertise also includes working with smaller to medium businesses so he understands the compl...
Ryan DavisSr. Director, Enterprise Sales, AcronisRyan brings over a decade of storage and data management experience to Acronis leading a commercial enterprise sales organization. Acronis’ enterprise sales team is focused on helping organizations improve their business continuity plans and reduce cyber exposure in historically difficult computing areas such as the edge, endpoints, industria...
James SlabyDirector, Cyber Protection, AcronisJames R. Slaby is the Director of Cyber Protection at Acronis. Previously, Slaby was an industry analyst covering cybersecurity, cloud computing and networking at Forrester Research, HFS Research, Yankee Group and The Info Pro. He has also held solutions, vertical, product and campaign marketing roles at tech security and networking vendors i...
Alex Wood, ModeratorCISO, Uplight; Co-Host, Colorado = Security podcastAlex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security...
Christopher HetnerCo-Chair, Cybersecurity and Privacy, NasdaqChris Hetner is a Senior Executive, Board Director, and leader in Cybersecurity recognized for raising cyber risk to the Corporate Board level to protect industries, infrastructures, and economies. He creates operational resilience by aligning robust Cybersecurity strategies with business objectives. Mr. Hetner’s professional judgment combin...
Michael SilvaLeader of Solution Engineering, Outshift by CiscoMichael Silva is the Leader of Solution Engineering within Cisco’s Outshift team. He is a technology leader with over 17 years of experience. He joined Cisco via the acquisition of Lightspin, where he was the Director of Technical Solutions. At Lightspin, Michael designed the technical go-to-market strategy, developed strategic partnerships, ...
Tim GalloHead of Global Solutions Architects, Google Threat IntelligenceTim Gallo is the Head of Global Solutions Architects at Google, he specializes in Cyber Threat Intelligence and Risk everything from Intelligence Operations and Cyber Threat Profile development to risk based analytic approaches to Security Operations. He Joined Google Cloud through the acquisition of Mandiant by Google in 2022, he had spent 5...
Craig HurterSr. Director, Information Security, State of Colorado Governor's Office of Information TechnologyCraig has worked in the IT industry for over 25 years and has focused on security for the past 15 years. He started in security as a forensic analyst and incident handler. After doing that for several years he moved into leadership in the InfoSec space and has been leading security teams in different capacities for the past 12 years. Craig ha...
Cynthia GonzalezSenior Product Marketing Manager, ExabeamCynthia Gonzalez is a Sr. Product Marketing Manager at Exabeam. An advocate for customers, she’s focused on their use of technology to enable and simplify work. She is at her best when bridging the gap between sophisticated software products and the benefits customers can expect.
Wes SpencerVP, Cybersecurity Strategy, CyberFOXWes Spencer is a nationally recognized technology innovator and co-founder of multiple cybersecurity companies including Perch Security which was successfully acquired in 2020. He has numerous awards including the 2020 Cybersecurity Educator of the Year by the Cybersecurity Excellence Awards. Wes has been featured in The Wall Street Journal, ...
Wei Chen LinCybersecurity Advisor, Region 5, CISAMr. Lin serves as a Cybersecurity Advisor (CSA) in Region 5 (IL, IN, MI, MN, OH, WI) at the Cybersecurity and Infrastructure Security Agency (CISA). Based in Chicago, IL, Wei Chen supports CISA’s mission of strengthening the security and resilience of the nation’s critical infrastructure.
As a CSA, Mr. Lin conducts various cyber prepare...Sumi GorlaDirector of Systems Engineering, IllumioSumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West.
Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as E...
Illumio RepresentativeNetskope RepresentativeOptiv RepresentativeMichael BaconManaging Partner, Rezolvrizk LLC; Former CSO, Wells FargoMichael is the Founder and Managing Partner at Rezolvrizk (pronounced “resolve risk”), a boutique risk management firm specializing in assisting companies in resolving their physical security, information security, investigative, and conduct management risks. Rezolvrizk clients span a wide range of businesses and industries to include brand n...
Charlotte HooperDirector & Helpline Manager, The Cyber HelplineCharlotte is the Helpline Manager at The Cyber Helpline and has supported thousands of victims of cybercrime and online harm, specializing in cyberstalking and technology-facilitated intimate partner violence. On top of her role at The Cyber Helpline, Charlotte has a first-class degree in Policing and Criminal Justice and a masters degree in ...
Chris Roberts, ModeratorCISO and Senior Director, Boom SupersonicChris is the CISO for Boom Supersonic and works as an advisor for several entities and organizations around the globe. His most recent projects are focused within the aerospace, deception, identity, cryptography, Artificial Intelligence, and services sectors. Over the years, he's founded or worked with several folks specializing in OSINT/SIG...
Jeff HudesmanCISO, PinwheelJeff is the Chief Information Security Officer at Pinwheel. He leads the Information Security function responsible for securing and protecting information and systems while ensuring overall cyber resiliency. Jeff previously held global leadership positions at DailyPay, Sony and PR Newswire. Jeff also advises several startups and nonprofits. J...
Shanae ChapmanFounder, CEO & Managing Director, Nerdy DivaShanae Chapman has secure tech experience from her work at HashiCorp, Boeing, Akamai, MathWorks, Red Hat, and IBM. She is currently the strategic project partner for clients working with the Nerdy Diva team. She leads the areas of business strategy, user research, design, content creation, and training on client projects. She holds degrees fr...
Melissa VentronePartner, Data Privacy & Cybersecurity, Clark Hill PLCMelissa Ventrone focuses her practice on class action privacy litigation, privacy breach response (pre- and post-event), payment card industry (PCI) standards and investigation, and advising clients in identifying, evaluating and managing first- and third-party data privacy and security risks. Melissa has represented numerous clients in litig...
Patryk StachowiakChief Product Evangelist, Tenfold SecurityPatryk has years of experience in technical support, presenting IT solutions, and sales in a global IT market. He enjoys traveling, meeting, and interacting with different people all around the world. He is highly customer service-driven and likes to build strong relationships with clients.
Chris SistrunkTechnical Leader on the ICS/OT Security Consulting team, Mandiant (now part of Google Cloud)Chris Sistrunk is Technical Leader on the Mandiant ICS/OT Security Consulting team at Mandiant (now part of Google Cloud) focusing on helping protect and secure critical infrastructure around the world for over 9 years. Before Mandiant, Sistrunk was a Senior Engineer at Entergy for over 11 years where he was a subject matter expert for Transm...
Robyn ReadyCISO, KnitWell GroupWith more than 17 years’ experience in the cybersecurity field, Robyn has led five organizations in their transformation from no security program or a minimal security program to a mature security organization. Starting with an organization that needed to achieve NIST compliance to survive, moving to a large financial firm, and then into the ...
Mo WehbiVP, Information Security & PMO, Penske Automotive GroupAs the VP of Information Security & PMO within the IT department at Penske Automotive Group, Mo oversees the implementation and governance of cybersecurity and IT service management best practices across the organization. He has over 18 years of experience in leading and managing complex IT projects, portfolios, and programs, as well as ensur...
Julian WayteSolutions Engineering Manager, UptycsJulian Wayte is a highly skilled cybersecurity professional specializing in cloud security. With over a decade of experience in the industry, Julian has become an expert in protecting digital assets and ensuring the security and integrity of cloud-based systems.
Julian's passion for technology and security began early in his life, spar...
Jay ChettyCloud Security, Confidential Computing, IntelJay Chetty is a seasoned Cloud Security Architect, responsible for overseeing the end-to-end security of the Intel Developer Cloud, a service offering from Intel. His experience spans multiple projects, where he has skillfully navigated the complexities of cloud-based systems to optimize security. His unwavering dedication and insightful stra...
Richard StayningsBoard Member and International Healthcare Cybersecurity Luminary; Teaching Professor, University of DenverRichard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised...
Frannie MatthewsPresident & CEO, Colorado Technology AssociationFrannie is a passionate leader who drives energy and innovation in everything she touches. With over 35 years of experience in the technology sector, Frannie provides clarity in the face of complexity and uncertainty. She believes that transformation is the key to success in today's business climate. Frannie is continuously scanning for re...
Tsvi KorrenField CTO, Aqua SecurityTsvi Korren, CISSP, has been an IT security professional for over 25 years. In previous positions at DEC and CA Inc., he consulted with various industry verticals on the process and organizational aspects of security. As the Field CTO at Aqua, he is tasked with delivering commercial and open source solutions that make Cloud Native workloads t...
Changiz SadrDirector, Cyber Security Global AllianceChangiz Sadr is an accomplished Telecommunications Engineer, licensed Professional Engineer in Ontario, and a distinguished Fellow of Engineers Canada. With a strong background in Communications Infrastructure Engineering and Cybersecurity, he has made significant contributions to the field throughout his career. Changiz holds prominent posit...
Robert LoyExecutive Director of Innovation, Grand Canyon UniversityRobert Loy is the executive director of academic success and innovation at Grand Canyon University. After 18 years in technology roles as a programmer and IT leader and 20 years in education at the Maricopa Colleges, Robert joined Grand Canyon to reshape the technology training and learning landscape and help provide marketable technology ski...
Tim RainsVice President, Digital Security, T-Mobile USATim is the author of the book "Cybersecurity Threats, Malware Trends, and Strategies."
Larry Yarrell, IIChief Development Officer / Diversity & Inclusion Program Development, The Marcus Graham ProjectBidemi OlogundeSr. Intelligence Analyst, Expedia GroupBid is a seasoned intelligence analyst with years of experience and industry certifications in security operations, threat intelligence, cybercrime investigations, inter-agency collaboration, and lots more. He's currently a Senior Intelligence Analyst at Expedia.
Shua GamradtSr. Director, Rugged DevOps & Enterprise DevOps Ambassador, Alight SolutionsJoshua "Shua" Gamradt is set on influencing culture change and introducing security by investing in others through the development and delivery of gamified security, engineering customer centric security solutions, focusing on risk, and utilizing continuous feedback and data to drive decisions. Shua began this journey of shifting empathy left...
Helmut SemmelmayerVP, Revenue Operations, tenfold Software North AmericaIn his role as VP Revenue Operations at the Austrian IAM software company tenfold, Helmut has been responsible for partner sales and product marketing across Europe and North America since 2012.
Right at the start of his tenfold career, he launched the company’s direct sales and was later strongly involved in developing its channel sal...
Eric VanderburSolutions Architect, Global Alliances and Partners, ForescoutEric Vanderbur is a highly skilled computer security professional with a deep understanding of cybersecurity principles and a passion for protecting digital assets. With over 20 years of experience in the field, Eric has developed expertise in network security, endpoint security, cyber, threat intelligence, and incident response.
Throu...
Ve BuiSr. Solutions Engineer, OktaVe is a technologist at heart who graduated University of Iowa during the dot com boom. He started as a software engineer in airlines at Unisys, then moved to ecommerce in 2005 where he implemented omni channel experiences. Since 2011, he's been a solutions engineer helping grow market share for technologies like ATG, Endeca, Oracle, Sitecore...
Robert BurdaCEO, Cybercrime Support NetworkRobert Burda currently serves as the Chief Executive Officer for the Cybercrime Support Network (CSN). Mr. Burda started at CSN in 2019 as the Chief Strategy Officer. He served as the Interim CEO from June 2021 until July 2022, when he was formally appointed as CEO by the board of directors. Prior to becoming CEO, Mr. Burda led several key pr...
Gina YaconeVP, ISSA Denver Chapter; Information Security Lead, Trace3 Mountain State RegionGina, based in Denver, severs as the information security lead for Trace3's mountain state region. Additionally, Gina offers valuable guidance to Trace3 clients on implementing innovative security solutions, enabling companies to safeguard their most valuable digital assets. Furthermore, she is an accomplished public speaker and a mentor in t...
Matthew CalcagnoSenior Solutions Engineer, OktaIT professional with a passion for cybersecurity management. 15+ years of experience leading key initiatives within both large companies and start-ups selling identity and access management, data monitoring, security, risk and governance solutions. Able to communicate effectively and professionally with key stakeholders to conduct and report ...
Greg York, ModeratorCISO, Follett LearningGreg enjoys inspiring, innovating, and collaborating to drive business value; time with family; backpacking adventures; and craft beer.
Lynn Dohm, ModeratorExecutive Director, Women in CyberSecurity (WiCyS)Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. ...
Gary WalderichSr. Regional Manager, CloudflareGary has more than 25 years' total IT industry experience, with the last 21 years focused on security. In addition, he has spent seven of those years as an SE Manager and SE Director. Gary currently works for Cloudflare supporting enterprise solutions for companies in the Southeast region.
Tony EnriquezChief of Cybersecurity, Region 5, U.S. Cybersecurity and Infrastructure Security Agency (CISA)Tony serves as a Cybersecurity and Infrastructure Security Agency (CISA) Chief of Cybersecurity for Region 5 (Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin). Based in Chicago, he leads the cyber team, supporting the mission of strengthening the security and resilience of the nation's critical infrastructure. Before becoming the ...
Brian YoshinoCybersecurity Advisor, Region 5, CISABrian Yoshino serves as a Cybersecurity Advisor with the Cybersecurity and Infrastructure Security Agency (CISA) where he supports CISA’s mission of strengthening the security and resilience of the nation’s critical infrastructure. As a CSA, Mr. Yoshino is the liaison between federal services and state, local, tribal, and territorial governme...
Andy OlpinSr. Solutions Engineer, LookoutAndy is a seasoned cybersecurity professional with more than 20 years in the field. At the Walt Disney Company, Andy was a compliance and security architect, managing solutions for Disney's broad portfolio of businesses. He moved on to be a solutions architect for MobileIron and now Lookout, where he has been for the past five years.
Chris WolskiInfraGard Houston Maritime Cross Sector ChiefChris Wolski is a distinguished information security expert, former Chief Information Security Officer for a Fortune 1000 company, and now provides fractional information security leadership for Applied Security Convergence. He is currently on the board of ISSA South Texas and is dual-hatted as the Maritime Cross Sector Chief for the Houston ...
Ally ArmesonProgram Director, Military & Veteran Program, Cybercrime Support NetworkAlly Armeson serves as the Program Director for the Military & Veteran Program at Cybercrime Support Network (CSN). Ally is responsible for building and managing CSN’s Military & Veteran Program, which provides service members, veterans, and their families with the education and resources they need to protect themselves from fraud and scams t...
TJ PreyearCyber Security Analyst, Ethical Hacker EnthusiastTJ Preyear is a Cyber Security Analyst that is currently employed by Independent Security Evaluators (ISE), the company of ethical hackers known for hacking IoT devices, web applications, and password managers. TJ got into cybersecurity because of his limitless curiosity and his accidental hacking of an educational website. This opened a new ...
Lookout RepresentativeHarvey Nusz, ModeratorBoard of Directors, ISACA (Past President)Harvey is a Boomeranger at Capgemini, having joined Insights and Data in February 2018 for GDPR, and again in late August 2021 for CPRA. He is now with Cybersecurity in Cloud Infrastructure building out Data Protection and Privacy Offerings, serving clients in Data Protection and Privacy, and assisting in Data Discovery with Securiti. He is a...
Aaron WooPartner, Vanguard LegalAaron Woo is a business and corporate lawyer with a focus on technology in healthcare, energy, AI/Machine Learning, blockchain, cybersecurity, and data privacy. Aaron's practice includes corporate transactions, mergers and acquisitions, technology, licensing, and corporate/securities. He advises technology companies from startup through acqui...
David SledgeDirector of Cybersecurity, Avelo AirlinesDavid Sledge is the Director of Cybersecurity for Avelo Airlines, where he collaborates with the CISA and FBI. He holds +20 IT and cybersecurity-focused professional certifications, including CISSP, CISM, and CIPM. He brings 16 years of experience in IT and security leadership, working with global Fortune 500 companies. Previous speaking enga...
Justin JordanRegional Sales Engineer, CrowdStrikeAs a skilled cybersecurity specialist with over 15 years of experience, Justin has honed his expertise in privileged access, identity security, and Endpoint Security Solutions. His background spans various industry-leading companies, including BeyondTrust, FireEye, and CrowdStrike. As a subject matter expert and advisor, he has contributed to...
Paul McBratneySr. Solutions Engineer, FortraPaul came to security after many years working in hosting and managed services. He has a background in Windows Administration, networking, and public cloud.
Madhu DoddaPrincipal Product Manager, LookoutMadhu Dodda is a seasoned security professional who has been contributing to the growth and evolution of the Lookout security solutions for the past 10 years. Dodda has been building network & data security products at scale for over a decade. As Field CTO, he evangelizes on Zero Trust principles and helps organizations defend against modern ...
Dan ShieblerHead of Machine Learning, Abnormal SecurityDan is the Head of Machine Learning at Abnormal Security, responsible for leading a team of 40+ detection and ML engineers in building the data processing and ML layers in the platform. Prior to Abnormal, Dan worked at Twitter, first as a staff machine learning engineer in Cortex, and later as the manager of the web ads machine learning team....
Tom Cline, ModeratorVP of Cyber Risk, Skybox Security15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include - designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO's.
Neal TillerySr. Manager, Solutions Engineering, OktaNeal Tillery has helped customers design and implement Identity solutions for 18 years. He has worked for industry-leading companies like Sun Microsystems, SailPoint, and Okta. He is now a Senior Manager for Pre-Sales Solution Architecture at Okta. He is passionate about how Okta can help customers quickly and easily secure their applications...
Eric PeetersSenior Manager, WeaverEric has more than 15 years of IT advisory and operations experience with significant knowledge of cloud services providers and users. He often works in complex, highly technical environments and consults with global cloud providers, Fortune 100 companies, private equity groups, start-ups, large pension fund managers, and state government ent...
Lulu Hernandez WalkerSenior Manager, WeaverLulu is a highly experienced and knowledgeable IT advisory Senior Manager with a strong focus on governance, risk, and compliance. She possess over seven years of experience in the field and has led and executed a range of projects, including SOC 1 and SOC 2 examinations, IT audits, Sarbanes-Oxley compliance, EI3PA assessments, FFIEC, FDICIA,...
Kip BoylevCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial ...
Tamika Bass, ModeratorCybersecurity Director, Gannett FlemingTamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys ...
Mike BrittonCISO, Abnormal SecurityMike Britton is the CISO of Abnormal Security, an email security company that uses behavioral AI to prevent business email compromise, supply chain fraud, and other socially-engineered attacks. At Abnormal, he leads the information security and privacy programs, where he is integral in building and maintaining the customer trust program, perf...
Pete Nicoletti, ModeratorField CISO, Check Point Software TechnologiesPete Nicoletti has 31 years of IT and MSSP experience and has been a hands-on CISO for the last 18 years and recently joined Check Point as Field CISO of the Americas.
Pete’s experience and leadership was most recently at Cybraics Defense as CISO. This company is an advanced Artificial Intelligence and Machine Learning Analytics formed...
Jack RoehrigTechnology Evangelist, UptycsJack has been passionate about (obsessed with) information security and privacy since he was a child. Attending 2600 meetings before reaching his teenage years, and DEF CON conferences shortly after, he quickly turned an obsession into a career. He began his first professional, full-time information security role at the world's first internet...
Deron T. McElroyChief of Cybersecurity, U.S. Cybersecurity and Infrastructure Security AgencyDeron McElroy is Chief of Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA), Region 6. He leads a team of Cybersecurity Advisors focused on enhancing our Nation’s cyber resilience. Deron’s team is available to help critical infrastructure owners and operators improve their cybersecurity posture, better manage cyb...
Theresa LeChief Claims Officer, Cowbell CyberTheresa Le is Chief Claims Officer at Cowbell Cyber, the leading provider of standalone cyber insurance for small and medium-sized enterprises. At Cowbell, she leads the team of cyber claims specialists and risk engineers who work tirelessly to minimize the frequency and severity of cyber incidents. Theresa brings nearly 20 years of cyber c...
John T. IrwinSolutions Leader for North America, CloudflareFor 16 years of his career, John has worked in IT operations running infrastructure, network and cyber security teams for Fortune 100 companies and U.S. government agencies. The next 15 years, he transitioned to leading vendor solutions engineering teams across the Americas, Eastern Europe, Middle East and Africa. In this time he focused on S...
Vasanth BalakrishnanSr. Enterprise Solution Engineer, CloudflareVasanth Balakrishnan is a Senior Enterprise Solution Engineer for Cloudflare based in Houston, TX. His career started with 10 years in the telecommunications provider industry in engineering/planning roles moving towards customer-facing architect roles. His cybersecurity solution engineer career started in 2010 with RSA Security and subsequen...
Linda White, ModeratorVP Information Security , 319 InSightWith 30+ years of technology related experience, Linda White has possessed a wide variety of Information Security and IT related roles over three decades within the Enterprise, Government, and non-profit space. Linda currently serves as the Director of Information Security at Axiom Medical. Prior roles include various Information Security fun...
Joshua ShapiroGlobal Director, Threat Intelligence, CrowdStrikeJoshua Shapiro leads CrowdStrike’s Threat Intelligence business, globally. His team builds strong partnerships and helps customers develop robust intelligence-driven information security programs that stop breaches and reduce risk. Prior to CrowdStrike, Joshua was a leader in Deloitte’s Federal Intelligence & Investigations practice. In this ...
Kyle KrejciSecurity Engineer, Team CymruKyle Krejci is a highly skilled and experienced Security Engineer at Team Cymru with over a decade of experience in Network Security and Engineering. He has a strong background in the field of cybersecurity and is passionate about using his expertise to help organizations better protect themselves against cyber threats.
Kyle has gained...
Donna GomezSecurity Risk and Compliance Analyst, Johnson County Park & Recreation DistrictDonna Gomez, CRISC, is the Security Risk and Compliance Analyst at Johnson County (KS) Park & Recreation District. Previously, Donna served as the Critical Infrastructure Protection Senior Manager and Risk Compliance Analyst for a municipally owned utility. Donna has been an information security professional since 1999, where she began docume...
Rob PankauSr. Solutions Engineer, OktaRob is a Senior Solutions Engineer from Okta with over 14 years of experience in Information Technology. His expertise falls with the Identity, Virtualization, and End User Computing spaces in regulated environments. Rob holds a MS of Information Technology Management and BA of Communication from Oakland University. He additionally sits on th...
Field Representative from Local FBI OfficeSnehal AntaniCo-Founder & CEO, Horizon3.aiSnehal Antani is CEO and Co-founder of Horizon3.ai, a cybersecurity company using AI to deliver Red Teaming and Penetration Testing as a Service. He also serves as a Highly Qualified Expert for the U.S. Department of Defense, driving digital transformation and data initiatives in support of Special Operations.
Craig RiddellField CISO, NetwrixCraig Riddell is an ephemeral identity enthusiast and has recently joined the Netwrix team as the North American Field CISO. Prior to joining Netwrix Craig was responsible for all of Identity at HP. He brings a wealth of knowledge and experience around modernizing identity solutions while reducing costs and improving security. Outside of work...
Rob ArnoldDirector of Information Security & Privacy Officer, Children InternationalRob Arnold is Director of Information Security at Children International, where his job is protecting the data and systems we use to fight to end global poverty. Twenty-eight years of working in Information Technology in the public and private sector has given Rob the conviction that successful outcomes happen when you don’t let the technolog...
Kristen GilmoreOutreach Chair, WiCyS Houston AffiliateKristen Gilmore is a senior business development director at INSPYR Solutions, a top-tier technology solutions company. With over 20 years of experience in IT staffing solutions in the Houston market, Kristen is a proven sales leader who has cultivated a strong reputation for building and expanding customer relationships. Kristen is well-vers...
Jarell OshodiDeputy Chief Privacy Officer, Centers for Disease Control and PreventionJarell Oshodi is a licensed attorney, Certified Information Privacy Professional (CIPP/US), and Certified Information Privacy Manager (CIPM) with more than 12 years of experience helping a range of government agencies in privacy and data governance roles. She has worked at the Department of Veterans Affairs, the National Institutes of Health,...
Susan LamChief Risk Officer, BakktSusan Lam is a resourceful and multi-disciplined senior Enterprise Risk Management and Governance leader with a proven track record for developing and leading strategic initiatives and innovations in dynamic and fast-paced environments. She is currently the Chief Risk Officer at Bakkt responsible for Enterprise Risk Resilience which comprised...
Eric StormRegional Sales Director – Northeast & Mid-Atlantic, BlackBerryEric Storm is the Regional Sales Director for the North East & Mid-Atlantic territories at BlackBerry. He has been a sales leader with BlackBerry for over two years, and his passion has only grown over that time for Cyber Security and the solutions we provide. He has worked in AI and Technology over the last 10+ years at companies such as Cit...
VB MalikPartner Solutions Architect, CloudflareVaibhav Malik, also known as "VB," is a seasoned networking and security professional and industry thought leader with over 12 years of experience in the field. He holds a Masters in Telecommunication from the University of Colorado Boulder and an MBA from the University of Illinois Urbana Champaign. Currently, Vaibhav is serving as a Global ...
Taylor SpeakerSr. Sales Engineer, Orca SecurityTaylor Speaker has been working in the information security industry for over 13 years. His experience includes working with organizations in the trading industry, technology startups, in addition to consulting across a wide variety of industries.
Jennifer GalvinPrincipal Partner Sales Engineer, Contrast SecurityJennifer Galvin is a Principal Channel Sales Engineer at Contrast Security, where she provides technical leadership supporting Contrast Channel Partners to help secure their customer's applications from the inside out. She has helped architect and build many critical application services you may use today. If you've viewed NASDAQ's video wall...
Robert YoungRegional Sales Engineer, CrowdStrikeRobert Young is a Regional Sales Engineer for CrowdStrike in the northeast U.S. territory, with an extensive background in security and IT operations. Over his career, Robert has worked both in the private and public sectors, as the customer and in sales, giving him a deep understanding of the people, processes, and technologies involved in s...
Stu SafferPartner Sales Manager, ExpelAfter spending the first half of his career in fintech, Stu moved into cyber security as a Strategic Global Account Manager with RSA in 2012. Since joining Expel in 2019, Stu has spent time in a variety of roles with clients and partners of all sizes. He currently manages the partner ecosystem in the Northeast.
Naiche RobisonSales Engineer, Identity and Access Management, ThalesNaiche Robison is a Field Sales Engineer with Thales Group covering their Identity and Access Management Solutions; SafeNet Trusted Access and OneWelcome. With 16yrs of channel/distribution experience covering multiple solutions, Naiche has worked with some of the biggest players in the field from Palo Alto Network’s, to Aruba, and Brocade to...
Nader ZaveriSr. Manager, Incident Response & Remediation, Mandiant, now part of Google CloudNader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states. He also lea...
Brandi BurtonDeputy CISO, TE Information Solutions (TEIS)Brandi Burton has more than 25 years experience in information and cyber security, with a specialty in technology risk management. Brandi has successfully helped companies in various industries design and lead information security and risk management programs that enable the organization's business strategies while meeting stakeholder expecta...
Bistra LutzDirector of Global Information Security Operations, Crown HoldingsBistra has been in information security for 15 years; and all of it she spent in security operations/engineering for various industries from financial, to health care, to consulting; and most recently, manufacturing. Bistra is a passionate blue teamer, likes experimenting with new technologies, and is a team builder with a knack for process i...
Expel RepresentativeApril Boyd-Noronha, ModeratorGlobal Diversity & Inclusion Advisor, Board Member, XR Safety Initative (XRSI)April Boyd-Noronha, also known as The STEM Broker, consults parents, educational and civic entities on actively engaging the NextGen as they pursue careers in STEM. She is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe ...
Joseph ArahillSr. Manager, Information Security, Affiliated DistributorsJoe Arahill is the Senior Manager of Information Security at Affiliated Distributors (AD). He oversees the people, processes, and technology that secures AD's infrastructure and business systems. Joe started his career in information security for a commercial loan software company, and for most of his career, he has worked in the financial se...
Sarah BuergerBISO, The Kraft Heinz CompanySarah Buerger serves as the Business Information Security Officer for The Kraft Heinz Company.
Erik HartCISO, Cushman & WakefieldErik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companie...
Michael DaGrossa, ModeratorVP, Information Security, Genesis HealthCareA mission and customer focused Senior Information Technology Risk Management professional with a strong concentration in Computer Security Initiatives, Governance, Risk Management and Forensics. Extensive experience in creating security and risk programs for companies of various industries, sizes, and complexities. Hands-on pen testing, app...
Linda WhiteVP Information Security , 319 InSightWith 30+ years of technology related experience, Linda White has possessed a wide variety of Information Security and IT related roles over three decades within the Enterprise, Government, and non-profit space. Linda currently serves as the Director of Information Security at Axiom Medical. Prior roles include various Information Security fun...
Reanna SchultzTeam Leader of Information Security, Garmin InternationalReanna Schultz, from Kansas City, MO, holds both a Bachelor’s and Master’s degree in Cybersecurity. With over six years of professional experience, Reanna has contributed to various corporate environments, leveraging her expertise to strengthen cybersecurity practices.
Throughout her career, Reanna has worn many hats, including roles ...
Rick BosworthDirector, Product Marketing - Cloud, SentinelOneRick Bosworth is an engineer turned product manager and marketer, bringing an uncommon technical perspective to enterprise GTM strategy and execution for almost two decades. At SentinelOne, his focus in cybersecurity—in particular cloud workloads, IoT, and user endpoint security—has provided expertise to the rapidly-evolving challenges across...
Jordan Fischer, Special GuestFounding Partner & Owner, Fischer Law, LLCJordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and techno...
Adnan HussainCybersecurity Engineering Manager, SchlumbergerAdnan Hussain is a Cybersecurity Engineering Manager at Schlumberger where he is responsible for cybersecurity solutions for endpoint, perimeter, network, identity and secret management, physical security, and tools & automation teams. With more than 25 years of experience in IT and Cybersecurity, he has worked in operations, engineering, arc...
Michael GreggCISO, State of North DakotaMichael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.
With Michael’s cyber experience span being over a period of two decades, he ha...
Ryan SpelmanManaging Director, Cyber Risk Consulting, K LogixRyan Spelman is K logix's Managing Director of Cyber Risk Consulting. He focuses on helping organizations of all sizes navigate complex cyber risks and guiding them on their cyber security journey. Ryan has over fifteen years of experience in homeland security and cyber security. Ryan joined the firm from Kroll, where he was a Senior Vice Pre...
Frederick Webster, CISM, ModeratorInformation Security Officer, Blue Cross & Blue Shield of Rhode IslandFrederick Webster leads Blue Cross & Blue Shield of Rhode Island’s cybersecurity program as their Information Security Officer. He has over 15 years of experience in the IT and Information Security fields with a background in Security Operations, Business Continuity and Information Assurance. He has experience in Healthcare, Retail Pharmacy, ...
Jim CrattyDeputy Regional Director, Region 3, Cybersecurity and Infrastructure Security AgencyJames Cratty currently serves as the Deputy Regional Director within DHS CISA Region 3 In this role, he is responsible for the coordination of critical infrastructure protection via the operational delivery of CISA resources to include training, vulnerability assessments, and efforts between the public and private sector to secure and ensure ...
Jeanette ShermanDirector of Product, MendJeanette Sherman has spent her cybersecurity career working to understand and relieve the struggles of security leaders as they work to secure open source. After a youth spent befriending famous hackers, Jeanette has developed a perspective on cybersecurity that takes into account not only today's business needs, but also the thought patterns...
Patrick HaleyPrincipal Solutions Engineer, LaceworkPat is a Principal Solutions Engineer for Lacework and has been with the company for 3.5 years. He spent the previous ~10 years working for Boston based Cyber Security companies in similar roles and prior to that focused on implementation and consulting work for data automation workflows. Having been in security for the past 10 years and seei...
Doug RinehartGlobal CISO, Newfold DigitalRetired U.S. Navy veteran and cybersecurity Leader. Passionately helping to build and transform information security strategies and programs that work for the business.
Deniz GurkanAssociate Professor, University of HoustonDeniz Gurkan received her BS and MS degrees in Electrical Engineering from Bilkent University, in Ankara, Turkey, in 1996 and 1998, respectively. Her PhD is also in Electrical Engineering, received from the University of Southern California in 2003. She briefly worked as a lecturer at the California State University in Long Beach, Electrical ...
Carlos TorresAssistant Professor, Baylor UniversityCarlos I. Torres is an assistant professor in the Information Systems and Business Analytics department at the Hankamer School of Business at Baylor University. He received his PhD in Business Administration with a concentration in Information Systems from Washington State University. He also holds a MIB from Florida International University,...
Dr. Katie EvansDean of the College of Science and Engineering, Houston Christian UniversityDr. Katie Evans is a Professor of Mathematics and the Dean of Science and Engineering at Houston Christian University (HCU). Prior to HCU, she was on faculty at Louisiana Tech University for 16 years in the College of Engineering and Science, where she served in various administrative roles and is now Professor Emerita. Dr. Evans serves in le...
Ben DiMolfettaPrincipal Solutions Director | Client Solutions Architect, WinmillBen DiMolfetta is a Professional Services Director and AppSec Client Solutions Architect for Winmill Software, a technology services company headquartered in New York City. With over 30 years of industry experience, Ben is a highly qualified AppSec implementation architect, systems developer, project manager and educator, and holds the follo...
David Dumas, ModeratorSr. Principal, Security Risk Management, VerizonDavid Dumas, CISSP, CISM, ISSA Distinguished Fellow. David is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. He has 32 years in the security field, working at Digital Equipment and Verizon. He has been on the ISSA New England Chapter Board since 1998.
Ben HalpertCSO, Castle Black; Founder, Savvy Cyber Kids; NACD Board Leadership FellowBen Halpert is a man on a mission: to educate and empower today’s digital citizens in the workplace, at schools, and at home. By day, he is the CSO at Castle Black providing individuals cybersecurity, online privacy, and digital hygiene services with 24/7 human support. By night, he champions cyber ethics education throughout society via the ...
Jason AlbuquerqueChief Operating Officer, EnvisionWith more than 20 years of experience in the technology field, Jason has served in numerous leadership role in his career leading to the Chief Operating Officer position with Envision.
Jason takes pride in leading the charge, and in building a culture that is innovative and secure by design for the business and its clients. He brings t...
Allison K. Prout, Esq.Senior Counsel, Constangy, Brooks, Smith & PropheteAllison Prout is Senior Counsel at Constangy, where she represents clients, including SaaS providers, data aggregators, and healthcare-covered entities, in complex technology transactions with a specialized focus on data privacy and security contractual requirements. She develops and implements contracting procedures for clients, including in...
Dmitriy Sokolovskiy, ModeratorSVP, Cyber Resilience, SemrushFrom 1999 to 2007, Dmitriy had first-hand experience with servers, networks and datacenters, and NOCs and SOCs as he worked and consulted for defense contractors, public and private financial and medical companies, and non-profits. Between 2007 and 2018, Dmitriy spent 11 years at CyberArk software, helping them go public as he was building an...
Tammy KlotzCISO, TrinseoTammy Klotz is a vibrant and accomplished executive with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned...
Adam RosenVP, Product Strategy, NetwrixAdam Rosen serves as Vice President of Product Strategy at Netwrix. An expert on managing and securing data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity, he manages Netwrix’s portfolio of data security and data privacy technologies ...
Denis CalderoneManaging Director, Digital Investigations & Discovery, J.S. HeldDenis Calderone joined J.S. Held in October 2022 following J.S. Held's acquisition of TBG Security.
Denis has worked in the information technology field for more than 20 years with the last 18 being completely dedicated to information security. He holds multiple security certifications and prides himself on viewing information security...
Taylor Milligan CrottyDirector, Cyber Administration, BlackRockTaylor M. Crotty leads Cyber Administration at BlackRock, with responsibility for Cyber Diligence, Cyber Governance, Cyber Partnerships, Cyber Training & Awareness including the Firm's cyber resilience initiatives, and Business Management activities across Information Security, including fiscal management, talent management, and strategic pro...
Sarah RugnettaPartner, Buffalo, Constangy, Brooks, Smith & Prophete, LLPSarah serves as a vice chair of the Constangy Cyber Team and practices in New York. She leads the provision of compliance advisory services for the Cyber Team, advising clients on strategies to mitigate risk associated with data privacy and security through business-oriented approaches. Sarah has more than 15 years of experience working in th...
Lindsay NicklePartner, Dallas, Constangy, Brooks, Smith & Prophete, LLPLindsay serves as a vice chair of the cybersecurity and data privacy practice group. Lindsay has extensive experience managing responses to data privacy and security incidents, having managed some of the largest and most complex healthcare-related incidents in the world. Lindsay also has substantial experience assisting clients with the Payme...
David RichardsonVP, Product Management, LookoutDavid Richardson has been building software to help individuals and enterprises secure mobile devices for over a decade. David currently oversees product management at Lookout. He has 45 patents issued related to mobile security. He is a frequent speaker at security conferences on the topic of iOS and Android security.
Tom BrownSenior Solutions Engineer, ZimperiumTom Brown has held individual and leadership roles in sales engineering, customer success, and IT consulting over the past 20 years. As mobile, hybrid, and public cloud computing have become dominant models, his technical focus has evolved from endpoint and email security toward mobile and cloud-based, software-defined architectures deliverin...
Jose AcostaSolution Engineer, OktaJose Acosta is a Solution Engineer at Okta, with more than 20 years of experience in the IT industry. He has specialized in Identity and Access Management, Business Analysis, and Software Engineering, honing his skills to become a trusted advisor and subject matter expert in these areas. Jose’s extensive IT experience has equipped him to lea...
Violet SullivanAdjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & ForsterViolet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to de...
Karen Painter RandallPartner & Chair, Cybersecurity, Data Privacy, and Incident Response, Connell Foley LLPKaren Painter Randall, partner and Certified Civil Trial attorney at Connell Foley LLP, chairs the firm’s Cybersecurity, Data Privacy and Incident Response Group. Considered a national thought leader, she has extensive experience advising clients on cyber risk mitigation and resiliency, privacy laws and regulations and incident response. The ...
Monique FerraroCyber Counsel, HSB InsuranceMonique Ferraro provides legal and technical expertise in support of HSB Global Cyber Products. Ms. Ferraro's cybersecurity and privacy experience spans more than twenty-five years in digital forensics, ediscovery, information security and privacy. Ms. Ferraro holds a master’s degree and a JD. She is a Certified Information Systems Security P...
Jon Fredrickson, ModeratorVP, CISO, Blue Cross & Blue Shield of Rhode IslandJon Fredrickson is Vice President & Chief Information Security Officer for Surgery Partners. Prior to Surgery Partners, Jon has held various leadership & CISO positions across healthcare in both the provider and payor markets. Jon has developed a pragmatic approach to implementing cyber security solutions and assisting his organizations in ...
Mark P. ScichiloneNetwork Intrusion Forensic Analyst, U.S. Secret Service & New England Cyber Fraud Task ForceMark Scichilone is currently a Network Intrusion Forensic Analyst (NIFA) for the United States Secret Service-Boston Field Office, serving the New England region. With over 14 years of experience in computer forensics, Mark previously worked for eight years at the U.S. Postal Inspection Service - Boston Division - Digital Evidence unit as a S...
Garrett FitzGeraldCyber Special Agent, Boston Field Office, United States Secret ServiceGarrett FitzGerald is a Cyber Special Agent for the United States Secret Service Boston Field office serving the New England region, with over eight years of experience in investigating cyber and financial fraud.
Michael HolcombFellow & Director of Cybersecurity, FluorMichael Holcomb is the Fellow and Director of Information Security for Fluor, one of the world's largest construction, engineering, and project services companies with 60,000 employees around the world. In his role at Fluor, Michael is responsible for vulnerability management, incident detection/response, penetration testing and industrial co...
Mike SemaniukSystems Engineer, Palo Alto NetworksMichael Semaniuk is a Systems Engineer at Palo Alto Networks. He has been with Palo Alto Networks for 14 years where he was the first SE hired in New England. Michael enjoys solving customer problems and seeing their aha moment.
Paul MarchioneSr. Sales Engineer, ThalesPaul Marchione is part of Thales Cloud Protection and Licensing division. Paul is currently a Senior Sales Engineer with Thales focusing on products that protect customer’s data at rest and data in motion for both on premise and cloud based deployments. Having received a Computer Science Engineering degree from Northeastern University, Paul...
Dmitriy SokolovskiySVP, Cyber Resilience, SemrushDmitriy is currently a Senior Vice President, Information Security at SEMrush. From 1999 to 2007 Dmitriy had first-hand experience with servers, networks and datacenters, and NOCs and SOCs as he worked and consulted for defense contractors, public and private financial and medical companies, and non-profits. Between 2007 and 2018, Dmitriy spe...
JT KeatingSVP, Strategic Initiatives, ZimperiumFor 30 years, JT Keating has been driven to deliver technology-based solutions that make enterprises more profitable, compliant, and secure. At Zimperium, JT is responsible for leading strategic initiatives/partnerships, tracking/reporting mobile threat data, and guiding product strategies.
Amy EubanksEVP, Strategy and Professional Development, (ISC)²Amy is responsible for driving organization-wide strategy and global product innovation for education and professional development experiences for (ISC)² members and other cybersecurity professionals at all career stages. She leads a diverse team of strategists, educators, course developers, subject matter experts and instructors, as well as ...
Anna BelakDirector, Office of Cybersecurity Strategy, SysdigAnna has 10 years of experience researching and advising organizations on cloud adoption with a focus on security best practices. As a Gartner Analyst, Anna spent six years helping more than 500 enterprises with vulnerability management, security monitoring, and DevSecOps initiatives. Anna's research and talks have been used to transform orga...
Eric RobuckCybersecurity Specialist & Founder, The Valander GroupEric Robuck is a cybersecurity powerhouse with over 20 years of experience in the field. As the founder and owner of The Valander Group, he leads a team of elite business experts dedicated to delivering top-notch cybersecurity solutions to business owners.
Eric's military background as a Warrant Officer specializing in information tech...
Richard IsraeliteSr. Director, Information Security, AddeparRichard Israelite is Sr. Director of Information Security at Addepar. He is an information security leader with over 15 years experience building and leading global teams in some of the world’s largest Financial Services firms as well as smaller, cloud native FinTech companies. Christopher Jennings is the head of Cyber Analytics and Data Oper...
Cindy Allen, ModeratorCEO & CISO, River Birch Data Security ConsultingCindy Allen has over 30 years of experience in technology and security and has served as CISO, Privacy Officer, and HIPAA Security Officer for a global organization of roughly 5,000 employees in 8 countries. Prior to this role she was CIO for a Philadelphia-based professional services firm. She holds both CISSP and ITIL Expert certifications...
John VecchiChief Marketing Officer, Phosphorus CybersecurityAs CMO at Phosphorus Cybersecurity, John has achieved more than 25 years of experience in high-tech security marketing, strategy, product marketing, product management, and consulting. A serial CMO and security visionary, he has helped build and lead some of the biggest brands in enterprise security, including Solera Networks, Blue Coat Syste...
Check Point RepresentativeErin JoeSenior Executive Cybersecurity, Office of the CISO, GoogleErin Joe, Office of the CISO at Google Cloud, SVP at Mandiant, was Director of the U.S. government's Cyber Threat Intelligence Integration Center. Erin helps top customers defend against today’s threats, modernize cyber security, and effectively transform cloud operations. Reaching Senior Executive Service leadership levels over cyber operati...
J.S. Held RepresentativeAuthomize RepresentativeCorian KennedyHacker & Founder, SecKCCorian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay...
Sanara MarshSecurity Evangelist, Randori, an IBM CompanyDirector of Product Marketing for Randori and Security Evangelist, Sanara Marsh focuses on trends in cybersecurity and looks to apply methods to operationalize security programs. Working with a range of organizations to improve their security programs, Sanara has experience in endpoint as well as the exposure management space.
Rich DandlikerChief Strategist, VezaRich is Chief Strategist at Veza, where his responsibilities span high-level messaging and positioning, competitive market analysis, product strategy, go-to-market strategy, and evangelism. Prior to Veza, Rich led product management across the entire portfolio at Okta for over 4 years through their IPO, with overall responsibility for product...
Brandon M. BapstCyber Risk Advisor, EYBrandon has more than nine years of strategic experience in the security risk field. As a Cyber Risk Advisor within EY's Cyber Transformation practice, he works closely with executives, CSOs and CISOs on developing mature cyber risk programs. He has worked with Global Fortune 100 companies to transform tactical security programs into holistic...
Donna Ross, ModeratorPresident, WiCyS Delaware Valley AffiliateDynamic leader and board member demonstrating over 20 years of diverse risk, compliance, information security, technology, and operations experience within the manufacturing, insurance, banking, financial services, and retail sector. Adept in developing and implementing strategic technology and risk solutions, performing research and analysi...
Mike TetreaultCybersecurity Advisor to Rhode Island, DHS CISA; Colonel (Retired), Rhode Island Army National GuardWoody GrotonCIO, Draper Labs; Colonel, U.S. Army National Guard; VP, New England Chapter, MCPARoy Wattanasin, ModeratorResearch Security Officer, Massachusetts Institute of TechnologyRoy Wattanasin is an information security professional. Additionally, Roy is an avid speaker who has spoken at many conferences and webinars. Roy also enjoys data forensics & incident response and building security in. He is heavily involved with many computer security groups including OWASP Boston, ISSA and the local communities. Roy is also...
Dafina BuçajData Privacy & Cybersecurity Attorney, Constangy, Brooks, Smith & Prophete, LLPDafina Buçaj counsels and advises Octillo clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state, and international privacy regulations. Her practice includes helping organizations build out data privacy and security regulatory assessments, information...
Alicia Laing ClarkeDirector, Cybersecurity Risk, Privacy & Compliance, PGA Tour SuperstoreAlicia Laing Clarke is the Director of Cyber Security, Risk and Privacy (Head of Security) for PGA Tour Superstores. Alicia oversees PGA Tour Superstore (PGATSS) Cyber Protection, Risk, Compliance and Privacy of all PGATSS assets and data. She is responsible for protecting PGATSS from cyber activities and leading PGATSS’s response to cyber th...
Kevin AugspurgerDirector of IT, Unite Private NetworksKevin Augspurger is an accomplished IT professional with over 18 years’ experience in the industry, 9 of which have been in the telecommunications field. In his career, Kevin specializes in networking, IT security, server/cloud infrastructure, IT management, and facilities/real estate. Additionally, Kevin holds certifications including Certif...
Jeannie WarnerDirector, Product Marketing, ExabeamJeannie Warner, CISSP, Director of Product Marketing at Exabeam, is an information security professional with over twenty years in infrastructure operations/security. Jeannie started her career in the trenches working in various Unix helpdesk and network operations centers. She began in Security Operations for IBM MSS and quickly rose through...
Marc VarnerCorporate VP & Global CISO, Lowe's Companies, Inc.As vice president, chief information security officer, Marc Varner is responsible for the global security strategy and program, ensuring all Lowe’s information assets and technologies are properly protected. He collaborates with senior technology and business leaders to implement the best security practices to protect and serve our customers ...
Bill RyanRegional Director, Region 3, CISAWilliam J. Ryan (Bill) was appointed Regional Director (RD) for Region 3 in 2016. Region 3 is headquartered in Philadelphia, PA, and serves Pennsylvania, Delaware, Maryland, Virginia, West Virginia, and Washington, DC. As CISA RD, Bill sets strategic level guidance for, and maintains an operational view of, the region’s cyber and physical inf...
Joe BennettSVP, CIO, AdientJoe Bennett is the Vice President and Chief Information Security Officer for Adient. A security leader known for developing and implementing strategic plans to support business objectives, Joe blends leadership and team building to execute an overall security program. As Chief Information Security Officer, Joe has built a security framework t...
Scott GillisRegional Director, ExabeamAccomplished cybersecurity industry leader with 20+ years of experience in the IT industry specializing in creating and leading hyper performing teams to achieve key company metrics and KPI’s. He is widely known across the industry as a successful product and operational leader specializing in creating, rebuilding, and realigning business seg...
Paul LynchDirector, Information Security, CubeSmartPaul Lynch, who has more than 20 years of experience in information technology, is Director of Information Security and Infrastructure for CubeSmart Self Storage. He has established security governance programs and best practices for government, non-profit, private, and publicly traded organizations ranging from technology startup to city. He...
Chris Glanden, HostFounder, The BarCode PodcastChris Glanden is an experienced cybersecurity strategist and the Founder & CEO of BarCode Security, a full-service consulting firm he launched in November 2023. Through BarCode, Glanden provides advisory services, pentesting, training, and incident response with a team of seasoned industry experts.
In 2020, Glanden started the BarCode ...
Michael LelandVP, Field CTO, IslandMichael joined Island in October 2024 as Field CTO, bringing over 30 years of data networking, operations, and cybersecurity domain expertise.
He formerly served as Head of Technical Marketing and Chief Cybersecurity Evangelist at SentinelOne where he was responsible for messaging and strategic development of their XDR product roadmap ...
Benjamin CormanvCISO, Corman Media & TechnologyBen has had a lifelong love of all things technical and has been an IT and Security professional for over 15 years. For the last 12 years he has been in the credit union industry and has been involved in an array of different projects and solutions. From core platform, networking, and system operations, to working on custom developed applicat...
Chris RobertsCISO and Senior Director, Boom SupersonicChris is the CISO for Boom Supersonic and works as an advisor for several entities and organizations around the globe. His most recent projects are focused within the aerospace, deception, identity, cryptography, Artificial Intelligence, and services sectors. Over the years, he's founded or worked with several folks specializing in OSINT/SIG...
Chris BoehmGlobal Field CISO, SentinelOneChris Boehm currently works as the Global Field CISO at SentinelOne. As a cybersecurity thought leader, he drives strategy and works closely with some of the largest organizations in the world. Prior to SentinelOne, he was a Senior Product Manager at Microsoft in the Azure Security engineering division. In his 5 years at Microsoft, he focused...
Joshua BrownVP & Global CISO, H&R BlockJoshua Brown is a Chief Information Security Officer, with deep experience in designing and building information security programs to deliver efficient and effective risk management practices. HIs core expertise is in zero trust design, implementation of data-centric risk mitigation, raising security awareness, and aligning security strategy ...
Eric AndersonCybersecurity Architect, Instructor, and Evangelist, Atlantic Data SecurityEric is a 35-year veteran of the technology industry, with the last 25 of that focused on cybersecurity. After having served in just about every technical capacity from coding to customer service, in both pre- and post-sales, he currently spends the majority of his time working with clients to solve their security challenges. Combining creati...
Dd (Catharina) Budiharto, ModeratorCISO, Advisory Board Member; Founder, Cyber Point AdvisoryKaren HarrisVP & Lead Cybersecurity Architect, Threat Modeling Center of Excellence Program Lead, JPMorgan ChaseKaren Harris is an IT professional with over 20 years of global banking and finance technical and operational expertise and is an avid threat modeling advocate. Karen is currently the Threat Modeling Center of Excellence Lead, and actively supports Grace Hopper, npower and Technica conferences mentoring and supporting young men and women (in...
Annie JamshedVP & Lead Cybersecurity Architect, JPMorgan Chase; President, WiCyS Houston AffiliateAnnie Jamshed is a cybersecurity professional with Bachelor's in Electrical Engineering and Master's in Cybersecurity. She has more than four years' experience working in Security Operations Center performing incident response, forensics, and threat intelligence. She is currently working at JP Morgan Chase as a Security Architect and threat m...
Robert EspositoDirector, Security Strategy, PhosphorusAs Director of Security Strategy at Phosphorus Cybersecurity, Robert helps organizations address xIoT attack surface management and preventative risk mitigation, enabling organizations to safely embrace an increasingly Thing-based world. He has been a cybersecurity professional in the Silicon Valley for over 20 years, with his early career fo...
Rob Dalzell, ModeratorBISO Team, Global Information Security, Bank of AmericaRob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awa...
Todd Bearman, ModeratorVP, CISO, TE ConnectivityTodd Bearman is the Chief Information Security Officer for TE Connectivity with responsibility for Information Security globally across nearly 150 countries with 75,000 employees.
Todd is responsible for ensuring collaboration and risk management across the corporate functions and business units where he leverages his leadership, techn...
Mike MillerAuthor, "Break In Cyber," vCISOMike Miller is a Chief Information Security Officer for Appalachia Technologies. For more than 25 years, Mike has specialized in both offensive and defensive cybersecurity and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to fol...
Bruce CoffingCISO, City of ChicagoBruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank o...
Michael MarsilioCISO, Paradies LagardèreMichael Marsilio is the Information Security and Compliance Officer for Paradies Lagardère, where he is responsible for information security, risk management, privacy and compliance. Michael plays a strategic role in protecting Paradies Lagardère IT resources, infrastructure and information assets, and helps drives global security initiatives...
Daniel J.W. KingChief of Cybersecurity, CISA Region 1 (New England)Daniel J. W. King is the Region 1 Chief of Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA) within the U.S. Department of Homeland Security. Region 1 is headquartered in Boston and Mr. King oversees CISA cybersecurity services and support via Cybersecurity Advisors throughout New England. CISA works with partners ...
Ed HudsonCISO, University of KansasHudson brings 20 years of IT security and IT governance experience to the role. He previously worked as the CISO for the California State University system, overseeing strategic information security and privacy efforts for the 23 campuses of the CSU system.
Hudson also served as faculty director for the EDUCAUSE Management Institute, i...
Harvey PerriottDirector, Region 6, CISAHarvey O. Perriott currently serves as the Regional Director for the Cybersecurity and Infrastructure Security Agency (CISA), Region VI headquartered in Irving, TX. His staff overseas risk management, and both physical and cyber security activities for private and public sector partners across five states including Arkansas, Louisiana, New Me...
Al LindsethPrincipal, CI5O Advisory Services LLCHighly effective and successful senior executive with 25 years in the energy industry. Experience and knowledge spans different markets, products, business models and disciplines. Proven track record of:
Driving resolution of the top challenges facing different groups, companies or individuals, whether as a member of its management team...Walter WilliamsCISO, MonotypeWalter Williams has over 20 years of experience in Information Security. He is the author of "Creating an Information Security Program from Scratch" (2021, CRC Press) and "Security for Service Oriented Architecture" (2014, CRC Press). He was a member of the program committee for MetricCon 8 and Metricon 10. He holds the CISSP and SSCP certifi...
Michael L. WoodsonDirector of Information Security and Privacy (former), Sonesta HotelsMichael Woodson is formerly Sonesta’s Director of Information Security and Privacy and was formally the Chief Information Security Officer (CISO) for the Massachusetts Bay Transit Authority, the public agency responsible for operating most of the transportation services in Greater Boston, Massachusetts. He was responsible for the MBTA’s tota...
Tim Cavanaugh, CISSP-ISSMP, CISM, CRISCCISI, Maiden Global Servicing Company, LLCTim has over 20 years' experience in all aspects of Information Technology, spending the last eight years in Information Security roles. He was lead author of a whitepaper on Cyber Insurance for Object Management Group (OMG) and has presented for CSA, (ISC)2, and OMG.
David LingenfelterCISO, Penn EntertainmentDavid Lingenfelter is the Chief Information Security Officer at Penn Entertainment, responsible for ensuring the highest possible level of security for the rapidly changing risk landscape. David manages teams that oversee IT security and compliance for both the retail and digital aspects of the business. David believes that in order to implem...
Shawn E. Tuma, InstructorCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPShawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small...
Esmond Kane, ModeratorCISO, AdvarraEsmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuab...
George JouldjianCyber Director, Elliott DavisGeorge has 21 years of experience as an IT Security Professional who works with clients in a variety of industries to analyze and improve their overall security posture through penetration testing and threat assessments. He also advises organizations on cyber incident response and provides comprehensive cybersecurity consulting services. Geo...
Stanley HammondSr. Security Engineer, Cape Cod HealthcareStanley Hammond has been in the IT field for the past 20 years and in the information security since 2006. He is currently a Senior Security Engineer in the healthcare field in Massachusetts. Throughout his career he has worked for non-profits, non-government organizations, higher education, and both public and private sector organizations. H...
Col. Candice E. FrostJIOC Commander, United States Cyber CommandCandice E. Frost is the Joint Intelligence Operations Center Commander at the United States Cyber Command. As the commander, Colonel Frost leads over 200 employees from the Defense Intelligence Agency (DIA), National Security Agency, and Department of Defense, to provide and produce intelligence required to direct, operate, and secure Departm...
Frederick Webster, CISMInformation Security Officer, Blue Cross & Blue Shield of Rhode IslandFrederick Webster leads Blue Cross & Blue Shield of Rhode Island’s cybersecurity program as their Information Security Officer. He has over 15 years of experience in the IT and Information Security fields with a background in Security Operations, Business Continuity and Information Assurance. He has experience in Healthcare, Retail Pharmacy, ...
Brian McGowan, CISMVP, Global Security & Privacy, SharkNinjaBrian currently leads the cybersecurity and privacy program as Vice President, Global Security & Privacy at SharkNinja, a relentless innovator and global leader in the housewares industry. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed t...
Sean McCloskeyChief of Cybersecurity, Region 4, DHS Cybersecurity and Infrastructure Security AgencySean McCloskey is the Chief of Cybersecurity, Region 4, within the Department of Homeland Security’s (DHS) Cyber and Infrastructure Security Agency (CISA). As the Chief of Cybersecurity, Sean leads the Cyber Security Advisors in Region 4 that assist critical infrastructure owners and operators in improving their cybersecurity capabilities an...
Lee Kim JD CISSP CIPP/USSr. Principal, Cybersecurity & Privacy, Healthcare Information and Management Systems Society, Inc. (HIMSS)Lee Kim is a top rated attorney, cybersecurity and data privacy subject matter expert, and creative professional (actress and voiceover artist).
Lee has earned the highest distinction as an attorney with an AV Preeminent peer review rating. Lee is licensed in the District of Columbia, Commonwealth of Pennsylvania, and registered to pra...
Richard MarcusVP, Information Security, AuditBoardRichard is the VP of Information Security at AuditBoard, where he leads product, infrastructure, and corporate IT security functions as well as AuditBoard’s own internal risk and compliance initiatives. In this capacity, he has become an AuditBoard product power user, leveraging the platform’s robust feature set to help achieve SOC 2, GDPR, I...
Clar RossoCEO, (ISC)2Clar Rosso has more than two decades of experience helping global professional associations and certifying bodies grow and strengthen member value. As CEO of (ISC)², she has established a forward-looking strategic framework and set bold goals for the future of the association. Under her direction, (ISC)² has established a Diversity, Equity, a...
Neil ClausonRegional CISO, MimecastNeil has 25+ years of experience building and securing complex IT and Security solutions. He's led Security Operations teams at Mimecast and other enterprises which face a variety of threats and challenges, and has built and enhanced cybersecurity programs to support and achieve business outcomes.
Jennifer Harkins GaroneSr. Director, Privacy and Information Governance, Carnival CorporationJennifer Harkins Garone is the Senior Director of Privacy and Information Governance for North American brands of the Carnival Corporation since July 2018. Prior to this role, she spent 10 years at Microsoft leading privacy in diverse roles and organizations, including IT, HR, and corporate privacy.
Jennifer launched her career in ma...
Jason KiktaCISO, AutomoxJason Kikta is the Chief Information Security Officer at Automox. He previously served for over 20 years in the United States Marine Corps, which included seven years at U.S. Cyber Command designing and managing the national counter-APT and counter-ransomware missions.
Naimah J. Duporte, Esq.Incident Response & Data Privacy Compliance AttorneyExperienced Data Privacy and Compliance Attorney, with a focus on Incident Response, and data analysis and classification standards. Background in criminal law, European Union law, and international law.
Anthony JamesVice President - Security Strategy, InfobloxAnthony James is a seasoned technology executive with 20+ years of product and marketing experience in the cybersecurity industry. Anthony leads as Infoblox’s VP of Product Marketing and has also held executive leadership roles across a variety of security startups and well-known organizations, including FireEye, Fortinet, Cyphort and TrapX. ...
Arien SeghettiDirector of Solution Architecture, CymulateArien Seghetti is an Industry veteran with 20 plus years of experience in cybersecurity, starting out his career serving in the US Air Force for six years to now Director of Solutions Architects at Cymulate. Having worked on all 7 continents, he has a global view of IT and security across all verticals. Though Arien calls the Greater Atlanta ...
Brad RussellSr. Systems Engineer, Code42Brad started his career in IT consulting after graduating from Vanguard University with a B.A. in Business Administration. From there, he moved to Cylance Inc. as an IT Manager/Systems Administrator and later into product development. From Cylance, he went to SentinelOne as a TAM for companies such as Nike and Salesforce, helping shape their ...
Mark HamiltonEnterprise Sales Manager, Cloud, SentinelOneMark Hamilton is a Cloud Sales Manager for SentinelOne based in the Seattle area. His long selling career has included time with HP, Cisco, F5, and Palo Alto Networks. In this current role, he facilitates cloud security discussions between clients, partners, and sales teams.
Jordan FischerCEO & Founder, Fischer Law, LLCJordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and techno...
Jerry Petru, CISSP, CISM, FBCS, CITPPresident, Washington State InfraGard ChapterMr. Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Chartered Institute for IT. He is an innovative, and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background...
Andrew FreyFinancial Analyst (Forensics), United States Secret Service - San Francisco Field OfficeAndrew is a Forensic Financial Analyst with the U.S. Secret Service’s San Francisco Field Office. Andrew is currently assigned to San Francisco’s Digital Assets team, where he investigates crimes involving cryptocurrency and other digital assets. Andrew’s background includes large scale criminal investigations involving a wide range of cyber-...
Dan ConradAD Security and Management Team Lead, One IdentityDan Conrad is AD Security and Management Team Lead for One Identity. He has been with Quest since 2007, where his roles have included Solutions Architect, Federal CTO, and IAM Strategist. He is an experienced sysadmin, having administered organizations ranging from 10,000 to 150,000 users. Dan holds a BS in Information Systems Management fro...
Scarlett MenendezTechnical Sales Engineer, Trend MicroScarlett Menendez is a cybersecurity professional with a specialization in cyber threat intelligence and programming in Seattle. Holding a distinguished position at Trend Micro, she has dedicated herself to providing insights on the evolving landscape of cyber threats, and offers strategic counsel on fortifying organizational infrastructures ...
David PierSolution Engineer, Red CanaryDavid is a Security and Privacy evangelist with over a decade of experience working in the industry. Prior to his work directly on Security, David was an IT Analyst for multiple large enterprise organizations and has experience working in the NOC of a 24/7 environment. When not at his computer, David loves the outdoors, taking any chance to k...
Kevin PentecostInformation Security Director, Standard Motor Products, Inc.CISSP | CISM | CEH | CPT | MCSE+I | CCA
Dan WhalenPrincipal Researcher Engineer, ExpelDan is a Principal Research Engineer at Expel, a 24x7 security operations platform. With nearly a decade of experience in security operations at scale, he's been exposed to a ton of different environments, unusual attacks, and challenging security problems. Lately, he's been focused on helping organizations protect their cloud and containeriz...
Asher BergmanThreat Intelligence Consultant, North America West, Recorded FutureAsher is a consultant with a broad set of expertise in SaaS customer success, intelligence analysis and strategy, and stakeholder management. Before his current role, he was an analyst working within this ambiguous, expansive idea of risk: financial risk, security and cyber risks, reputational risks, etc. He's fully embraced this concept in h...
Adam PikeSolutions Architect, 1PasswordAdam Pike is a solutions architect at 1Password (and former 1Password account administrator in a previous life) with two decades of IT experience focused on privacy and security, working at the intersection of people and technology. He spends most of his workdays helping customers integrate 1Password into their tech stack. When he’s not at hi...
Frank Simorjay, ModeratorDistinguished Fellow, ISSAFrank Simorjay (CISSP, ISSA Distinguished Fellow) is a cloud security and compliance subject matter expert. Frank works for Microsoft Azure global ecosystem organization as the Lead PM of the Azure automation Blueprint program, that includes the PCI automation blueprint. Frank has written an extensive library of papers, and blogs (http://clou...
Greg MacPhersonPrincipal Member of Technical Staff, AT&TGreg MacPherson spends his days protecting computer systems, evangelizing and implementing computer security, and striving to improve the information security situation in an environment full of competent adversaries and skeptical business people. Greg is a vocal advocate for greater security visibility and a regular advisor to industry leade...
Chris StaleyMDR Specialist, Open SystemsChris Staley is a cybersecurity specialist at Open Systems and advisor to enterprise security and technology leaders. He has over a decade of experience in enterprise technology, secure networking and emerging security services like SASE and XDR. His experience ranges from working with small and medium businesses to large global enterprises, ...
RachelleThreat Research Analyst, Team CymruRachelle joined the S2 Team having been a senior threat intelligence researcher analyst at one of the world's biggest retail brands, Nike. She specializes in e-crime and Russian threat actor tracking. In her free time, she enjoys frustrating baddies as a member of the Cryptolaemus group.
Moderator Eric YancyInformation Security Officer, City of Denton, TexasEric Yancy is the Information Security Officer for the City of Denton. Eric's contribution combines the experience of securing the broad range of risk profiles and regulatory considerations within the public sector with over 20 years supporting multiple verticals in the private sector. Eric retains multiple information security credential,s i...
Bill WhiteDevOps Revolutionary - Information Security, State FarmBill is an Information Security professional with 30 years’ experience in IT, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for Information Security architectural at a Fortune 50 company. He started as a bench technician while learning his way up to Information Security Manage...
William Lidster, ModeratorCISO, AAA WashingtonWilliam serves as the leader of AAA Washington’s information security and compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization. William has been with AAA Washington since August of 20...
Jay BealeCEO & CTO, InGuardians, Inc.Jay Beale is CTO and CEO for InGuardians. He works on Kubernetes, Linux, and Cloud-Native security, both as a professional threat actor and as an Open Source maintainer and contributor. Jay is a member of the Kubernetes project and previously co-led the project’s Security Audit Working Group. He's the architect of the Peirates attack tool for...
Jonathon MayorTechnical Director & Security Solutions Architect, CohesityJonathon Mayor leads the Security Solutions Architecture program for Cohesity. His 20+ years of experience in the IT industry have involved both offensive and defensive security activities. He also has a BS in IT with a focus on computer forensics, and he is a locksport hobbyist. This blend of skills and background is valuable in bringing cus...
Craig Spiezle, ModeratorFounder & President, AgeLight Advisory & Research GroupCraig Spiezle is the Founder and President of AgeLight Advisory & Research Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mind...
Dale 'Dr. Z' Zabriskie, CISSP CCSKField CISO, CohesityKnown for his ability to communicate both technically and conceptually in an authoritative yet entertaining style, Dale “Dr. Z” Zabriskie has consulted with IT professionals across the globe, advising on implementing effective cyber security strategies. He is a CISSP (Certified Information Systems Security Professional), and certified in Clou...
Kathleen MoriartyCTO, Center for Internet SecurityKathleen Moriarty, Chief Technology Officer, Center for Internet Security, has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appoi...
Marlowe Cochran, ModeratorCISO, New York State Department of EducationMarlowe Cochran has been working in the IT field for over 30 years, with 20 plus years in information security roles. He has worked in a multitude of sectors from government to health care. In his current role at the New York State Department of Education, he is the Chief Information Security Officer. Marlowe currently collaborates with inter...
Jacob BrownSr. Solutions Architect, ExpelJacob Brown is a Senior Solutions Architect with five+ years of experience in the security space working with clients ranging from from small startups to Fortune 50 corporations. With a background in data center, network, and cloud security, he is motivated by helping organizations implement security right where they are and streamlining that...
Moderator David A. WallaceAmericas Engagement Lead - Security, Risk, and Compliance, Hewlett Packard Enterprise (HPE)MBA, CISA, CISM, CISSP
With four decades of experience in Information Technology and 25 years of Information Security and Compliance leadership experience, David Wallace serves as the Engagement Lead for the Americas in Hewlett Packard Enterprise Pointnext Security, Risk, and Compliance practice. In his role, Wallace is the responsible...
Michael NikitinCTO & CISO, AIDA HealthcarePassionate product leader with the focus on solving real-life problems with smart technology. An advocate of the user-friendly, a simple intuitive interface and UX-driven design approach.
Tony SteffePrinciple Sales Engineer, CISSP, IllumioTony is a knowledgeable technical professional with 25+ years of experience developing, integrating, and leading technology projects for enterprise customers. He is effective in sales engineering, Internet security, project management, and computer networking. A skilled life-long student of managing the personal and technical challenges that ...
James StroudSr. Sales Engineering Manager, ProofpointJames Stroud is the Sr. Sales Engineering Manager for Proofpoint’s South and East Mid Market teams. He has 25+ years of experience in cybersecurity, providing leadership and expertise for companies in various sectors, including Federal, State and Local Government, Healthcare, and Education. James joined Proofpoint this year after serving as t...
Jane E. Petoskey, Esq.Associate Attorney - Data Protection, Privacy & Security Group, K&L Gates LLPJane E. Petoskey is an associate at the firm's Seattle office. She is a member of the Technology Transactions practice group, and primarily services clients under the Data Protection, Privacy, and Security focus area. Jane is also a Certified Information Privacy Professional in the United States (CIPP/US) and Certified Information Privacy Man...
Jeffrey R. WellsCo-Chair, Cybersecurity, Data Protection & Privacy Team, Clark Hill LawJeffrey R. Wells is the Co-chair of the Cybersecurity, Data Protection & Privacy team, and is a cybersecurity professional responsible for keeping organizations safe and protecting the privacy of employees around the world.
With over 25 years of global experience leading cybersecurity engagement, Jeffrey engages clients by leveraging e...
David OaxacaDirector, Integral PartnersDavid leads the Cloud Identity Governance and Administration practice at Integral Partners. He brings over 20 years of software development, cybersecurity, access enforcement, IAM, and IGA consulting expertise. David is focused on establishing emerging technology partnerships and delivering evolving and innovative cloud-based IGA solutions an...
Brent AndrewsenDirector, Integral PartnersBrent is the Director of the Privileged Access Management (PAM) practice at Integral Partners focusing on implementing CyberArk, BeyondTrust, Delinea, and other solutions. He has over 20 years of experience across a variety of IT disciplines including web infrastructure implementation and maintenance, ERP applications deployment and support, ...
Ryan CluffDirector, Integral PartnersRyan is a multifaceted technical leader with 20+ years of information security and governance experience. Throughout his career, Ryan has led and created dozens of strategic initiatives from the ground up, built successful teams and delivered quality results with consistency. His. extensive experience delivering complex regulatory and techn...
Moderator: David CoxVP of Services, Integral PartnersDavid is a co-founder of Integral Partners, bringing over 25 years of technical and leadership experience in the cybersecurity consulting industry. He is responsible for strategic client and partner relationships and leads service delivery for all Integral Partners’ offerings. David has worked with organizations in many industry verticals and...
Cecil PinedaSVP & CISO, R1 RCMCecil Pineda is Senior Vice President and CISO for R1 RCM, Inc. He was previously the Senior Director and Program Leader for the VCISO and Consulting Practice at Critical Start. He also served as the CISO of DFW International Airport and also held leadership positions at GameStop, TXU Energy, Boeing and CVS Health.
He is an active memb...
Jason EllisDirector of Advisory, Integral PartnersJason Ellis is the Director of the Advisory Services. With more than 20 years of experience in IT, Jason has managed multimillion cybersecurity and IAM programs, overseeing the development of the strategy, product roadmap, and delivery. His deep understanding of the IAM technical landscape (IGA, PAM, Access Management, Customer Identity, Zero...
Cameron JoyceSr. Solution Engineer, Arctic WolfCameron Joyce is a self proclaimed "full stack" engineer. Having spent close to a decade in Managed Services Cameron Joyce has implemented or managed just about every enterprise technology on the market. With a background in security, messaging, and datacenter architecture, Cameron Joyce now helps businesses select emerging technology solutio...
Janet RaeSr. Sales Engineer, PenteraJanet joined Pentera in 2022 and has been in sales engineering roles with various network and data security vendors for the last 20 years.
Jason SilvaSr. Solutions Architect, BeyondTrustJason Silva is a Senior Solutions Architect focused on Privilege Access Management (PAM), Identity and Access Management (IAM), and Least Privilege. Jason brings over 25 years of experience in solutions management to BeyondTrust's Privileged Access Management Solutions enforcing Privileged Password Management and Privileged Session Management...
Aryan TaheriCertified Ethical Hacker & Principal Architect, CybersecurityAryan is highly unorthodox and has been a key contributor on multiple disruptive efforts at T-Mobile USA, including BI Retail Dashboards, Managing & Security Mobile Point of Sale Tablets, and SLT devices. He's created T-Mobile's Zero Trust Strategy, and more recently has been tapped to join a select tiger team to deliver MFA Everywhere for Re...
Jamison UtterCyber Security Specialist, InfobloxJamison brings 25+ years of IT/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer’s internal and external problem set make...
Bill JessenFederal Government Director of Sales, Prophecy Americas, Inc.As an accomplished technology and public sector sales leader, Bill Jessen has worked with large Fortune 500 companies like AT&T, Verizon, and Motorola as well as small to medium business throughout the US. Throughout his career, he has worked with notable municipalities and enterprise organizations including the Executive Office of the Presid...
Jared PeckSr. Threat Researcher, ProofpointJared Peck is a Senior Threat Researcher for the Field Facing Threat Research Team at Proofpoint where he focuses on Latin American malware and phishing research as well as communicating threats and the threat landscape to customers. Prior to joining Proofpoint, Jared spent eight years at a Fortune 500 financial services company in several r...
Mark GalpinHead of Solutions Architecture, TideliftAs a developer, architect and product manager, Mark Galpin has a passion for making the release process better.
Chad KnipschildDirector of Product Marketing, AppOmniChad is the Director of Product Marketing at AppOmni, bringing a unique blend of cybersecurity expertise and go-to-market strategy. Prior to AppOmni, he served as a U.S. Naval Intelligence Officer with extensive experience in special operations and cyber threat intelligence, shaping mission-critical security strategies.
Brittany GeorgePartner, IT Advisory, WeaverBrittany George, CISA, CISM, PCIP, QSA, has over two decades of experience, including former Big Four experience with a focus on public company audits. Her current focus includes cybersecurity, system and organization controls (SOC) reporting, evaluation and testing of IT general controls (ITGCs) and regulatory compliance (including Payment C...
Austin SmithDirector, Systems Engineering, Code42Austin has been in security focused sales roles for the past 15 years with over 30 years of combined experience between IT and Sales. In that time, he has been fortunate to work with organizations of all sizes to help them reduce their risk, whether those efforts were focused on external threats or internal risks to their organization.
Dwayne CollierSr. Sales Engineer, Open SystemsFor most people, cybersecurity doesn't sound very interesting. For me, cybersecurity is a passion I’ve been chasing for 10+ years. Most recently, my work has landed me a position as a Sales Engineer with Open Systems where I’m focused on solving client security requirements.
Brad LaPorteEvangelist, Team CymruOne of the most influential voices in cybersecurity and is credited with inventing the term ASM at Gartner. Brad is a former top-rated Gartner analyst for cybersecurity and threat intelligence, veteran of U.S. Cyber Intelligence, Dell, IBM, Kasada evangelist and product leader.
Danielle GoodChannel Account Manager, ThalesDanielle is an innovative channel account manager with a deep background in delivering effective partner and customer experiences in high-growth and fast-paced environments. She is passionate about helping organizations reach peak security performance through customer-focused leadership, people development, team collaboration, and data-driven...
Dave M. CollinsManager, Risk Consulting, RSM US LLPDave brings over 30 years of IT, governance, risk, security/privacy, and compliance experience and consultation services to a variety of businesses and industries. Areas of focus include financial, insurance, retail, and healthcare. Dave has worked with organizations from small business to Fortune 100.
A former CISO/director in the pri...
Barbara Hiemstra, ModeratorPrivacy Engineer, IT Security and Compliance, Steelcase Inc.Barbara leads the Global Security Awareness/Phishing program to reduce risk and improve the cybersecurity culture at Steelcase. This includes creating content for employee awareness articles, training classes, and conducting multi-language phishing simulation and reporting.
Prior to joining Steelcase, Barb was the Information Security-...
Peter StarceskiSr. Sales Engineer, AxoniusPeter is a sales and systems engineering professional with more than 37 years experience with a solid track record. Dedicated to the success of the organization and extended account teams and driving continuous customer satisfaction. Maintained a track record of excellence by going above and beyond to provide goal oriented solutions to busine...
William SmarrSpecial Agent in Charge, Dallas Field Office District, United States Secret ServiceTyler FornesPrincipal Solutions Architect, ExpelTyler Fornes is a Principal Solutions Architect at Expel. Tyler formally led Expel's Global Response Team in performing incident response for both Expel's enterprise and cloud offerings. Prior to Expel, Tyler worked at FireEye after receiving a M.S. in Computing Security at the Rochester Institute of Technology.
Victor MendozaPrincipal Solutions Architect, ThalesVictor Mendoza, Principal Solutions Architect for Thales, is a member of the Cloud Protection and Licensing Solutions teams with 15+ years of experience in IT and cybersecurity. Today he works with companies in finance, healthcare, and oil & gas to streamline data security operations, accelerate growth and reduce risk to their most critical d...
Kurt HagermanField CISO, OracleKurt Hagerman is a Field CISO in the North American Cloud Engineering group for Oracle. In this role, he provides cloud security advisory services in support Oracle Cloud Infrastructure and other Oracle cloud-based solutions and applications to C-level executives across multiple industry verticals.
Prior to Oracle, Kurt served as a CxO...
Dean AgronCEO & Co-Founder, OxeyeDean Agron is a cybersecurity expert with over 15 years of experience in the industry. He’s known for his expertise in identifying market gaps, and in being able to clearly articulate complex and highly technical topics. Prior to co-founding Oxeye, Dean led the strategic consulting group at Kayhut, a cyber-security service provider, and held ...
Will WoodsonStaff Security Engineer, FastlyWill has spent the past decade in various cybersecurity roles, most recently at Fastly building web security and anti-fraud products. Prior to Fastly, he worked to develop security operations teams and capabilities for government, financial services, and security product companies. When not working you can find Will spending time with the ans...
Sean LeachChief Product Architect, FastlySean is the Chief Product Architect at Fastly, where he focuses on building and scaling products around large scale, mission critical infrastructure. He was previously VP, Technology for Verisign, where he provided strategic direction along with product and technical architecture and was a primary company spokesperson. Sean was previously CTO...
Kathleen KuczmaSr. Solutions Consultant, Recorded FutureKathleen Kuczma (she/her) is a Senior Solutions Consultant with Recorded Future. Her prior experience includes 3.5 years as an Intelligence Analyst within the U.S. Department of Defense where she specialized in counterterrorism, digital forensics, and nation-state cyber threats. In her current role, Kathleen uses her intelligence background t...
Donald IkhtiariPrincipal Security Architect, InsightDon possesses over 30 years of technical, executive, and team leadership contributions in information security and IT Infrastructure. He is an ethical and trusted security advisor who builds and fosters positive working relationships with clients while delivering innovative value-driven security solutions that improve the security maturity of...
Elvis MorelandBoard Director, Cyber Bytes FoundationElvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security...
Micki BolandGlobal Cybersecurity Architect & Check Point Evangelist, Check PointMicki Boland is a cybersecurity warrior and evangelist with Check Point Software Technologies Office of the CTO. A practitioner with 20 years in IT, cybersecurity, emerging technology innovation, Micki holds ISC2 CISSP, Master of Science in Technology Commercialization from the University of Texas at Austin, MBA with Global Security concentra...
Chris HillsChief Security Strategist, BeyondTrustChristopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Tech...
Karla ThomasThreat Detection, Investigation & Incident Response Leader, Lear CorporationIT executive with over 20 years of achievement in collaborating closely with business leadership, leveraging technology to support business initiatives and in leading, developing and mentoring IT colleagues in multiple disciplines. Diverse background encompasses leadership roles across training, support, infrastructure, audit and security dom...
Dan AdcockChief Operating Officer, Binary DefenseAs Binary Defense Chief Operating Officer, Dan Adcock leads all client service delivery organizations, ensuring the company evolves and maintains industry-leading cybersecurity capabilities to defend clients. He is responsible for top and bottom-line performance of the company while ensuring that clients’ business objectives in partnering wi...
Moderator: Tracy CaudillChief Commercial Officer, Binary DefenseAs Binary Defense Chief Commercial Officer, Tracy Caudill, brings her experience leading complex cybersecurity engagements and building collaborative teams that create customer value and enable long-lasting partnerships across the customer journey. She is responsible for leading Binary Defense’s marketing, sales and customer success strategy ...
Neil ChristieIncident Response/Channel Sales Engineer, CybereasonNeil is a 25+ year veteran of the information technology and cybersecurity field. Forging technology environments that support security to protect business is Neil’s passion. Currently Neil is working with Cybereason to enable customers and partners to use industry leading tooling in incident response engagements and ongoing production enviro...
Kristen SpaethSr. Investigator, Global Intelligence, CoinbaseKristen Spaeth is a Senior Investigator on the Global Intelligence team at Coinbase, where she works on investigations involving criminal matters in coordination with law enforcement partners. Prior to joining Coinbase, she was a Senior Cybercrime Analyst in the Cybercrime and Identity Theft Bureau at the Manhattan District Attorney’s Office....
Greg DunlaveySupervising Investigator, New York County District Attorney's OfficeGreg Dunlavey is a Supervising Investigator for the New York County District Attorney. Assigned to the Cybercrime and Identity Theft Bureau, his squad investigates sim swaps, DeFi exploits, and NFT thefts, as well as identity theft, business email compromise schemes and cyberstalking. He has been an Investigator for 12 years, previously servi...
Josh HopkinsSenior Analyst, Team CymruNow leading the internal S2 research team, Josh has been an analyst with Team Cymru for the past five years leading him to become an expert in counting to 10 and recommencing his work. He specializes in the tracking of infrastructure for a diverse target set that includes both nation state and criminal threat actors. Josh has an extensive bac...
Michelle SickbertSr. Director, BISO, EquifaxMichelle is the Business Information Security Officer.
Cary SpearmanSr. Security Consultant, Critical StartCary Spearman is a strong advocate for implementing real security and avoiding “security theater. As a graduate of Charleston Southern, Cary started his career in the IT world as a network administrator for a healthcare provider. His initial foray into the world as security was as a firewall admin with a large MSSP. Currently he is Security C...
Michael Anderson, ModeratorDeputy CTO & CISO, Dallas Independent School DistrictMichael Anderson is an accomplished corporate executive, entrepreneur, and business consultant. In January 2022, he was named BUiLT 2021 Speaker of the Year! With over 25 years of IT Management experience, he applies innovative methods to leverage his expertise for extraordinary outcomes. His specialties are risk management, cybersecurity, co...
Askia HowellSystems Engineer, https://www.linkedin.com/in/askiahowell/Before joining Palo Alto Networks, Askia graduated from MIT with a Bachelor's in Electrical Engineering in 2004. Since then, Askia has executed roles as an Account Manager, Sales Engineer, Systems Engineer, and a Consultant. Askia is an IEEE Member, CISSP certified since 2015, and has earned several technical certifications from multiple manu...
Samatha HarishEmerging Technology Product Owner, Advanced Infrastructure Technologies, Ford Motor CompanySamatha has 19+ years of experience in Enterprise technology with proven expertise in architecting, delivering, and maintaining complex projects in distributed environments.
Brian Lourie, ModeratorGlobal Cybersecurity Senior Manager, MarsBrian supports a wide variety of business units like Mars Wrigley, Kind, VetSource, and Blue Pearl, to name a few. Prior to joining Mars, Brian spent 20 years with General Electric as the Global DR Leader for GE Capital RE and running their VM program. He spent five years as a board member on the St. Louis Scott/AirForce ISC2 regional chapter...
Adam GavishCo-Founder & CEO, DoControlAdam Gavish is the Co-Founder and Chief Executive Officer of DoControl. Adam brings 15 years of experience in product management, software engineering, and network security. Prior to founding DoControl, Adam was a Product Manager at Google Cloud, where he led ideation, execution, and strategy of Assured Workloads (GovCloud) customer experienc...
Peter SilbermanCTO, ExpelPeter Silberman is the Chief Technology Officer (CTO) at Expel, where he splits his time between the practicalities of building software to scale security professionals and being mayor of crazy-town. Before joining Expel, Peter was the senior director of Innovation and Customer Engineering (ICE) at FireEye, and he has presented his original r...
Laura ThomsonSVP of Engineering, FastlyLaura Thomson is the vice president of engineering at Fastly, makers of an edge cloud platform. She ended up in this position after a 12-plus-year stint at Mozilla, where she rose through the ranks and ended up as the senior director of engineering for Firefox engineering operations. She also worked as a lecturer at RMIT University and co-fou...
Yanek KorffChief of Staff and Co-Founder, ExpelYanek Korff has served in information technology or security roles for over 20 years. Starting out as a student help desk tech in a musty library basement in college he is now co-founder and Chief of Staff at Expel, a DC-area cybersecurity company that makes security easy to understand, use, and continuously improve.
Yanek began his pr...
Ryan WakehamSenior Sales Engineer, CheckmarxExperienced leader with a demonstrated history of expertise in risk, compliance, and security. Strong builder, collaborator, and mentor who applies security fundamentals in the context of business objectives and requirements.
Arun DeSouzaCISO & CPO, Nexteer AutomotiveArun DeSouza is currently Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), security analytics, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk managem...
William Floyd, ModeratorFormer CIO/CISO, FUTU US Inc.I am an innovative technology executive with extensive leadership experience within a diverse portfolio of technology-driven public and private companies. I am results driven with considerable experience leading teams, implementing complex software products, IT projects, and administering large capital budgets.
I am a dynamic leader a...
Montez FitzpatrickCISO, Navvis HealthcareMontez is Chief Information Security Officer at Navvis Healthcare. With nearly two decades of cybersecurity experience, Montez has worked across numerous industries including healthcare, finance, gaming, and non-profit. Montez also helps shape young minds coming up as the next generation of cybersecurity experts through public speaking and co...
Moderator: Christine PelioneCybersecurity Strategic Risk Manager, General MotorsExperienced Cybersecurity Specialist with a demonstrated history of working in the automotive industry. Skilled in Business Process, Analytical Skills, Operations Management, Management, and Continuous Improvement. Strong program and project management professional with a Bachelor of Business Administration (BBA) focused in Business Administr...
Karl HeimerPrincipal, Heimer & Associates LLCLeader of Training & Development for the Auto-ISAC ACT program. Owner/Principal of Heimer & Associates LLC. Senior Technical Advisor for Cybersecurity to Michigan Economic Development Corporation (MEDC) Auto Office and Michigan Defense Center. Founder of CyberAuto, CyberTruck, CyberBoat Challenges; assisted in the creation of the CyberTractor...
Tim MyersCISO | Manager, IT Operations, Missouri Employers MutualTim is currently serving as the CISO and IT Operations Manager at Missouri Employers Mutual. He is a seasoned professional with over 25 years’ experience in the Security and IT Operations space. His experience includes roles in the energy sector, consulting, wholesale/retail, and the insurance industry. Tim is a proponent of a defense in d...
Moderator: Jericho Simmons, CISMVP, Chief Information Security Officer, Sound PhysiciansJericho has provided technology and security services within the education, government and healthcare industries for the last 19 years.
His aspiration is to shift the mindsets of people to “Security in Practice”. Which in turn will significantly reduce the distraction of malicious actors so the organization may focus on positive busine...
Joshua SeneyNetwork Intrusion Forensic Analyst (NIFA), Michigan Field Office, United States Secret ServiceJoshua Seney is a Network Intrusion Forensic Analyst with the U.S. Secret Service Criminal Investigative Division. Joshua has over 27 years of law enforcement experience and retired as the Sergeant of Detectives from a local agency. He has conducted forensic examinations for criminal, civil, and insurance related matters, while serving in bot...
Kimberly KJ HaywoodChapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin CollegeMs. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader...
Doug Menendez, ModeratorInstructor - Cybersecurity, Webster UniversityAfter retiring in 2019 with nearly 40 years of industry experience, Doug joined the faculty at Webster University as a fulltime instructor in Webster’s National Center of Academic Excellence in Cyber Defense (CAE-CD).
Doug is a dedicated teaching professional with demonstrated success in on-line, hybrid and in-person classroom techniqu...
Patrick SullivanVP, CTO of Security Strategy, AkamaiPatrick Sullivan is VP, CTO of Security Strategy for Akamai and a Contributing Author for Information-Security magazine. Patrick joined Akamai's Security Team in 2005 and has been a leader working with leading enterprises to design security architectures and thwart evolving threats. Patrick is a frequent speaker at Security Conferences includ...
Angela RobinsonCybersecurity Specialist, Missouri Information Analysis Center, Missouri Office of Homeland SecurityBrian CockrillAssistant to the Special Agent in Charge, United States Secret Service - St. Louis Field OfficeI have been with the Secret Service for 20 years and am currently assigned to the St. Louis Field Office where I manage our cyber-enabled financial crime investigations and Gateway Cyber Fraud Task Force (CFTF). CFTFs are the focal point of Secret Service cyber-investigative efforts and were developed to increase the resources, skills, and v...
Matt Fagala, ModeratorDirector, Security Operations, NTPMatt Fagala has over 20 years of experience in IT Operations. The majority of his career has been spent working for financial institutions and small to medium sized businesses in the St. Louis region. Like many, his career started at an early age with an interest in computer games and tinkering with computer hardware. After starting his firs...
Andy BrushProgram Director, Michigan Cyber Partners, Michigan DTMBAndy Brush is the program director for Michigan Cyber Partners. In this role, Andy seeks to improve the cybersecurity posture of governments across the state by finding innovative ways of working together across sectors both locally and nationally. Prior to joining the State of Michigan, Andy served Washtenaw County for 17 years in various ro...
Larci RobertsonSolutions Engineer, CybereasonLarci Robertson is a Sales Engineer in the TOLA region at Cybereason. She began her cyber career in the United States Navy as a Signals Intelligence Analyst. She had many different opportunities in the intelligence community at sea and shore. She is a proud plank owner of the Navy Cyber Defense Operations Command (NCDOC) where she was one of ...
Brad AllenSenior Sales Engineer, MimecastBrad has been married to his wife Mary for 17 years, and they have three boys: Carter age 15, Sam age 13, and Miles age 11. Brad and his family are an adventurous bunch, having flown and camped all over the US and several other countries as they love to travel and experience other cultures. Brad’s love for travel started when he joined the U....
Taylor Milligan Crotty, ModeratorGlobal Head of Cyber Resilience & Data Protection, BlackRockTaylor M. Crotty leads BlackRock Information Security’s Cyber Wargames team and is responsible for education, training and process development related to Cyber Incident Response & Recovery, measuring and managing cyber risks across the organization and Third Party Security for BlackRock’s critical service providers.
Taylor is focused o...
Jeff WichmanDirector, Incident Response, SemperisJeff Wichman has over 20 years of experience in information security, primarily focused on the Digital Forensics and Incident Response (DFIR) lifecycle. He has worked hundreds of incident response investigations, from relatively small business email compromises (BEC) to large-scale ransomware incidents.
Amna AwanDirector, Security Development & Engineering, Charles SchwabAmna Awan is Director, Security Development and Engineering, within the Technology Risk Management function of a major financial institution in the Dallas-Fort Worth area. She has an extensive technology background, including in development, and has held cybersecurity roles in the past with program ownership of multiple domains.
Amna i...
Paul RapierVice President, Information Technology, Detroit PistonsPaul Rapier, Vice President of IT for the Detroit Pistons, is a seasoned technology leader with 25 years of IT experience, including a decade in management. Known for his expertise in driving innovation within the sports industry, Paul actively shares his knowledge as a sought-after speaker at cybersecurity conferences and contributes to tech...
Tomás Maldonado, ModeratorCISO, NFLTomás Maldonado is the Chief Information Security Officer (CISO) at the National Football League (NFL). He is globally responsible for leading the information security program for the League and its entities. Maldonado has over 23 years of experience in this area, having led global information security teams and programs at several large in...
Bob Bacigal, ModeratorAVP, Information Security Services, Amerisure InsuranceBob Bacigal is the Assistant Vice President of Information Security at Amerisure Insurance. He has over 30 years of experience in information security management, risk management, incident response, disaster recovery, and business continuity planning. Prior to joining Amerisure, he held security management positions with Great Lakes BanCorp, ...
Steven Aiello, ModeratorInformation Security (Focusing on Payments), XMr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.
Mary Rowley, ModeratorIT GRC and Cybersecurity ProfessionalMary’s several years of leadership experience encompasses many areas of cybersecurity with a focus on IT risk management, IT audit, security awareness training, vulnerability management and incident response. Her extensive information security background includes working at Henry Ford Health System, Comerica Bank, WorkForce Software, Learning...
Nicole DoveHead of Security, Riot GamesNicole Dove is an award-winning cybersecurity leader, university lecturer & host of the Urban Girl Corporate World podcast.
As Head of Security for Riot Games, she is responsible for building a scalable security program including a team of BISOs to support the company’s expansion into entertainment, music and esports.
Nicole perf...Chahak MittalManager of Security Engineering, The Learning Care GroupChahak Mittal is a Certified Information Systems Security Professional (CISSP) and Manager of Security Engineering at The Learning Care Group. Chahak is deeply committed to knowledge sharing and community engagement. She has actively contributed to the cybersecurity ecosystem through her roles as a Judge at Major League Hacking (MLH) Hackatho...
Jaclyn MillerVP of IT & InfoSec, Chief Security Officer, DispatchHealthJaclyn is a strategic security leader and advisor working with companies who are building and scaling their security programs in the tech and healthcare industries. With 19 years of experience, she has dedicated her career to building sustainable and secure digital transformations. Additionally, she specializes in building teams to meet the c...
Gina GeiselSr. Product Marketing Manager, AutomoxGina is a Product Marketing Manager at Automox with over 20 years' experience in cybersecurity, endpoint management, and data storage. Gina develops messaging and content that resonates directly with our customers' challenges and is constantly seeking new ways to communicate how technology can make their lives easier.
Brian RoyeSr. Security Consultant, Critical StartCybersecurity professional with 20+ years of experience in solutioning and supporting across operations, client delivery, architecture, sales engineering, and management. Focus has been around security services, especially managed services and consulting as delivered from the provider. Experiences in working with clients from all industries a...
Patrick MasseyDirector, Region 10, DHS CISAPatrick Massey serves as the Regional Director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Region 10 office in Seattle. CISA is committed to improving the security and resiliency of our nation’s infrastructure through collaboration with critical infrastructure owner/operators, governments, industry, and other stakehold...
Jennifer DukarskiThe Geek Lawyer, Butzel LongEmerging Tech, Media, IP, Privacy & Cyber Shareholder
Louis-David (LD) ManginCEO & Co-Founder, Confiant Inc.Louis-David ("LD") is CEO and Co-Founder of Confiant, a cybersecurity startup specialized in threats that use digital ads as a cyber-attack vector. With 130+ custom ad tech integrations, Confiant has a unique vantage point to track credential phishing, malware infected software, investment scams, and more! Confiant is the sixth startup LD has...
Raj PatelSenior Field Sales Engineer, WithSecureRaj Patel is a Senior Field Sales Engineer with Finland-based cybersecurity firm, WithSecure. His 20 years of experience leading IT projects has focused on analyzing business requirements and customer goals to deliver enterprise solutions with a focus on cloud and cybersecurity technologies.
Or KatzSecurity Research, Principal Lead, AkamaiOr Katz is a security veteran, with years of experience at industry leading vendors, currently serves as principal lead security researcher for Akamai. Katz is a frequent Speaker in security conferences such as SecTor, OWASP global events and various BSides events. Katz also published numerous articles, blogs and white papers on threat intell...
Patterson CakeDFIR Principal Consultant, AvertiumPatterson has worked in information-technology for more than two decades, focusing on information-security for the past several years, specializing in the development of incident-response teams, programs and processes. Before joining Avertium, he was a Senior Security Consultant for Haven Information Security, a Senior Security Engineer for A...
Jason MillerChief Security Officer, Paper ExcellenceJason is the Chief Security Officer (North America) for Paper Excellence, where he manages all aspects of physical security. His diverse career spans over 25 years in US Special Operations and Corporate Enterprise, including roles as the Vice President of the Risk division for the largest security company in the world and Board of Directors o...
Moderator: Kurtis HollandSr. Principal, IT Security Architect, Sabre CorporationKurtis Holland, CISSP, ISSAP, CISM is an executive security practitioner specializing in numerous cyber security domains involving Network and Application Security Architecture, Identity and Access Management, System Engineering and Operations, Vulnerability Threat Hunting, Hybrid Cloud, and Regulatory Compliance. Kurtis has worked for seve...
Thomas StoneCyber Security Advisor, Check Point SecurityTom Stone is a seasoned cyber security advisor with more than 20 years of experience across the industry with a specialized focus on email and collaboration. Currently, Tom leads business development for Avanan, a Check Point Company, the world’s leading provider of advanced cyber security solutions. In his role, Tom works closely with custom...
Naomi BuckwalterFounder & Executive Director, Cybersecurity Gatebreakers FoundationNaomi Buckwalter, CISSP CISM, is the Director of Product Security for Contrast Security and author of the LinkedIn course: “Training today for tomorrow's solutions - Building the Next Generation of Cybersecurity Professionals”. She is also the founder and Executive Director of Cybersecurity Gatebreakers Foundation, a nonprofit dedicated to cl...
Juman Doleh-AlomaryCISO, BorgWarnerJuman Doleh-Alomary is BorgWarner's Chief Information Security Officer and an active volunteer board member of the ISACA Detroit Chapter. With over 15 years of experience in security, audit, investigation, compliance, and privacy policy/standards,
Juman most recently held the position of Director of Cybersecurity GRC at Little Caesar'...
Afzal KhanGlobal CISO, OPKO Health, Inc.Afzal Khan is a distinguished leader in the field of technology security and risk management, bringing over 26 years of expertise to his role. Currently serving at OPKO, he provides strategic direction and guidance on technology risk management, IT, OT, and cybersecurity, ensuring compliance with IT regulatory standards across domestic and in...
SolomonSecurity, CyralSolomon has over 20 years' experience as a security leader at such companies as Microsoft, IBM, VMware, and Facebook.
Diego MaldonadoManager, Cybersecurity Engineering, Leonardo DRSCybersecurity professional with over 30 years of experience with the U.S. Naval Service, Federal Civil Service serving in several roles as an IT Specialist, Information Systems Security Program Manager, Chief Information Security Officer (CISO) and Privacy Officer; In the Commercial space with IBM, The Newberry Group and other technology rela...
Chris LaFleurManager, Threat IR & Forensic, Trend MicroChris LaFleur has spent the last three years working to prevent and eradicate threat actors such as Ryuk, Conti, and Lockbit. Chris began his career at Trend Micro in Threat Support, and is now running the Incident Response team. He was a key part of the making a method on how to predict customer attacks with the Smart Protection Early warnin...
Andrew Wilder, ModeratorAdjunct Professor, Cybersecurity, Washington University in St. LouisAndrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security E...
Shawn HeckmasterCISO, Forrest T. Jones & CompanyShawn Heckmaster, Chief Information Security Officer for Forrest T. Jones & Company in Kansas City, MO has over 30 years of progressive information technology and security experience. He has worked across multiple private and government sectors, from the Department of the Army, Department of Defense, Black & Veatch and the Jones family of co...
Tami Spellman, ModeratorDirector, IT Security, Caleres, Inc.Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.
Marc RogersSr. Director, Cybersecurity Strategy, OktaMarc Rogers is Senior Director of Cybersecurity Strategy at Okta. With a career that spans more than twenty years, he has been hacking since the 80’s and is now a white-hat hacker renowned for hacking technology like Apple's TouchID and the Tesla Model S. Prior to Okta, Marc served as the Head of Security for Cloudflare and spent a decade man...
Severin SimkoEngineer, Google Cloud SecuritySeverin worked at Siemplify for nearly 3 years, 2.5 years of which were spent at TIP where he was team led for a team that was responsible for all integrations that Siemplify had. Nowadays he is focusing his work on Sales Engineering at Google Cloud Security and has been doing so for nearly half a year. Prior to that, Severin was working for ...
Moderator: Karly TarsiaContent Strategist, SecureWorldKarly Tarsia is a Content Strategist at SecureWorld. Her focus is on bringing smart minds together to discuss challenges and insights the InfoSec community finds helpful and informative. Karly’s career began after she graduated from the University of Oregon in public relations where she worked with clients in technology, financial and consume...
Robert "Teall" RistSecurity Engineer, CybereasonWith over 34 years of industry experience, Robert “Teall” Rist has been immersed in all things security since originally beginning his career in law enforcement. In the 27 years since, he has joined multiple start ups and enterprise companies such as Verizon, CA Technologies, NetIQ, and IBM. While at IBM, Robert was a black-belt level subject...
Faye FrancyExecutive Director, The Automotive Information Sharing and Analysis Center (Auto-ISAC)Tamara Shoemaker, HostPresident, Michigan WiCyS Regional AffiliateTamara’s primary mission is to address the shortage of specifically educated and trained cybersecurity professionals across Michigan. She focuses on K-12 Education with the CyberPatriot Program and Recruiting, Retaining, and the Advancement of Women leading the Michigan WiCyS Affiliate’s programs.
She has facilitated the MCISSE Center...
Scott MatsumotoCISO, Robinhood CryptoScott Matsumoto joined Robinhood in 2021 and is responsible for building and maintaining the cybersecurity program for Robinhood Crypto. He brings extensive experience in both the cryptocurrency and cybersecurity spaces having previously served as the CISO for Circle Internet Financial and the Poloniex cryptocurrency exchange.
Michael RoytmanChief Data Scientist, Kenna Security (a Cisco company)Michael Roytman is a recognized expert in cybersecurity data science. At Kenna Security, Michael is responsible for building the company's core analytics functionality focusing on security metrics, risk measurement, and vulnerability measurement.
Named one of Forbes' 30 Under 30, Michael's strong entrepreneurship skills include foundin...
Roger BrassardSr. Product Manager – Email Threat Protection, OpenText CybersecurityRoger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he ...
Mike WilkinsonDirector, Digital Forensics & Incident Response, AvertiumMichael leads the Digital Forensics and Incident Response team at Avertium. The team is dedicated to helping clients investigate and recover from IT security incidents on a daily basis.
Michael has over 20 years’ experience in the IT industry and has been conducting digital investigations since joining the NSW Police State Electronic E...
Ray YepesCISO, State of ColoradoYepes is the Chief Information Security Officer for the State of Colorado Governor's Office of Information Technology. Before his current role, Ray served as the CISO for the Texas Department of Family and Protective Services, the third largest agency in the Lone Star State. Ray holds a Master of Science in criminal justice and a Bachelor of ...
Jaimin ShahCISO, American First FinanceJaimin Shah is an experienced security and technology leader in developing global information security and privacy program with diverse experience in various industries including Real Estate, Airline, Retail, Banking and Hospitality. Jaimin has over 25 years of extensive, strategic leadership experience in being a trusted advisor in the field...
Sonja HammondVP & CISO, National Veterinary AssociatesSonja Hammond is the Vice President, Chief Information Security Officer at National Veterinary Associates. As an information and cyber security leader, Sonja brings experience from the financial, healthcare, manufacturing, and computing industries. An additional benefit that Sonja possesses is an information technology (IT) background with ha...
Moderator David BelangerCSO, BestowDave Belanger has over 25 years of experience in Security and Technology Leadership roles. Dave is the Chief Security Officer for Bestow. In his prior roles, he served as Information Security Officer for a Technology Company operating in the corrections and public safety industry and as CISO for Maxor National Pharmacy Services. He was also t...
Chad RienerthSpecial Agent, Chicago Field Office, U.S. Secret ServiceSA Rienerth serves on the Cyber Fraud Task Force (CFTF).
Joe DabrowskiDirector, Strategy & GTM, RubrikJoe leads America's Sales Strategy at Rubrik, working with enterprise customers and federal agencies on leveraging the Rubrik Data Security platform to drive cyber resiliency. Joe is an accomplished technology executive with 20 years’ experience. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Joe resides ...
Paul HammonsPrincipal Sales Engineer, ImpervaPaul has been working at Imperva for 10 years and he has seen it all. He started in IT Security roles in the mid-90s helping customers visualize, protect, and secure their environments. Having previously worked at companies like e-Security, Novell, Varonis, and various other startups, Paul has personally implemented security solutions on five...
Bryant SchuckSr. Product Manager, CheckmarxBryant Schuck is a Senior Product Manager for Checkmarx, where he is responsible for both the API Security and IAST products. Bryant has several years of experience in product management, software engineering, and agile ranging from being a co-founder of a startup to running teams for Fortune 500 companies. In his free time, Bryant enjoys tin...
Derek J. MayerAssistant Special Agent in Charge, Chicago Field Office, U.S. Secret ServiceAssistant Special Agent in Charge
Ryan LeirvikCybersecurity AuthorCEO of Neuvik and author of the book “Understand, Manage, and Measure Cyber Risk”. Past adventures include growing a cyber research and development company, serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, and sparking a fondness for technology problem-solving at IBM.
Alex BergerSr. Director, Product Marketing, Open SystemsWith nearly a decade of experience in the cybersecurity industry, Alex Berger joined Open Systems to lead Product Marketing in 2021. Throughout his career, he has worked on a wide range of solutions spanning identity and access management, network security, cloud workload protection, data access governance and more. In his spare time, he enjo...
Rebecca Rakoski, ModeratorCo-Founder & Managing Partner, XPAN Law PartnersRebecca L. Rakoski, Esq., is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the ...
Glenn Kapetansky, ModeratorChief Security Officer & Technology Lead, Trexin GroupGlenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...
Dr. Srini VadlamaniCTO & Co-Founder, CyralDr. Srinivas Vadlamani is a hands-on expert in designing databases, big data management systems, and security solutions. He is the cofounder and CTO of Cyral, a venture-backed data security startup. He was most recently the founder and chief architect at Imanis Data, a big data protection pioneer that was acquired by Cohesity. He was previous...
Bob SkinnerSecurity Principal, InsightBob Skinner has worked for over 30 years in Information Technology and Security in highly complex and regulated industries such Financial Services & Banking, Defense, Telecommunications, and Airline Transportation. His technical experience includes Systems Administration, Database Design, Application Development, and IT Auditing. As a consu...
Chad MaskillCyber Hero, ThreatLockerChad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infi...
Dan JaniczekSolutions Director, DeepwatchDan Janiczek is a seasoned Solutions Architect who takes a unique approach to engaging with customers on complex security problems. Coming from a background in Psychology he brings a fresh perspective to the unique challenges faced by organizations today, understanding the people and technology components of a successful security program. As ...
Brian Myers, Esq.Litigation Attorney, Octillo LawBrian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throu...
Michael StoneSenior Solutions Engineer, AutomoxMichael Stone is a Senior Solutions Engineer and joined Automox in 2021. His passion is helping organizations reduce their potential attack surfaces beginning with a simple philosophy: Start by Locking the Front Door! Michael has focused on the field of cybersecurity with a focus on endpoint management for over 15 years with a number of indus...
Christopher FielderField CTO, Arctic WolfChristopher Fielder has been in the cybersecurity world for over 20 years with experience from a range of military, government, and corporate environments. Christopher holds 18 industry certifications including the CISSP, GPEN, GISP, GCFE, GSEC, GCIH, CEH, and more; along with a Master’s Degree in Information Security. Today he is the Field C...
Rodrique BoutrosGlobal Telco/SI Architects, Americas Sales, Check PointRodrique has been with Check Point Software for nine years. He has more than 18 years of industry experience in IT networking and network security. The past four years, he has been focused on cloud security, supporting the Check Point field as a Data Center Virtualization and Cloud Security Solution Architect within the Americas.
Mark ScranoInformation Security Manager, CobaltMark Scrano is an information security manager at Cobalt, the leading pentest as a service company, where he focuses on maintaining network security, threat management and mitigation, vulnerability assessments, amongst other responsibilities. With over 15 years of experience he’s worked at notable companies including Vimeo, Paxos, and General...
Laura D. PfisterAssistant U.S. Attorney, Northern District of Georgia, United States Attorneys' OfficesAs a federal prosecutor in the United States Attorney’s Office for the Northern District of Georgia, Laura is a member of the Cyber and Intellectual Property Section. She has investigated and prosecuted a variety of cyber-enabled crimes, including ransomware attacks, corporate sabotage, and computer hacking, as well as cyber fraud schemes, su...
Terry McGrawExecutive Consultant CTU/IR, SecureworksTerrence "Terry" McGraw is a retired Lieutenant Colonel from the United States Army and now serves as a senior executive Incident Response Consultant. He has more than 20 years of experience providing expertise in cybersecurity architectural design and operations in both commercial and government sectors.
Terry previously served as pre...
Ivan RighiSenior Cyber Threat Intelligence Analyst, Digital ShadowsIvan Righi is a Senior Cyber Threat Intelligence Analyst at Digital Shadows, where he conducts research on cyber-threats affecting Digital Shadows' customers. Ivan earned his Master of Science degree in Cybersecurity from the University of Dallas, and holds a Bachelor of Science degree from Abilene Christian University. He also has a graduate...
Zach BullinerSr. Special Agent, Digital Evidence Forensic Laboratory, United States Secret ServiceZach Bulliner has been a Special Agent with the Secret Service since 2002, when he started in the Nashville Field Office. In 2008, he was transferred to Washington D.C., where he spent three years in the Cyber Intelligence Section (CIS) at Secret Service Headquarters before spending six years on Presidential Protection. He served on President...
Dana K. MotleyFounder & Owner, Motley Matrix LLCMotley Matrix is a unique digital marketing, social media and cyber intelligence small business. Current contracts support defense community collaborations, organizations within the CVE space, law enforcement and homeland security directives. Presentations and products leverage social media intelligence, cyber-social threat investigation, ope...
Jim DoggettCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser ...
Bob RenySales CTO & Principal Systems Engineer, ExabeamBob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network...
Joshua ReedNetwork Intrusion Forensic Analyst, United States Secret ServiceJosh Reed has over 15 years law enforcement experience and began working with the USSS in 2013. He is a certified computer, mobile device, skimming device examiner, and holds several professional certifications. He is an instructor at the National Computer Forensic Institute (NCFI) and has testified multiple times in state, local, and federal...
Lynn DohmExecutive Director, Women in CyberSecurity (WiCyS)Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. ...
Jordan Fischer, ModeratorFounding Partner & Owner, Fischer Law, LLCJordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and techno...
Matthew EddinsSpecial Agent, Charlotte Field Office, U.S. Secret Service; North Carolina Cyber Fraud Task Force (CFTF)Mike Muscatell, ModeratorSr. Director, Cyber Security, Acumatica, Inc.Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Com...
Sean DeubyPrincipal Technologist, North America, SemperisSean Deuby brings more than 30 years’ experience in enterprise IT and hybrid identity security to his role as Semperis' Principal Technologist, North America. An original architect and technical leader of Intel's Active Directory and a 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His expe...
Ran BarthDirector of Security Engineering, Salt SecurityRan is an Enterprise Security Expert with many years of experience helping Fortune 500 companies secure their data and applications. Ran has detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets with focus ...
Chad BarrDirector of Governance & Compliance, Risk Advisory Services, AccessIT GroupChad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.
As a visionary leader in the re...
Frank DePaolaVP, CISO, EnproFrank is an accomplished security and risk management leader with more than 23 years of experience, including 12 years leading global security & infrastructure teams for enterprise organizations. Frank has a passion for designing and implementing effective cybersecurity programs at enterprise scale in diverse environments. Frank specializes...
Vitaliy ShtymManager, Cloud Architect, Trend MicroVitaliy Shtym is a Cybersecurity Practitioner with over 10 years of experience, 5 of which have been at Trend Micro. Vitaliy has been in multiple customer facing roles to address cybersecurity challenges in organization of all sizes. He focuses on architecting optimal security solutions for customers leveraging Public and Hybrid Cloud. With p...
Jovonni PharrEngineer, Scientist, Founder of GACWR, Georgia Cyber Warfare Range (GACWR)Jovonni Pharr is a software/hardware engineer with a focus on Research & Development (R&D) in emerging technologies. He enjoys building solutions in Electronics, Materials Science, and Intelligent Systems. Some of his research focuses on areas in Computer Science, Human Behavioral Psychology, and Artificial Intelligence. He Graduated from Gor...
Aaron RoseSecurity Architect, US Public Sector, Office of the CTO, Check Point Software TechnologiesAaron Rose is a Cyber Security Evangelist, Security Architect & Member of the Office of the CTO at Check Point Software Technologies. A subject matter expert in Cloud, Internet of Things, and Application security; Aaron has focused his career on securing organizations & their resources beyond the perimeter of the traditional network firewall...
Rob VanderberryRegional Sales Manager, ThalesRob Vanderberry is celebrating his 26th year of technology sales and consultation, experienced in selling solutions to businesses and public sector organizations as manufacturer rep, distributor and reseller. Rob has a passion for helping organizations achieve successful business outcomes through optimized blends of technology, knowledge and...
Leo HowellCISO, Georgia Institute of TechnologyLeo Howell is a visionary information security leader who is passionate about the "I" in IT as he believes that data leveraged as a strategic asset is a major competitive benefit to any organization. Leo has over 24 years of service in IT and currently serves as the chief information security officer for Georgia Institute of Technology where ...
Brett Price, CISSP, CISMLead Cybersecurity Consultant, vCISO, AccessIT GroupBrett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. Brett’s skills range ...
David OrtegaPrincipal Solution Architect, Digital Identity and Security, Thales Cloud SecurityDavid Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expe...
Simon HillHead of Legal & Compliance, Certes NetworksAs VP of Legal and Compliance for Certes Networks, Simon assists with Regulatory and Compliance matters, Intellectual Property and interpretation of Security and Compliance Framework requirements. Simon has extensive international experience as a technology lawyer, working in multiple jurisdictions including the European Union, Japan, India ...
Justin HarrisDirector of Product Management, DelineaJustin Harris is a 20+ year technology veteran with a wide range of vertical industry exposure that has a knack for understanding how market trends introduce market needs. In his role as Director of Product at Delinea he leads the Vault portfolio of products such as Secret Server and DevOps Secure Vault. Justin’s area of expertise includes br...
Eric WaltersDirector, Cybersecurity & IT Infrastructure, Burns & McDonnellA seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience inclu...
Rodney PattisonSr. Security Architect, CapgeminiExecutive with multi-industry and multi-national IT service delivery experience. Global consulting background with expert level understanding and experience in IT strategy & governance, directing large, complex change initiatives. Business advisor developing lasting relationships by taking responsibility for customer satisfaction and conveyin...
Moderator: Jennifer HarmonInformation Security Analyst, Ascend LearningSuperior problem-solving skills and experience securing complex systems. A skilled Incident Manager of hosted systems with an emphasis on supporting both Linux and Windows Operating Systems secure availability.
Maria SinghManager, Strategic Cybersecurity & AI Product Owner, EnterpriseKCMaria Singh is a visionary cybersecurity and AI innovator at EnterpriseKC, leading transformative initiatives on the Heartland Cyber Range. EnterpriseKC is a business-led think-and-do tank driving enterprise development, innovation, and job growth. It maximizes regional prosperity by accelerating growth, retaining jobs and talent, expanding e...
Wally BitoutVP Global Business Development, SecloreWally Bitaut has worked in the content and collaboration industry for over 30 years, starting with FileNet Corporation (now an IBM Company) in Executive Leadership roles across Marketing, Sales, Product Management, Professional Services, and as a Board member. Today, Wally is the Global VP of Business Development at Seclore. His focus is to c...
McClellan 'Mac' PlihcikSenior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field OfficeJose FerreiraSr. Director, Security Solutions, East, Sirius, a CDW CompanyFerreira helps enterprises develop and maintain proactive security programs. He has over two decades of IT security experience and works with organizations to understand their assets, identify security gaps, and define the people, processes and technology that can facilitate mitigation and support business goals. He focuses on the development...
Jonathan BritoManager, Third-Party Risk Management, SyncteraJonathan Brito oversees Third-Party Risk Management at Synctera. Synctera connects community banks with FinTechs, allowing the bank to grow and the FinTech to launch quickly. Our processes streamline day-to-day processes like reconciliation, operations, and regulatory compliance for FinTech Banking. Jonathan Brito possesses over a decade of e...
Isaac HannaganSr. Solutions Architect, ReliaQuestIsaac Hannagan is a security professional with nearly a decade of experience spanning SIEM and the security industry supporting, architecting, and scaling solutions and services. Isaac has spent several years working in the SIEM vendor space supporting LogRhythm’s strategic enterprise environments as a Technical Account Manager before helping...
Nick WormserManaging Director, Palatin Group SKMr. Wormser has over 20 years of military and international security experience. He spent a decade in the French military where he was deployed to a host of foreign countries, serving as a team leader of a long-range reconnaissance and patrol unit (LRRP), conducting counter-narcotics and anti-terrorism operations, and training of host-country...
Christopher SandersPresident, The Palatin Group LTDMr. Sanders is currently the President of The Palatin Group LTD, an intelligence and corporate security advisory headquartered in Arlington, VA with offices in Bratislava, Slovakia and Zurich, Switzerland with partner offices around the globe. A seasoned security management consultant and executive with over 25 years of domestic and internati...
Allen SautterPrincipal Security Advisor, AWS; Former CISO, Federal Reserve Bank of AtlantaDavid BarrishSenior Solutions Engineer, OktaDavid is an Information Technology professional with over 20 years of experience in pre-sales engineering and software deployment in the Identity Access Management space. He has worked for many of the top IAM companies over his career and enjoys sharing his deep knowledge and experience to make customers successful.
Moderator: Phread CichowskiSr. Security Architect, SecureWorksPhread Cichowski has over 35 years of experience ranging from software development to data center management. Having worked for some of the leading technology companies in the world, his broad range of experience allows him to provide a well-balanced perspective leveraging bleeding-edge technology in critical high-availability IT environments...
Kara L. Hilburger, Esq.Privacy Compliance & Digital Accessibility Team Leader, Beckage LawKara advises and counsels clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state and international privacy laws, including the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), Virginia Consumer Dat...
Winston LalgeeSecurity Engineering Manager, Check PointWinston has almost 20 years of experience in the ICT industry; designing and implementing network security solutions for large enterprise environments. Today, he is a Security Engineering Manager with Check Point Software and is currently supporting a unique set of strategic accounts. He provides thought leadership; helping his customers unde...
Mike RomanSr. Sales Engineer, Orca SecurityMike is a Senior Sales Engineer at Orca Security who is responsible for helping organizations identify risks in their cloud environments and enhance their cloud security posture. Prior to joining Orca, Mike spent five years at Splunk where he partnered with organizations on their cloud journey in areas that included Security and Observability...
Jon PoonVP of Security Services, NovacoastJon's background is in Computer Science and was a software developer building web and mobile applications before moving into the security industry. He has been working with SIEM technologies for over a decade and has worked with hundreds of customers over that time building out SOC and SOC teams.
Steve BooneHead of Product, CheckmarxOver the last decade, Steve Boone has helped hundreds of global clients with their strategic adoption of secure DevOps best practices. A frequent speaker at DevOps Enterprise Summit, and DevOps World, Steve has shared his expertise on Secure Continuous Delivery, Value Stream Management, and Agile best practices. Today, Steve is the Head of Pr...
Jake MunroePlatform Marketing & Strategy Director, Recorded FutureJake has held various roles across the security space in consulting, marketing, and sales. Prior to joining the private sector, Jake served as a Navy Intelligence Analyst with an extensive background in counterterrorism, cyber threat intelligence, and open-source intelligence investigations.
Tony AllegratiCloud Systems Engineer, FortinetTony Allegrati is an experienced Sales Engineer with over 15 years of sales in both medium and enterprise accounts. Specialties: Presales demonstrations, evaluation, installations, training and support of IT security technology. 3+ years of work experience with Cloud Technologies and security for Cloud.
Dave KleinDirector, Cyber Evangelist, Cymulate21+ year veteran high tech leader with a proven track record of revenue generation in sales and demand generation in marketing. Successful in creating and conveying solution messaging for business and technical decision makers, analysts and channel partners. Energized teacher for field enablement.
Carlton JonesRegional Vice President, QualysCarlton Jones is Vice President of Northeast Enterprise Field Team. Over 20 years of Security leadership experience, in Fusion Centers, Incident Response, Insider Threat, and Attack Surface Management. Carlton designs solutions at scale for the largest brands and technology providers in the world. His background as a practitioner and consulta...
Mick LeachField CISO, Abnormal SecurityMick Leach is Field CISO of Abnormal Security, where he is responsible for threat hunting and analysis, customer engagement, and speaking at global industry conferences. Previously, he led security operations organizations at Abnormal, Alliance Data, and Nationwide Insurance, and also spent more than eight years serving in the U.S. Army’s fam...
Vijaya RaoEnterprise Cloud Security — Product Lead, UnitedHealth GroupVijaya Rao is a Senior executive with over 25 plus years of experience in the Engineering and Cybersecurity space. She has worked for different fortune 100 companies such as CenturyLink, AOL, JP Morgan Chase, and Google. She also founded the last mile Technology enabled platform called DeliveryCircle, raised multiple rounds of funding and cu...
Nick DulavitzGlobal Director, Channel Solutions Engineering, CyberArkNick Dulavitz, Global Director of Channel Solutions Engineering, has been with CyberArk for the past 8 years. Nick has worked with some of the largest global organizations helping them to achieve their identity security goals. In his current role, he is responsible for leading a global team that focuses on technical go to market enablement f...
Mike McKeownNational Sales Executive, BTB Security, LLCA 1980 graduate of St. Joseph's University, Mike has a 30+ year career of marketing and selling technology goods and services to SMB and Fortune 500 clients. While resident in the Great Philadelphia area, Mike has sold services nationwide. After owning his own business for 18+ year in technology services, Mike has been selling incident respon...
Elizabeth SylvesSr. Consultant, North America, CSCElizabeth Sylve is Senior Business Consultant for Enterprise Businesses at CSC where she helps and advises Senior IT and Cyber Security Professionals mitigate risk in front of the firewall. She is also a speaker for Global Antifraud and Phishing Solutions, former 8-year VP of IT Technology consultant at FuturTech Consulting, LLC, and has 24 y...
Krista ArndtAssociate CISO, St. Luke's University Health NetworkKrista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs i...
Valentina FloresCEO, Red SentryValentina Flores is CEO of Red Sentry, a vulnerability scanning and penetration testing company that keeps organizations secure 24/7/365 by actually mimicking hackers. Formerly a cybercrime detective on a federal task force, Valentina fought against these criminals her whole career, and has unique insight into the minds and tactics of attacke...
Jim BearceVP, Professional Services, AccessIT GroupJim Bearce is a seasoned cybersecurity leader with over 20 years of experience in IT security development, operations, and executive leadership. As Vice President of Professional Services at AccessIT Group, Jim oversees the delivery of cutting-edge security solutions, helping organizations strengthen their defenses against evolving cyberthrea...
Jim ChrisosPrincipal Engineer, ExabeamJim officially started working in security as an analyst at a large MSSP. This experience enabled him to gain employment at large global organizations as an analyst before becoming an incident handler. It was in his capacity as an incident handler where he witnessed, first hand, nation state attacks. This left such a profound impact on Jim th...
Sean BoulterPrincipal Security Engineer, Salt SecuritySean Boulter is a technical leader with Salt Security where he helps his customers protect their APIs from abuse and keep their customers’ data secure. His career in IT and consulting spans three decades and covers a wide variety of infrastructure platforms and several industries including fintech, finserv, insurance, healthcare, medtech, and...
Matt BarnettCEO, SEVN-XMatt is the Chief Executive Officer at SEVN-X. As a certified forensic analyst, former Law Enforcement Officer, and expert field operator, Matt lead's SEVN-X's Incident Response, Forensics, and Physical Security practices.
Nick RagoPrincipal Security Engineer, Salt SecurityNick is a startup veteran and Internet technology entrepreneur with over 25 years of application development, testing, and cyber security experience. He is recognized as an industry expert in API development, API management, and API security. At Salt, Nick is helping guide and positively influence how organizations protect themselves from tod...
Moderator: Gus ChiarelloDirector, Security Architecture, AccessIT GroupGus Chiarello is the Director of Security Architecture and part of the technology consulting leadership team at AccessIT Group (AITG). Gus has over 10 years of experience in risk management and 16 years in IT professional services leading the development of AppSec MDR, MSP, and MSSP service practices. Through leveraging his background in both...
Luke BabarindePrincipal Architect, Sales Engineering, ImpervaLuke Babarinde is a Principal Solutions Architect at Imperva with over 15 years of experience in cybersecurity. He is passionate about building effective solutions to assist organizations seeking to holistically address data challenges of which security is critical.
Ray CanzaneseSr. Director, Threat Research, NetskopeRay is the Director of Netskope Threat Labs, a globally distributed team that specializes in cloud and network-focused threat research. His research background includes malware detection and classification, cloud app security, web security, sequential detection, and machine learning. Although his current focus is cybersecurity, his research h...
Stephen FitzgeraldSr. Sales Engineer, Orca SecurityFrom writing detection rules and automations for SOC teams to assisting with compliance initiatives, cloud security has always been the focus of Stephen's career. Currently Stephen serves as a Senior Solutions Engineer at Orca helping customers architect and operationalize the Orca platform, as well as providing risk assessment reviews and gu...
Trenton IveyCounter Threat Unit Researcher, SecureworksTrenton has had the privilege of working with teams of skilled hackers to legally compromise some of the largest organizations in the world. Trenton has also worked on several high-profile incident-response engagements to help provide the adversarial mindset as organizations respond and recover. While his focus is currently offensive research...
Eric GauthierVP, Infrastructure & Security, Emsi Burning GlassEric Gauthier, CISSP, is a technology leader with 20 years’ experience working at the intersection of Information Security, IT, and DevOps. Eric is both a technical architecture and security leader having held positions in various settings including the corporate, academic, and service provider spaces building security programs, leading secur...
Selva Vinothe MahimaidasCISO, Houghton Mifflin HarcourtSelva Vinothe Mahimaidas is an Information Security Leader with more than 20 years of experience in all phases of information security. Selva currently serves as Chief Information Security Officer (CISO) at Houghton Mifflin Harcourt, an American publisher of textbooks, instructional technology materials, assessments, reference works, and fict...
Andrew SmeatonCISO, JamfAndrew Smeaton brings over 25 years of global information security experience, having successfully navigated complex, multi-stakeholder environments across Europe, North America, and the Middle East. As the Chief Information Security Officer (CISO) at Jamf, he is responsible for shaping Jamf’s information security vision, leading a global tea...
Sandra CavazosVP, Product Security and Privacy, ComcastSandra Cavazos serves as VP, Product Security and Privacy at Comcast. She leads Secure Development Lifecycle (SDL), including threat modeling, pen testing, SDL coaching, DevSecOps tooling, security developer training, and executive reporting. Sandra began her career as an engineer at Intel’s largest wafer manufacturing facility, improving qua...
Tal KollenderCo-Founder & CEO, CISO, GytpolTal is the CEO and co-founder of Gytpol. In her teenage years, she was a professional hacker, always on the hunt to crack open what seemed impossible, always on the lookout for IT challenges. As part of her army service, she was recruited to the Israel Air-Force having her sights set on becoming a fighter pilot. Later, the IDF re-assigned her...
Michael HowdenDirector of Security Services, NovacostMichael Howden brings broad and deep experience in technology, strategy, and security with almost 30 years of experience focusing on global upgrades, migrations, and consolidations for several hundred large enterprises. He is a transformational change agent, leading teams of top tier consultants, building world-class cybersecurity programs fo...
Moderator: Peter KurekCybersecurity Threat Hunter and Incident Responder, Eversource EnergyTerry Olaes, ModeratorDirector, North America Systems Engineering, Skybox SecurityTerry Olaes is director of North America systems engineering at Skybox Security. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security t...
Sean RaffettoSr. Account Executive, HoxhuntSean works with organizations across the globe partnering with them to provide tailored Consulting security services enabling security teams to keep up with the rapid pace of change in the cyber threat landscape. With over a decade of experience working with enterprise level solutions, Sean specializes in implementing proactive and defense cy...
Trevor WelshGlobal Security Strategist, Google Cloud SecurityTrevor is a Global Security Strategist with Google Cloud Security. Trevor leverages extensive experience in public sector, financials, retail / logistics, manufacturing, healthcare, and high tech to solve complex security analytics challenges. A former leader with Anomali, and companies like Splunk, ArcSight, and Fortinet, Trevor brings insig...
Stephen ClarkDirector of Cloud Security Sales, FortinetStephen Clark has over 25 years experience in the information security space having spent time at Check Point, Cisco, and Palo Alto Networks. Stephen also spent time working in the security consulting field working primarily with the Fortune 1000.
He is presently the Director of Cloud Security Sales for Fortinet. Today he helps manag...
Jeffrey MorissetteTechnical Staff Assistant (Special Agent), Boston Field Office, United States Secret ServicePrior Federal Employment
United States Border Patrol (USBP) – Casa Granda Station, AZ
Employed as an agent of the U.S. Border Patrol, July 1997 – January 2000
Training: US Border Patrol Academy (6 months), Charlestown, SCCurrent Federal Employment
United States Secret Service (USSS) – Boston Field OfficeJonathan TrullSVP, Customer Solutions Architecture and Engineering, QualysJonathan Trull is a longtime security practitioner and CISO with over 18 years of experience in the cybersecurity industry and is currently the Senior Vice President of Customer Solutions Architecture and Engineering at Qualys. His career has spanned operational CISO and infosec roles with the State of Colorado, Qualys, Optiv, and Microsoft....
Michael MeltzSenior Sales Engineer, Open SystemsMike Meltz has worked in the IT Security and infrastructure space for over 25 years and he specializes in the design and implementation of enterprise-level Cybersecurity technologies and business process improvements. His goal is to remain focused on creating a secure and quality-driven user experience while helping the organization grow and ...
Abel MoralesPrincipal Security Engineer, ExabeamAbel Morales is a Senior Security Engineer based in Atlanta, GA. Prior to Exabeam, Abel has over ten years of experience in information security in companies such as Verizon, Syniverse, McKesson and InterContinental Exchange (NYSE). In his previous role, he was responsible for managing incidents, performing technical analysis, and communicati...
Darren CarrollManaging Principal - Security Services, InsightDarren is a risk management and information security leader with diverse global experience in operational, technical, management, and presales roles. He has had the pleasure to build and lead multiple diverse, dynamic, high-performing teams. Throughout his career, he has provided consultative thought leadership, strategic direction, and tacti...
Eoin HinchyFounder, TinesBefore founding Tines in early-2018, Eoin worked in various enterprise security teams. He was a senior engineer in eBay Inc.’s Global Threat Management team, and most recently as DocuSign’s senior director of security operations, he led the company’s incident response, security tooling, threat intel/hunting, and forensics programs. Eoin has t...
Brian BlackDirector of Sales Engineering, Deep InstinctBrian is a Philadelphia based Distinguished Sales Engineer with 20+ years of experience in Cybersecurity and Intelligence. Brian leads Deep Instinct’s security engineering team, overseeing North and South American territories. He is a thought leader and technology evangelist with a wealth of knowledge on AI, Deep Learning, and Machine Learnin...
Lokesh AggarwalCEO & President, Apexa IQLokesh Aggarwal has over 20+ years of hands-on experience in developing technology plans, prioritizing IT initiatives and coordinating the evaluation, deployment, and management of current and future technologies. He has a track record of guiding large scale transformations and projects through the development of IT capability roadmaps, deplo...
Rich SchofieldPrincipal Security Architect, SysdigRich Schofield is a Principal Security Architect at Sysdig. Based in Boston. Rich has over 25 years experience in DevOps and Security at companies large and small, including HPE, Opsware and BBN. Over the past 4 years at Sysdig he has focused on security and visibility for Cloud and Kubernetes environments.
Greg McCarthyCISO, City of BostonGreg McCarthy is the first Chief Information Security Officer for the City of Boston and career public servant. Since joining the City of Boston’s Cybersecurity Team in 2010, Greg has managed the implementation of numerous information security solutions, developed the City's first cybersecurity awareness program for employees and successfully...
April Boyd-NoronhaLead, Security Awareness; Sr. Engineer, Information Security & Risk, Cardinal HealthApril, also known as The STEM Broker, is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe and inclusive realities. In her role, she continues to advise the CyberXR Coalition, launched by XRSI, where she helped lead the lau...
Christine GordonDirector, Global Cyber Governance Center, Cboe Global MarketsChristine is an Information Security leader with experience in the security, governance, and technology domains. Christine is currently the Director of the Global Cyber Governance Center at Cboe Global Markets, one of the world’s largest exchange holding companies. Christine holds a Master's in Management and Leadership from Webster Universit...
Dr. Margery SendzeTechnology Leader, I/O PsychologistDr. Sendze is a technology leader with more than 20 years of delivering business value by enabling high-performing teams. Dr. Sendze currently serves as a technology manager and leverages organizational psychology to drive organizational change and talent engagement and retention strategies in the technology workforce. She holds a B.A and an ...
Moderator: Kennetra PulliamsCommunications Specialist, Big 12 Now / ESPN+Kennetra Pulliams has more than 20 years of experience as a broadcast journalist. She graduated from The University of Texas at Austin. Her career has taken her from Texas to Virginia to Kansas City. Kennetra spent more than a decade working at Spectrum Sports, a regional broadcast network. There, she had to opportunity to cover the Kansas Ci...
Dr. Cheryl Cooper, CISSPWiCys Kansas City Metroplex, PresidentDr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solu...
Keith DalySenior Principal Engineer, ForgeRockKeith Daly is currently a Senior Principal Sales Engineer for ForgeRock.
Over the past 20 years, Keith has been on all sides of the Identity Management space in numerous industries, with roles ranging from systems architect within leading corporations, to developer and team lead at systems integrators, to technical sales and engineerin...
David MonnierChief Evangelist, Team CymruDavid has been with Team Cymru since 2007. Prior, he served in the U.S. Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team C...
Rick RutledgeSales Engineer, ArmisRick Rutledge has been in the Security space for more than 15 years. He has moved from working in the N.O.C. of a fortune 500 company to designing network and security infrastructure of a fortune 20 company to selling security solutions to hundreds of companies across all verticals and sizes. His previous experience with both support and de...
Jared AblonPresident & Co-Founder, HackEDUJared Ablon is the President and co-founder of HackEDU. His experience includes serving as a CISO, leading cybersecurity teams at the Department of Defense, and founding two companies. Jared has a CISSP, MBA and an MS in Applied and Computational Mathematics focusing on computer/cyber security, and was named CISO of the Year by the Los Angele...
James CussonSecurity Compliance Team Lead, Commonwealth of Massachusetts, Executive Office of Health and Human ServicesCasey McGeeAssistant to the Special Agent in Charge, U.S. Secret ServiceCasey McGee is an Assistant to the Special Agent in Charge in the New York Field Office of the U.S. Secret Service. He leads efforts to increase public and private partnership in the investigation of complex transnational criminal investigations involving the use of digital assets. In an executive developmental role, ATSAIC McGee served as th...
Bob AdamsSecurity Strategist, MimecastBob Adams is a Cyber Security Strategist at Mimecast. Originally joining Mimecast nearly 7 years ago as a Sales Engineer, Bob was recruited to Product Management after developing various unique ways of investigating cyber-attacks and highlighting Mimecast’s services. Bob now continues to use his time to help educate companies on protecting th...
Delbert A. RollRetired U.S. Army, former member of the Intelligence CommunityDel is a recently retired, senior leader with 20 years of Federal Government service having served in Washington, D.C. and internationally. Concurrently, he served 23 years as a commissioned Army officer in austere and hostile environments around the globe. Command assignments in both conventional and special operations forces. He is recogniz...
Derek MelberChief Technology & Security Strategist, TenableDerek Melber is an accomplished Chief Technology and Security Strategist, Advisor, and Professional Speaker with more than 25 years of success across the computer & network security industries. As a 17X Microsoft MVP, leveraging extensive experience in unifying products, marketing, sales, and content, he is a valuable advisor for any organiza...
Neal HumphreyArea VP - Security Strategist, DeepwatchNeal Humphrey has been active in the security industry for nearly 20 years. He has reviewed Security from the Application layer, to the Transport Layer, to Cyber Threat Intelligence, and finally to the Human. Over the last 20 years he has worked with customers from the Global 100 down to the SMB market to identify and solve Cyber Security O...
Jarret WrightDirector of Cybersecurity, Massachusetts Port AuthorityPrior to his role as Director of Cybersecurity at MassPort, Jarret has served as Deputy Director of Corporate Security for over 2 years where he focused on maintaining a
safe and secure environment at all Massport facilities while working with departments, law enforcement partners, and stakeholders to strengthen our capabilities to prev...Dr. Caroline McGroary, PhD, FCAFulbright Scholar, Boston College Cybersecurity Graduate ProgramsDr. Caroline McGroary is a Chartered Accountant and an Assistant Professor of Accounting at Dublin City University (DCU), Ireland. She has a Ph.D. in Professional Accounting Education and was recently awarded a Fulbright Scholarship by the Fulbright Commission of Ireland. Caroline will spend the coming year at Boston College as a Fulbright Sc...
Simon TaylorCEO & Founder, HYCU, Inc.Simon Taylor is the CEO of HYCU where he creates and executes on the vision and strategy for one of the world's leading multi-cloud backup and recovery SaaS businesses. Prior to HYCU, Simon held senior executive positions at Comtrade Software including President and CEO as well as Chief Strategy Officer of The Comtrade Group where he evaluate...
Kwan LinPrincipal Data Scientist, Rapid7Kwan is the Principal Data Scientist on the Rapid7 Labs Research and Advocacy team. He routinely monitors and analyzes large-scale honeypot and Internet-scan data using statistical and machine learning methods. Recently, Kwan helped Rapid7 launch Project Doppler, a platform tool that enables customers to assess their public internet exposure....
Professor Kevin R. Powers, J.D.Founder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston CollegeKevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Program at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College’s Carroll School of Management’s Business Law and Society Department. Along with his teaching at Boston College, Kevin is a C...
Chris A. Quintanilla, CISSPBoard President/Strategic Development Committee Chair, Philadelphia InfraGardChris has over 25 years’ experience in the IT field and is a Certified Information Systems Security Professional (CISSP). He has served as a senior project manager and engineer for several federal and municipal governments’ IT projects, as a network and systems engineer for IBM's Education and Training Division, and as an adjunct faculty mem...
Jon FredricksonVP, CISO, Surgery Partners, Inc.Jon Fredrickson is Vice President & Chief Information Security Officer for Surgery Partners. Prior to Surgery Partners, Jon has held various leadership & CISO positions across healthcare in both the provider and payor markets. Jon has developed a pragmatic approach to implementing cyber security solutions and assisting his organizations in ...
Danny JenkinsCEO & Co-Founder, ThreatLockerDanny Jenkins is the CEO and Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security. Danny is a leading expert in cybersecurity with over two decades of experience in building and securing corporate networks, including many roles on red teams and blue teams. He is dedicated to educating industry professionals ...
Bill BowmanOperating Partner | CISO, Welsh, Carson, Anderson & StoweBill Bowman built the information security programs as the initial cybersecurity leader at Bright Horizons, Houghton Mifflin Harcourt, Eze Software, ZoomInfo, and Emburse. With over two decades of experience creating cybersecurity programs that meet rigorous certifications such as PCI, ISO 27001, ISO 27701, SOC 1, and SOC 2, he has consistent...
Katherine ChipdeyDirector, Solutions Engineering and Alliances, AutomoxKatherine Chipdey has spent her career in Cybersecurity, consulting on how to simplify our understanding of the threat landscape and building programs for thousands of customers around EDR, SOAR, and MDR. At Automox, she helped build out the Solutions Engineer Team, where she focused on automating IT operations, reducing risk, and bridging t...
Stephen FrethemSenior Director of Sales Enablement, VaronisStephen has worked in the IT Industry since 2000 and in the security industry for the previous eight. Based out of the Twin Cities, Stephen has spent time at some of the largest organizations including Target, US Bank, Honeywell, and United Health Group. In his current role at Varonis, Stephen works with organizations around the US helping or...
Cerena CoughlinSpecial Agent, FBIFBI Special Agent Cerena Coughlin is the Employment Recruiter and Applicant Coordinator for the Philadelphia Field Office and local Private Sector Coordinator overseeing InfraGard, a public/private partnership between the FBI and representatives of critical infrastructure. She was a member of the Los Angeles Innocent Images SAFE Team, where s...
Tim HennesseySr. Director of SOC Services, Novacoast10+ years of managed security expertise.
Jamie ZajacVice President, Product, Recorded FutureJamie Zajac has over 10 years of experience in security and data protection roles and is currently the Vice President of Product Management for Recorded Future, an advanced security intelligence company. Jamie holds a B.S. in Meteorology and Computer Science from Embry-Riddle Aeronautical University and a MBA from UMass.
Michael MeisAssociate CISO, The University of Kansas Health SystemMichael is an Army veteran with over 13 years' experience and has a passion for architecting security programs, leading people, and developing world-class security teams. During his career, Michael previously partnered with the USDA CISO to develop one of the largest consolidations of security services in the federal government. Michael also ...
Ashley BullSolutions Engineer, TessianAshley is a Solutions Engineer at Tessian, providing customers with solutions to address their email security objectives. She is responsible for leading technical product demonstrations and evaluations, and is an expert in email security, endpoint security, insider threats, and behavior analytics and Human Layer Security. Prior to joining Tes...
Chris GriffithVP of Product, BalbixChris Griffith leads product management for Balbix. Chris brings over 15 years as a product, business development and strategy leader in security and technology. Prior to Balbix, Chris led tech alliances for Hewlett Packard Enterprise’s (HPE) security portfolio. Chris also ran product management for HPE’s Data Security business and drove stra...
Lisa PlaggemierExecutive Director, National Cybersecurity AllianceLisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t b...
David BarkerDirector of Application Security, GoodLeap LLCDavid Barker is Director of Application Security for GoodLeap LLC, a Fintech company providing a point-of-sale platform for sustainable home solutions. GoodLeap marks David’s fourth creation of a Code-to-Cloud Application Security program. His pedigree includes companies like Dell EMC, Stanley Black & Decker, and PTC. David has both an MBA an...
Richard BerthaoDirector, Cybersecurity Architecture, Draper Labs; Colonel, U.S. Army Reserve; President, New England Chapter, MCPARichard Berthao is the Director of Cybersecurity Architecture for Draper Laboratory. He previously served more than 20 years in the federal government. This service began with over 19 years as an IT Director in the Massachusetts National Guard, Department of Defense (DoD). He continued as a Cybersecurity Advisor for Connecticut & Massachusett...
Christopher ZellVP, Cyber Operations and Analysis, Dell TechnologiesChris is currently Vice President, Cyber Operations and Analysis, for Dell Technologies. In this role, Chris leads the strategy and optimization of Dell's Cyber Security Operations (CSIRT, eFI, Security Assurance and Vulnerability Management) globally. Prior to joining Dell, Chris served at the first CISO for the Wendy's company, where he spe...
Margaret WhiteSVP & BISO, Wells FargoMargaret White is currently Senior Vice President, Business Information Security Officer (BISO) for Wells Fargo’s Enterprise Functions. In this role, Margaret leads execution of cybersecurity posture and strategy for enterprise-wide cybersecurity engagements and provides bi-directional transparency to Enterprise Functions CEOs and CIOs. Prior...
Peter LiuTechnical Account Manager, QualysPeter Liu has been with Qualys in the Pre-Sales TAM role for over four years. He loves helping customers evaluate Qualys to make the decision to adopt Qualys as a security platform that allows you to tackle current security challenges such as vulnerability management or global IT asset management. Prior to Qualys, he spent six years in the di...
Kevin BrennanSpecial Agent, FBI, Seattle Field OfficeFBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.
Loris DegioanniCTO & Founder, SysdigLoris Degioanni is the Chief Technology Officer (CTO) and founder of Sysdig, the secure DevOps leader. He is also the creator of the popular open source troubleshooting tool, sysdig, and the open source container security tool, Falco. Prior to founding Sysdig, Loris co-created Wireshark, the open source network analyzer, which today has 20+ m...
Evan TegethoffVP of Solutions Consulting, BitSightEvan Tegethoff is Vice President of Solutions Consulting at BitSight. He previously held leadership roles in Risk and Compliance Practice Management at Optiv, Accuvant, and Forsythe Technologies. He has developed Third Party Risk approaches for numerous large organizations. Additionally, he led consulting teams focused on compliance, risk man...
Justin HenkelHead of CISO Center of Excellence, OneTrustJustin Henkel is an information security thought leader, subject matter expert, and Head of OneTrust's Security Center of Excellence. Justin has a proven track record planning, developing, building, and monitoring portfolios of work to secure IT infrastructure to meet federal and state cybersecurity standards, guidelines, and best practices. ...
Chuck BrooksCybersecurity influencer, author, presidential appointee, and Georgetown University cyber facultyNamed Top Tech Person To Follow by LinkedIn, Named Top 5 Cybersecurity Exec to Watch, Georgetown U Faculty, 2X Presidential Appointee, FORBES Contributor, Cybersecurity, Emerging Tech SME, Influencer
Nick OlmstedSr. Systems Engineer, Arctic WolfNick Olmsted is a senior systems engineer with Arctic Wolf who brings 19 years of experience architecting, implementing, and developing secure technology solutions for enterprises. Nick started his career as a developer learning how to develop secure applications for clients around the globe. He then moved into a systems engineer role to help...
Michael JohnsAssistant Special Agent in Charge, United States Secret ServiceMichael brings over 24 years of experience with the Secret Service that includes leadership roles both in the protective arena and investigative front. Currently, he leads the Secret Service's Outreach Program, focusing on private and public sector partner growth. He is also the Executive Director for the Secret Service's Cyber Investigative ...
Curtis BarkerField CTO; VP, Product and Solution Architecture, RezilionCurtis has spent the past 10 years in technical sales and product management. Prior to Rezilion, Curtis spent 6 years at Symantec to manage their emerging mobile security products and went on to lead the Symantec product portfolio in their Asia Pacific region based in Singapore. Curtis transferred to Symantec HQ in Mountain View, California i...
Michael GorelikCTO, MorphisecMorphisec CTO Michael Gorelik leads the malware research operation and sets technology strategy. He has extensive experience in the software industry and leading diverse cybersecurity software development projects. Prior to Morphisec, Michael was VP of R&D at MotionLogic GmbH, and previously served in senior leadership positions at Deutsche T...
Tom BowyerDirector of Security and IT, AutomoxTom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaki...
Greg MaplesPrincipal Security Architect, GigamonGreg Maples, CISSP, is Principal Security Architect for Gigamon. He has been involved in computer networking since his involvement in the original ARPANet project that became the Internet. He has been specializing in security protocols and web/DDOS issues for many years, and has more recently been focusing on threat detection in a Zero-Trust ...
Tim KeelerFounder & CEO, Remediant, Inc.Tim Keeler worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Tim moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences, and CardioDX. Tim is a GX-certified Secu...
Tom DixonSecurity Engineer, CorelightTom has 15 years of experience in the security industry, beginning his career as an Analyst at what is now the U.K. MOD Joint Cyber Unit. After seven years in the military, he left to join Sourcefire as a Security Engineer. Cisco acquired Sourcefire in 2013, and he joined a small global team working with Cisco's top 28 accounts, ultimately le...
Dan KaplanSolutions Engineer, OktaDan is a Solutions Engineer for Okta and aligns identity-related technical requirements to business outcomes for Okta US West commercial customers and prospects. He is an Okta-certified consultant and developer familiar with Zero Trust methods used by Okta's ecosystem of customers, partners, and prospects.
Jim JohnsonDirector of Systems Engineering, Arctic WolfJim Johnson has been working to end cybercrime for the past two decades. His career started at Blue Coat, where he helped customers with their struggles to mitigate risk in the early days of web filtering. Since then, he has worked with customers of all sizes and verticals providing solutions from F5, Forescout, and now Arctic Wolf. As the Di...
Maggie MacAlpineSecurity Strategist, CybereasonMaggie MacAlpine is a security strategist at Cybereason and one of the co-founders of the DEF CON Voting Village. Over the course of 10 years spent in the field of cybersecurity, MacAlpine has been a contributing researcher on the "Security Analysis of the Estonian Internet Voting System" in partnership with the University of Michigan, co-aut...
Steven H. AndersonDirector, Cyber Underwriting, Safety NationalSteve is a cyber liability product leader and underwriter with almost 30 years of experience in both the insurance and technology sectors. In his current role Steve helps drive premium growth through leading operations, product development and underwriting at Safety National. Steve previously served as Chief Underwriting Officer at Measured I...
Sean ScrantonConsultant, Cyber Risk Solutions Team, WTWCyber Liability National Practice Leader (current). IT Security / IT Auditor at RLI for eight years. Network / security consulting / auditor for financial institutions, government for nine years. Network / firewall administrator in healthcare for seven years. Designations: CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA.
Akshay KumarProduct Manager, Partners, PKWAREAkshay Kumar serves as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid de...
Steve KinmanField CISO, SnykSteve Kinman is a dedicated technology leader, with 20+ years of innovative, compliance-driven security strategy knowledge and the ability to deliver scalable, principle-based security and privacy programs focused on business requirements. Most recently, he led a security program transformation at Zalando SE in Berlin, Germany, joining as the...
Keith ChapmanCybersecurity Specialist, Infoscitex CorporationKeith has been a team lead for a security operations center, where he was a mentor and an incident response and threat intelligence subject matter expert and facilitated tabletop exercises. He currently works in a GRC role. He has the CISSP and Certified Threat Intelligence Analyst certifications. He also serves as a Cyber Teen Education chai...
Jasmine NoelSr. Product Marketing Manager, ReversingLabsJasmine Noel is Senior Product Marketing Manager at ReversingLabs. Her career began as an industry analyst covering IT technologies. She then founded Ptak, Noel & Associates to provide research and marketing services to Fortune500 and startup technology firms. Prior to ReversingLabs, Noel also held product marketing roles in growth companies,...
Travis DyePrincipal Solutions Architect, ArmisTravis Dye is a Principal Solutions Architect for Armis focusing on strategic customers with challenging security projects. His passion is to help organizations with large and complex network environments find effective, real-world approaches to improve their network security programs. Prior to his current role he worked with security teams t...
Eve MalerCTO, ForgeRockEve Maler is ForgeRock's CTO. She is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and h...
Adam MeyersSVP, Counter Adversary Operations, CrowdStrikeAs CrowdStrike’s Senior Vice President of Counter Adversary Operations, Adam Meyers leads the Threat Intelligence line of business for the company. Meyers directs a geographically dispersed team of cyber threat experts tracking criminal, state-sponsored, and nationalist cyber adversary groups across the globe and producing actionable intellig...
Krishna KsheerabdhiVP, Product Marketing, Encryption, Thales GroupKrishna has more than 25 years of experience leading Engineering and Business Strategy teams, including evaluating and integrating several key Thales acquisitions. Krishna has a Ph.D. in Computer Science and has worked on various topics, from compilers for supercomputers to operating systems for smart cards, leading skunkworks innovation proj...
Matt DowningDirector, Threat Hunting Operations, ReversingLabsMatt is Director of Threat Hunting Operations at ReversingLabs where he helps to operationalize the implementation of ReversingLabs tools and massive dataset to help make networks more secure. Matt is a dedicated blue teamer and threat hunter. Prior to his role at ReversingLabs, Matt held many roles supporting threat research and security ope...
Toby ZimmererSr. Demand and Delivery Director, Data ProtectionToby Zimmerer is a Senior Demand and Delivery Director in Optiv’s Data Governance, Privacy, and Protection practice, where he assists organizations with building programs and implementing solutions focused on protecting high value information and assets. He has more than 24 years of professional experience developing information security stra...
John M. WilkeSr. Product Marketing Manager, OktaJohn Wilke is a Senior Product Marketing Manager at Okta who is currently focused on aligning the impact of Okta's SaaS solutions with the core business goals of Okta's most strategic customers. He was previously responsible for the expansion of Okta's Business Value team for the West Coast and Asia Pacific regions.
Cory SutliffTechnical Director, AttackIQPractice Lead for Technical Account Management at AttackIQ. Cory has 20+ years' experience in IT focusing on security, seven+ years with the DoD. He has spent the last two years at AttackIQ delivering Security Optimization (BAS).
John PrewettPrincipal Engineer - Enterprise Security, UnitedHealth GroupJohn Prewett is a security technologist with over 20 years’ experience helping private sector, government agencies, and educational institutions identify risk and improve their security postures. John's latest passion is code writing, software engineering best practice, and otherwise improving the overall relationship between security practit...
Joey PeloquinPrincipal Cloud Architect, Sales Engineering, GigamonJoey Peloquin is an information and cyber security veteran, evolving over the years to specialize in multiple domains, including network, application, mobile, and for the last seven years, cloud security and architecture. Joey has held a variety of leadership roles over his career including security product ownership, head of consulting servi...
Matthew Alec AlvaradoSolutions Architect, Digital ShadowsAlec Alvarado has a unique blend of both private and public sector cyber threat intelligence (CTI) experience with 10 years serving in multiple all-source intelligence positions with the United States Army Reserve and 5 years in varying CTI positions with Digital Shadows. A career sparked by a discovered passion for intelligence analysis and ...
Bridget KravchenkoCISO, MeritorBridget Kravchenko is the Senior Director, Chief Information Security Officer for Meritor, responsible for information security, IT risk, and compliance globally. She has responsibility for developing a strategic security plan, security metrics, security programs, risk management, and incident response.
Bridget has served in a CISO or...
Laura ClarkCIO, State of MichiganLaura Clark serves as the chief information officer (CIO) for the State of Michigan, directing the state’s technology and security efforts. As deputy director for the Michigan Department of Technology, Management & Budget (DTMB), she also oversees operations for the department, which provides information technology, business, and administrati...
Karl BernardIT Security Architect, University of Texas Health Science Center at Houston (UTHealth)Karl Bernard, CISSP, is an IT Security Architect at UTHealth with 30 years of IT experience, with 20 years in Information Security. His experience runs the full gamut of IT Security: he has implemented new technologies, such as network monitoring products and web application firewalls; performed risk assessments; coordinated large DR tests; l...
Shafia ZubairManager, Information Security, MorningstarShafia is a Manager of Information Security at Morningstar, where she is responsible for the Information Security program management and governance. This requires working across security operations, threat intel, application security, compliance, and with the product teams to ensure secure, resilient, and recoverable applications. Prior to Mo...
Tim MackeyPrincipal Security Strategist, SynopsysTim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim appl...
Sam CurryVP & CISO, ZscalerSam Curry has over 25 years of IT security industry experience. Curry served as CTO and CSO at Arbor Networks, where he was responsible for the development and implementation of Arbor’s technology, security, and innovation roadmap. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior manageme...
Alex JonesInformation Security Manager, Cobalt.ioAlex Jones is an Information Security professional with eight plus years of direct security and compliance experience. He also has an extensive background in media, audio, and communications prior to working in the security field. He is currently the Information Security Manager for the leading Pentest as a Service Company, Cobalt.io. Prior t...
Jason RiveraDirector, Strategic Threat Advisory Group, CrowdStrikeJason Rivera has over 15 years of experience innovating at the intersection of security operations and technology. He was a former Intelligence Officer/Captain in the U.S. Army, had assignments with the National Security Agency (NSA) and U.S. Cyber Command (USCYBERCOM), and served in combat tours overseas. He has experience in the private sec...
Jeremy C. SheridanAssistant Director, Office of Investigations, United States Secret ServiceJeremy Sheridan is the Assistant Director of the Office of Investigations at the United States Secret Service. In this role, he leads more than 160 Secret Service field offices and directs the Secret Service's network of Cyber Fraud Task Forces (CFTFs) in their investigations of sophisticated computer and financial crimes. He also works to en...
Pascal GeenensGlobal Director, Threat Intelligence, RadwarePascal Geenens helps execute Radware's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of IT. As part of the Radware Security Research team, he develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, perfor...
Michael SchladtPrincipal Cybersecurity Researcher, General Electric Gas PowerMike Schladt, CISSP, GREM, is an information security researcher and engineer with over 12 years' experience performing malware analysis, reverse engineering, digital forensics, and incident response. Previous roles include leading malware analysis at the USAF National Air and Space Intelligence Center, as well as heading the development of e...
Deepthi MenonDirector of Information Security, Ambra HealthDeepthi Menon serves as Director of Information Security at Ambra Health. Ambra Health is an innovative software company that provides solutions for medical image sharing of DICOM and non-DICOM data between patients, physicians, and hospitals. Deepthi has more than 12 years of experience in information security. She has her Masters in Informa...
Eric C. BottsDirector, Global Cybersecurity Program, University of St. ThomasEric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a cours...
Andrew JarrettProgram Manager, Cyber Readiness Center, Texas A&M Engineering Extension ServiceAndrew Jarrett of the TEEX Cyber Readiness Center is a former firefighter, current member of a Type II/Type III Incident Management Team (IMT) and has recently been deployed as a member of Texas Division of Emergency Management (TDEM) Incident Support Teams (ISTs) for COVID response. As the Cyber Enterprise Program Manager at the TEEX CRC, he...
Russell DowdellDirector, Sales Engineering, SecureLinkFor nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations iden...
Marcus GwynSr. Federal Sales Engineer, SonicWallMarcus Gwyn has worked in cybersecurity sales for 10 years and in the Federal space for five of those years. He is the lead Sales Engineer on the SonicWall Federal team and has worked with Federal customers in Civilian, DOD, and Intel spaces. Marcus enjoys following trends in the threat landscape and learning more about cybersecurity. In his ...
Ryan WittVP, Industry Solutions, ProofpointRyan Witt is Proofpoint's VP, Industry Solutions, and responsible for the strategy and solutions for the company's healthcare and public sector business. Ryan is also the Chair of Proofpoint's Healthcare Advisory Board and an appointed member of HIMSS Cybersecurity, Privacy and Security Committee. Previously, Ryan was the healthcare leader fo...
Marina LiangSr. Security Engineer, AutomoxMarina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, tria...
James McGrilSecurity Solutions Architect, RadwareJames is a Security Solutions Architect and one of Radware’s thought leaders in Network and Application Security. He's been with Radware for nearly 10 years. James is a self-described geek and enjoys learning about application security and building web applications using the latest technologies. In his off time, James enjoys hiking, surfing, ...
Kevin WilsonSr. Product Manager, Area 1 SecurityThroughout his 14 years in cybersecurity, Kevin has been an Analyst and Engineer in various organizations, such as the U.S. Navy, First Data, and Lowe’s. Previously, he served as the Global Information Security Officer at Guess? Inc. and a Product Manager for McAfee.
Baseer BalazadehSr. Technical Marketing Engineer, GigamonBaseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor's degree in computer system networking engineering f...
Moderator: Joel CaminerSr. Director of Cybersecurity Education, NYU TandonJoel Caminer is the Director of Cybersecurity Education at NYU Tandon. Joel has 20+ years of experience in Financial Services, IT, and Consulting, and has led many strategic initiatives across the IT Risk and cybersecurity spectrum. He previously served as the Global Head of Technology Risk Management at TD Securities; VP of Information Risk ...
Liat KrawczykAVP, Emerging Tech, Cyber NYC, New York City Economic Development CorporationLiat Krawczyk is Assistant Vice President for Emerging Tech at the NYCEDC where she led the workforce arm of Cyber NYC, NYC's signature program to grow its cybersecurity ecosystem. She is also the founder and head of the women.nyc Childcare Innovation Lab. Prior to joining NYCEDC, Liat grew startups, social-enterprises, and innovation ecosyst...
Jim RouthPrivate Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and AetnaJim Routh serves as a security & risk advisor and Board member for several companies, and is the former CISO for MassMutual, CSO at Aetna, and Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and info...
Geoff BrownCISO, City of New York; Head of NYC Cyber CommandGeoff Brown was appointed Chief Information Security Officer for the City of New York in 2016, a position focused on cybersecurity and aggregate information risk across all 100+ NYC departments and agencies. In July 2017, Mayor de Blasio established New York City Cyber Command, led by Geoff and charged with setting Citywide cybersecurity poli...
Nasir MemonVice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of EngineeringNasir Memon is Vice Dean for Academics & Student Affairs, Head of Tandon Online, and a Professor of Computer Science at NYU Tandon. He introduced cybersecurity studies to NYU Tandon in 1999. He is co-founder of NYU's Center for Cyber Security (CCS) & the founder of the OSIRIS Lab, CSAW, and NYU Tandon Bridge & Cyber Fellows programs at NYU. H...
Tom RoehDirector, Systems Engineering - Public Sector Technical Practice, ExtraHopTom currently leads the ExtraHop Public Sector technical practice as Director of Systems Engineering. He has spent most of his 20-year career looking at networks, protocols, and packets in one way or another. Tom has a passion for utilizing data-driven techniques to solve the complex problems faced by modern IT practitioners. When he's not wo...
Moderator - Tina ThorstensonExecutive Public Sector Strategist, CrowdStrikeTina Thorstenson, Public Sector Strategist, sits on the Public Sector Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for Public Sector organizations across Federal, State and Local, Higher Education, and Healthcare. Just prior to joining CrowdStrike, she serv...
Jonathan EhretVice President, Strategy & Risk, RiskRecon, a Mastercard companyJonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.
Deborah WatsonResident CISO, ProofpointDeborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah led cybersecurity strategy programs for public and private sector organizations across the Fortune 1000....
Keval ShahSr. Sales Engineer, GigamonWith over 12 years of technical consulting and solution engineering experience in the field of Enterprise Networking & Security, Keval has enjoyed architecting and transforming businesses. Prior to Gigamon, Keval spent a decade at Cisco. He holds a Masters in Science, Electrical Engineering, from University of Southern California and a Master...
Sowmya KarmaliDirector, Product Management, CrowdStrikeSowmya Karmali is a Director of Product Management at CrowdStrike and is responsible for Falcon Horizon (CSPM) and Falcon Discover for Cloud. She has over 20 years of product development and management experience covering cloud, data, and IoT, and has worked in startups and large organizations. Prior to CrowdStrike, Sowmya held product leader...
Spencer ParkerSr. Director, Product Management, CrowdStrikeWith over 20 years of product management experience at Cisco, Websense, and most recently Sophos before joining CrowdStrike in 2017, Spencer has been instrumental in leading the Intel/Falcon X and Mobile solutions. Spencer holds a B.S. in Molecular Biology from the University of Portsmouth.
Naeem BabriPresident, ISSA KC ChapterNaeem Babri is a cybersecurity practitioner who works at T-Mobile, focusing on cyber risk assessments, information security, and cyber security controls. Naeem has worked in IT and cybersecurity for the last 20+ years. His expertise in information security, IT operations, and support has led to various roles at T-Mobile, formerly Sprint. His ...
Michael RasmussenDirector, ISSA InternationalMichael Rasmussen is an internationally recognized pundit on governance, risk management, and compliance (GRC). With 27+ years of experience, he helps organizations improve risk and compliance processes, design and implement GRC architecture, and select technologies that are effective, efficient, and agile. As a sought-after keynote speaker, ...
Igor SorkinSr. Solutions Engineer, OktaIgor is a 25-year Kansas City IT professional with background across Telecom, Fin-Tech, and Security Technology companies focusing on Software Development, Enterprise Architecture, Security, and Identity and Access Management. A member of Okta's Enterprise Solutions team since 2019, Igor has been helping companies in the Central region to vis...
Rich GuthCMO, CloudPassageRich has built a 25-year career in Silicon Valley bringing new B2B software technologies to market including Big Data, Analytics, Business Intelligence, Java development tools, interactive development environments. and web application servers. He has held sales, product management, product marketing, solutions marketing, partner marketing, GM...
Mike AsaroSr. Named Account Manager, ProofpointMike Asaro is an Insider Threat Management and DLP Specialist at Proofpoint. Before joining Proofpoint earlier this year, he spent almost 10 years with an industry leading traditional DLP vendor. Throughout his career in cybersecurity, he’s managed and supported many organizations in the Southwest region across multiple verticals. As a San Di...
Damian ChungSenior Director, Business Security Office, NetskopeDamian Chung is a cybersecurity leader with over ten years of security experience focused in healthcare. As the Business Information Security Officer at Netskope, Damian is responsible for overseeing corporate security tools and processes and acts as the subject matter expert in the healthcare vertical. He also serves as an adjunct professor ...
Prakash NagpalVP of Marketing, AppaegisPrakash Nagpal is VP of Marketing at Appaegis, where he is responsible for bringing the next generation of Zero Trust Secure Application Access solutions to market. His mission is to help customers realize the vision of securing applications and data without compromising user experience, with a Zero Trust application centric approach to secur...
Joel HollenbeckRegional Director, Security Engineering, Check Point Evangelist, Check Point Software TechnologiesJoel Hollenbeck is a Cyber Security Visionary with the Office of the CTO at Check Point Software Technologies Inc., the worldwide leader in securing the internet. His background includes over 20 years of experience deploying application protection and network-based security. Joel has been securing networks and systems since 1994, including de...
Steve Velazquez, CISSP, CISMSr. Solutions Engineer, OktaSteve is a Sr. Solutions Engineer at Okta helping enterprise customers with their identity and access management needs. In his previous life, Steve has served as a CISO / VP of Information Security, Data Center Manager, and held various Security, Windows, and Network Engineering roles.
Donovan StevensSolutions Engineer, SpyCloudDonovan is a Solutions Engineer at SpyCloud and has been in the tech industry since the mid nineties. He has worked in various industries and for companies ranging from start-ups to those listed in the Fortune 50. His career has taken him all over the world, including a four-year stint in South-Africa where he worked for the South-African gov...
Brian LinderEmerging Threats Cybersecurity Evangelist, Office of the CTO, Check Point Software TechnologiesBrian Linder is an Emerging Threats Expert and Evangelist in Check Point’s Office of the CTO, specializing in the Modern Secured Workforce. Brian has appeared multiple times on CNBC, FOX, ABC, NBC, CBS, and NPR Radio, and hosts Check Point’s CoffeeTalk Podcast and Weaponizers Underground, and has teamed on keynote CyberTalks at Check Point’s ...
Michael McGinnisSr. Sales Engineer, LogRhythmA Senior Sales Engineer for LogRhythm, Michael McGinnis has worked in IT Security for over 15 years, specializing in SIEM technology for the past 10. Michael’s experience began as a Security Architect for the largest hospital network in the Midwest where he developed and matured a security posture that is the framework used by many hospital s...
Kristen CooperDirector of Product Marketing, SiemplifyProduct marketing specialist with over 15 years of experience at emerging and growing cybersecurity and SaaS companies. Currently heading up product marketing at Siemplify. SecOps solution specialist. Remote work advocate.
Pedro VazquezDirector of Cybersecurity, Waddell & ReedAs the Director of Cyber Security for Waddell & Reed, Pedro is tasked with leading IR, SECOPS, Vulnerability Management, Security Automation, and IAM. Pedro has previously provided security services for the DoD, IRS, DST, and SS&C.
Jay BivensSr. Systems Engineer - GA, GigamonJay Bivens started his technology career working in IT stationed aboard the USS WASP (LHD-1) back in 1993. With a background expertise in email security and Advanced Threat Protection, his career spans several areas including Cloud Access Security Brokers, Web Application Firewalls, and Application Delivery Controllers. Jay has earned GIAC Ce...
Dave GoldField CTO, Americas, SentinelOneDave has more than 15 years experience in enterprise information security and brings a strong track record of innovation and customer focus to SentinelOne. Prior to SentinelOne, he was the VP of Product and VP of Solutions Architecture at ProtectWise and helped launch and build the company from stealth to a successful exit to Verizon. Dave he...
John WeilerChairman of the Board, CMMC Center of ExcellenceJohn Weiler is currently the CEO and CIO of a congressionally charted IT "do tank" called IT-AAC. He has forged partnerships with two dozen leading non-profits and federal agencies committed to the Digital Transformation of the federal IT sector.
He has 40 years of IT Management, Solution Engineering, and Architecture experiences, cove...
Ryan AlemanDirector, Solution Architect , ArmisRyan Aleman is a Director of Solutions Architect at Armis. In this role, Ryan is at the forefront of the developing landscape of unagentable devices. With an extensive background in security and technical environment management, Ryan has worked extensively to find passive, agentless security solutions in the medical, industrial, and IoT space...
John SwenssonEnterprise Customer Success Manager, CloudPassageJohn Swensson is the Customer Success Manager at CloudPassage and is responsible for all customer support initiatives. John’s information security career spans two decades and includes a broad number of business environments. John and the CloudPassage teams have worked together creating groundbreaking security solutions across a range of indu...
Harrison ParkerSolutions Architect, SiemplifyHarrison holds a Bachelor's in Computer Science from Harvard University.
Chris PinVP, Security and Privacy, PKWAREChris Pin serves as PKWARE’s VP, Security and Privacy. In this role, Chris drives value and awareness for all PKWARE customers regarding the various challenges that both privacy and security regulations bring to the data-driven world. He works closely with all customers and potential customers to help them better understand how PKWARE solutio...
Jose BarajasTechnical Director of NA, Sales Engineering, AttackIQJose Barajas is Technical Director, NA Sales Engineering AttackIQ. He has over a decade of experience as a security researcher reverse-engineering malware and developing security controls and analytics. At AttackIQ, he now focuses on improving security control efficacy through attacker behavior emulation and establishing continuous security v...
Christopher A. HartFormer Chairman, National Transportation Safety Board; Founder, Hart Solutions LLPChristopher A. Hart is the founder of Hart Solutions LLP, which specializes in improving safety in a variety of contexts, including the safety of automation in motor vehicles, workplace safety, and process safety in potentially hazardous industries.
Mr. Hart is also Chairman of the Washington Metrorail Safety Commission, a three-jurisd...
Bruno AlmeidaCloud Overlay Sales Engineer, GigamonBruno Almeida is a Sales Engineer at Gigamon, where he partners with customers to help them ensure continuous security and monitoring of cloud and data center services during their digital transformation journeys. He has over a decade of experience in the IT infrastructure space. Before joining Gigamon, Bruno worked for several firms in the m...
Crane HassoldDirector of Threat Intelligence, Abnormal SecurityCrane Hassold is the Director of Threat Intelligence at Abnormal Security, where he leads a team responsible for researching enterprise-focused cyber threats. Prior to joining the private sector in 2015, Crane served as an Analyst at the Federal Bureau of Investigation for more than 11 years, providing strategic and tactical analytical suppor...
Larry ChinskiVice President, Global IAM Strategy and Customer Advocacy, One IdentityLarry Chinski has over 20 years in the Identity and Access Management industry and travels globally to help complex organizations understand emerging trends, the current threat landscape, and how to leverage technology platforms to resolve issues related to cybersecurity as well as operational efficiency.
Todd BearmanVP, CISO, TE ConnectivityTodd Bearman is the Chief Information Security Officer for TE Connectivity with responsibility for Information Security globally across nearly 150 countries with 75,000 employees.
Todd is responsible for ensuring collaboration and risk management across the corporate functions and business units where he leverages his leadership, techn...
Mariana PereiraDirector, Email Security Products, DarktraceMariana is the Director of Email Security Products at Darktrace, with a primary focus on the capabilities of AI cyber defenses against email-borne attacks. Mariana works closely with the development, analyst, and marketing teams to advise technical and non-technical audiences on how best to augment cyber resilience within the email domain, an...
Chris ChristensenSr. Business Consultant, Cybersecurity, Honeywell Building SolutionsChris Christensen is the Cybersecurity Business Consultant for Honeywell Building Solutions (Americas) and specializes in securing Operational Technology (OT) and Industrial Control Systems (ICS) Chris passionately believes that cybersecurity is everyone's shared responsibility and through awareness, education, accountability and positive rei...
Alex KirkGlobal Principal Engineer, CorelightAlex Kirk is an open source security veteran, with a combined 17 years at Sourcefire, Cisco, Tenable, and now Corelight, where he serves as Global Principal for Suricata. Formerly a malware zookeeper and IDS signature writer, today he spends his time helping SOC analysts and advising on security policy for government agencies, universities, a...
Stephen GatesPrincipal Security SME, Horizon3.aiStephen Gates brings more than 15 years of information security experience to his role as Principal Security SME at Horizon3.ai. He is a subject matter expert with an extensive hands-on background in security and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and information that...
Tommy ToddVice President of Security, Code42Tommy Todd is Vice President of Security at Code42 with over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, Tommy served in security roles at Symantec, Ionic Security, and Optiv, as well as many other firms. Throughout his career, he has acted as a leader, mentor, engin...
C. Michael TracyDirector, Sales Engineering, SpyCloudAn experienced security architect, specializing in Identity Governance, Access Management, and Multi-Factor Authentication, C. Michael Tracy has over 20 years of diverse technology experience with roles at Microsoft, Wells Fargo Bank, HID Global, and DigitalPersona. At SpyCloud, C. Michael helps clients safeguard the identities of their emplo...
Scott ShackelfordCybersecurity Program Chair, Indiana UniversityProfessor Scott J. Shackelford serves on the faculty of Indiana University where he is Cybersecurity Program Chair along with being the Executive Director of the Ostrom Workshop. He is also an Affiliated Scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Soci...
Tina MeekerSr. Director, Information Security, Sleep NumberTina is currently the Sr. Director of Information Security at Sleep Number Corporation and has held executive cybersecurity leadership positions at Best Buy, Shutterfly, and Target Corporation. Tina holds a B.A. in Organizational Behavior from St. Scholastica and an MBA from Augsburg University. Tina also maintains active CISSP and CIPP/US ce...
Theodore PetersonDirector, Information Security, DatasiteTheodore Peterson, CISSP, has over 30 years of IT and Information Security experience. He has a BA from the University of Minnesota and an MBA from Augsburg College. He currently is the Director Information Security for Datasite.
Joseph CarsonChief Security Scientist & Advisory CISO, DelineaJoseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical i...
Piyali DasSr. Director, Information Security Risk Management, The College BoardPiyali Das has a proven 16-year track record of leading Information Security and Information Technology enterprise-wide initiatives. This includes success in risk-based prioritization of security initiatives and the resolution of complex issues cost effectively. She has also directed complex cross-functional projects across the enterprise res...
Brian CoulsonPrincipal Threat Research Engineer, LogRhythmAs Principal Threat Research Engineer in LogRhythm Labs, Brian works to keep abreast of current cyberthreats and news, develop threat detection and response content, and demonstrate how we detect and respond to threats. In this role, he regularly engages with the LogRhythm Community and offers advice and solutions to remediate common security...
Sajed NaseemCISO, New Jersey CourtsSajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters...
Erich KronSecurity Awareness Advocate, KnowBe4Erich Kron is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical i...
Mike StacySr. Director, Enterprise Security Strategy, ProofpointMike works with customers and oversees technical strategy for areas which include cloud security, advanced email defense, SOAR, browsing security, and SDP. Prior to joining Proofpoint, Mike held numerous technical leadership and product strategy roles across a variety of solutions.
Chris PoulinDirector, Technology & Strategy / Deputy CTO, BitSightChris is Director of Technology & Strategy, as well as the Deputy CTO, at BitSight Technologies, guiding enterprises in assessing risk metrics and managing third-party relationships. He's been in cybersecurity for over 35 years, in both technical roles as a developer for the DoD intelligence community, and in executive positions, such as CSO ...
Terry RaySVP, Strategy and Imperva Fellow, ImpervaTerry Ray is the SVP and Imperva Fellow for Imperva Inc. As a technology fellow, Terry supports all of Imperva’s business functions with his years of industry experience and expertise. Previously he served as Chief Technology Officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well ...
Sudeep VenkateshChief Product Officer, Egress Software Technologies LtdSudeep Venkatesh is a noted expert on data protection, bringing two decades of industry and technology experience in this area. His expertise spans the protection of data in both structured and unstructured data ecosystems, with an emphasis on solving real-world business problems through encryption, authentication and key management. He has a...
Jayson SalazarSr. Security Automation Engineer, GitLab Inc.Former software engineer and penetration tester, nowadays Sr. Security Automation Engineer at GitLab.
George J. SmithSr. Security Consultant, GigamonGeorge has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down ...
Meera RaoSr. Director, Product Management, SynopsysMs. Meera Rao is a Senior Director of Product Management, focusing on DevOps solutions at Synopsys, Inc. Ms. Meera has over 20 years of experience in software development organizations in a variety of roles including Architect, Lead Developer, and Project Manager, and Security Architect. Ms. Meera has been working as a trusted adviser to Fort...
Morgan WrightChief Security Advisor, SentinelOneMorgan is an internationally recognized expert on cybersecurity strategy, cyberterrorism, national security and intelligence. He currently serves as Chief Security Advisor for SentinelOne, Senior Fellow at The Center for Digital Government, and is the chief technology analyst for Fox News and Fox Business. Morgan's landmark testimony before C...
Belinda Enoma, CIPP/USPrivacy and Cybersecurity Specialist, Author, Speaker, and StrategistBelinda Enoma is a privacy and cybersecurity consultant with a legal and technology background. She offers virtual privacy and cybersecurity services including risk mitigation solutions and building privacy programs from scratch. She is a writer, corporate trainer, lifestyle strategist, mentor, and coach to women in the cybersecurity and data...
Roger A. GrimesData-Driven Defense Evangelist, KnowBe4Roger A. Grimes is a Data-Driven Defense Evangelist at KnowBe4. He is a 35-year plus computer security professional, author of 14 books and over 1,400 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. He is the author of the Ransomwar...
Nimmy ReichenbergCMO, SiemplifyNimmy Reichenberg oversees strategy and marketing for Siemplify, the leading independent provider of Security Orchestration, Automation, and Response (SOAR). A cybersecurity industry veteran, Nimmy has more than 15 years of experience helping enterprises around the world tackle their security challenges. Nimmy started his careers as a securit...
Riley BruceSecurity Community Evangelist, Manager, Code42Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with...
Justin WynnSr. Security Consultant, CoalfireAs a Senior Security Consultant, Justin Wynn is responsible for actively compromising and reporting on virtual environments typically encountered at Fortune 500 companies. Justin performs wireless, physical, red team and social engineering engagements. Justin also conducts research to include the production of open-source models for printing/...
Gary DeMercurioDirecting, Center of Excellence for Red Team, Social Engineering, and Physical Penetration Testing, CoalfireGary DeMercurio runs one of the largest groups in Coalfire Labs as a Director, where he leads Coalfire’s “Center of Excellence” for Red Teaming, Social Engineering and Physical Penetration. At Coalfire, Gary manages day-to-day business involved with FedRAMP, PCI, HIPPA, and penetration testing, while helping to spearhead the physical and soci...
Amber VanderburgFounder, The Pathwayz GroupAmber Vanderburg is a multi award winning international businessperson, keynote speaker, and founder of The Pathwayz Group. In 2016, she left her job in corporate HR to become the only female, only American, and only blonde Academy elite football coach for the Adidas Gameday Academy/Paris Saint Germain Academy in Bangalore, India. She worked ...
Brian VecciField CTO, VaronisAs Field CTO at Varonis, Brian supports a wide range of security and technology initiatives by helping Varonis’ customers and partner get the most out of the company’s products. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecuri...
Dave PresuhnSr. Security Engineer, Boston ScientificDave has been working in IT since the last millennium. In his current role, he manages the device management system for medical devices. He has worked primarily in healthcare throughout his IT career.
Brian AndersonDirector of Technology, Office of the CTO, ImpervaBrian Anderson has over 16 years' experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactiona...
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serve...
Mark SangsterVice President and Industry Security Strategist, eSentireMark Sangster is the author of "NO SAFE HARBOR: The Inside Truth About Cybercrime and How to Protect Your Business." He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference, and author on various subjects related to cybersecurity. His thought provoking work and per...
Jason GeorgiGlobal Field CTO, Prisma Access, Palo Alto NetworksJason is an accomplished technology executive with over 25 years of experience driving innovation and transformation initiatives across global organizations. Jason collaborates with CIOs, CTOs, and other technology leaders on strategies aimed at enabling business outcomes.
Jason is currently the Global Field Chief Technology Officer fo...
Eric BodkinDirector, Endpoint Recovery Services, CrowdStrikeEric Bodkin leads the delivery of Endpoint Recovery Services for CrowdStrike. Based out of the greater Denver area, Eric leads service engagements focused on the rapid recovery and remediation of endpoints in response to a cyber incident. Eric has more than 15 years of experience in incident response, forensic investigation, cybersecurity ope...
Jonathan EchavarriaEnterprise Architect, ReliaQuestJonathan Echavarria is an Enterprise Architect at ReliaQuest that has spent his career building and breaking a variety of environments. In his current role, Echavarria leverages this experience to orchestrate business strategy alignment with technological enablement. During his time at ReliaQuest, Jonathan has held various positions with resp...
Chris PittmanSenior Manager, Sales Engineering, BlackBerryChris Pittman has worked in enterprise information technology since 1993 and has specialized in cyber security for the last 14 years. He worked in security and controls and incident response for the Ford Motor Company before moving to the security vendor space in 2008. As a sales engineer at BlackBerry Cylance, he provides technical and secur...
Rori PerkinsSenior Manager, InfoSec Awareness and Analytics, Columbia SportswearRori is an expert in organizational change management with a focus on security awareness and driving human behavior.
Brennan O'BrienDirector, Information Security, Risk & Compliance, Columbia SportswearBrennan is the head of Information Security for Columbia Sportswear Company and a 20-year veteran of cybersecurity in verticals including apparel, logistics, healthcare, and financial services.
Paul RichExecutive Director, Data Management & Protection, JPMorgan ChasePaul Rich joined JPMorgan Chase & Co. in 2019 as Executive Director, Data Management & Protection, with the mission of tackling the management of all unstructured data within the company. Paul is passionate about data security, privacy, principle-based design and goal-setting, and has over thirty years of technology experience. During the mor...
Mike DeNapoliSr. Solution Architect, CymulateMike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners k...
Nigel ThompsonVice President, Solutions Marketing, BlackBerryNigel Thompson is responsible for the product position and messaging of BlackBerry® Spark. He is a regular thought leadership speaker, experienced on topics impacting governments and businesses worldwide, including cybersecurity trends, workflow reformation and harnessing IoT to accelerate digital transformation.
As BlackBerry has tr...
Jeremiah SahlbergManaging Director - Federal, Third Party Risk, TevoraJeremiah Sahlberg has more than 20 years of security experience. Sahlberg is an executive security consultant and advises clients on establishing security programs and compliance management. He holds CISSP, CISM, PCI QSA and HITRUST certifications.
Previously, Sahlberg held the Senior Director of Protect Operations at NBCUniversal a...
David HawkinsDirector, Consulting Engineer, BitSightDavid Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.
On the Info...
Sherry CallahanCISO, Dairy Farmers of AmericaSherry's management career over the last 20 years has spanned multiple IT service areas including information security, infrastructure support, customer support, and disaster recovery\continuity. Perhaps her proudest accomplishments are the programs and teams that she has built from the ground up and the large-scale projects that she has mana...
Brian RobisonChief Evangelist , CorelliumBrian boasts over 25 years of cybersecurity expertise, blending marketing acumen with captivating speaking prowess. As Chief Evangelist & VP Product Marketing at Corellium, he leads evangelism, thought leadership, and product marketing. Formerly, as VP Solutions Strategy at BlackBerry/Cylance, Brian hosted dynamic Hacking Exposed events, unve...
Israel BarakCISO, CybereasonIsrael Barak, Chief Information Security Officer at Cybereason, is a cyber defense and warfare expert with a background developing cyber warfare infrastructure and proprietary technologies, including that of proprietary cryptographic solutions, research and analysis of security vulnerabilities. Israel has spent years training new personnel, p...
Kevin BocekVP, Security Strategy & Threat Intelligence, VenafiKevin Bocek is a leading subject matter expert in machine identity protection. With more than 16 years in the IT security industry, Kevin has been featured in The Wall Street Journal, The New York Times and The Washington Post, among many others. Before joining Venafi in 2012, Kevin spent almost two decades working for several leading IT secu...
Katrina WattsCyber Security Threat Analyst, Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC)Katrina Watts works as a Threat Analyst with the ONG-ISAC and focuses on curating and sharing qualitative intelligence related to cyber threats to the oil and natural gas supply chain. Prior to joining the ONG-ISAC, Katrina worked as an Incident Response Analyst for a mid-size corporation and separately as a contractor. Additionally, Katrina ...
Travis HerrmannInformation Security Advisor, Devon Energy CorporationTravis has been with Devon Energy for 20 years, being a pioneering member of the Information Security team. Currently, Travis supports the Incident Response, Hunt, and Intelligence functions at Devon, serves on the ONG-ISAC Information Sharing committee, and holds multiple industry security certifications.
Dr. Shaneé DawkinsComputer Scientist, Visualization and Usability Group, National Institute of Standards and Technology (NIST)Dr. Shaneé Dawkins is a Computer Scientist in the Visualization and Usability Group at the National Institute of Standards and Technology (NIST). She performs research focusing on human centered design and leads the NIST Phish Scale research effort. Shaneé received her M.S. and Ph.D. in Computer Science at Auburn University, and B.S. in Compu...
Ansh PatnaikChief Product Officer, CyCognitoAnsh Patnaik, Chief Product Officer, has over 20 years of cross functional experience in cybersecurity and data analytics. Most recently, Ansh was Director, Cloud Security Products for Google Cloud Platform, and Chief Product Officer for Chronicle, prior to the acquisition of Chronicle by Google. Previously, he was VP of Product Management at...
Adam GatesChannel Sales Engineer, CybereasonWith over 25 years of experience in technology, Adam Gates serves as a technical member of Cybereason Sales Engineering Team providing support for customers and partners in North America. Prior to Cybereason, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, Malwarebytes, and Mimecas...
Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Data Privacy & Cybersecurity, Clark Hill LawMyriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy l...
Stuart WagnerSr. Director, IT Security & Compliance at Enterprise Products, Chairman, ONG-ISACStuart served as a Board Member of ONG-ISAC for over five years and became Chairman in June 2018. He has attended the FBI CISO Academy, has served as President of the award-winning South Texas Chapter of the Information Systems Security Association (ISSA), and is a member of ISACA and InfraGard. Stuart has developed and led information securi...
Angela HaunExecutive Director, ONG-ISACAngela Haun became the Executive Director of the Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC) in September 2018. Ms. Haun joined the ISAC after a 20-year career as a Special Agent with the FBI. She brought extensive experience in cybersecurity and protecting critical assets from her work at the FBI, along with her le...
Brad BeutlichVice President, Western and LATAM Sales, EntrustBrad Beutlich is an information security professional who has worked with numerous U.S. based companies over the past 20 years, providing security solutions ranging from end-point to data security. The last 13 years, he has worked for Entrust providing security solutions that protect customer data, financial transactions, and IoT device manuf...
Sivan TehilaDirector of Solution Architecture, Perimeter 81Sivan Tehila is the Director of Solution Architecture at Perimeter 81, a leading Secure Access Service Edge (SASE) provider, and a cybersecurity expert with over 14 years of industry experience. Sivan served in the IDF as an Intelligence Officer and then in various field positions, including Information Security Officer, CISO of the Research ...
Christopher HassDirector of Information Security and Research, AutomoxChris Hass is an extremely driven and proven information security professional with extensive experience in Malware Reverse Engineering, Threat Intelligence, and Offensive Security Operations. In his current role, Chris serves as Director of Information Security and Research at Automox. In addition to being a former cybersecurity analyst for ...
Julia VooCyber Fellow, Harvard Kennedy School, Belfer Center for Science and International AffairsJulia Voo is a Cyber Fellow and leads the team behind Belfer's National Cyber Power Index. She was formerly the Research Director for the China Cyber Policy Initiative.
Her areas of research concern geotech strategy including the Digital Silk Road, industrial policy, and technical standards for strategic technologies.
Voo has re...
Tony AnscombeChief Security Evangelist, ESETTony Anscombe is Global Security Evangelist and Industry Partnerships Ambassador for EST, where he serves to increase ESET’s public awareness initiatives and strengthen relationships with new and existing partners.
Anscombe joined ESET from Avast (which acquired his former employer AVG) where he held the title of Senior Security Evange...
Tom UtleySr. Presales Systems Engineer, Arctic WolfTom Utley is a senior presales systems engineer with Arctic Wolf Networks based out of the Charlotte area. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer and solution archite...
Allan LiskaSr. Security Architect, Recorded FutureAllan Liska is a senior security architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security pos...
Richard MelickSr. Technical Product Marketing Manager, AutomoxRichard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.
Etay MaorChief Security Officer, IntSightsEtay Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in...
Gina ScintaSr. Solutions Architect, ThalesGina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the IT profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data usin...
Rick HollandCISO and VP of Strategy, Digital ShadowsRick has more than 15 years' experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently co-chair ...
Chris GoettlSr. Director, Product Management, IvantiChris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events...
Lee PsinakisCloud Security Sales Specialist, Check Point Software TechnologiesLee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.
Before joining Check Point, Lee held Sales, Management and Business...
Eric SkinnerVP, Strategy, Trend MicroEric Skinner is VP of Market Strategy at Trend Micro, helping shape Trend’s solution offerings, growth plans and go-to-market approach. Previously at Trend Micro, Eric has been responsible for global product marketing. Prior to Trend Micro, Eric held senior management positions in a health care mobile startup and at digital identity solutions...
Tim O'ConnorManager of Knowledge Services, Cadre Information SecurityTim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including PCI-QSA, CISA, CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written...
James EllisDetective First Lieutenant, Commander, Michigan Cyber Command Center (MC3), Michigan State PoliceDetective First Lieutenant Jim Ellis is the commander of the Michigan State Police Cyber Section within the Intelligence Operations Division. He leads a cyber team of 56 MSP members located at 7 offices throughout Michigan. He has oversight over the Michigan Cyber Command Center (MC3), Computer Crimes Unit (CCU), and the Michigan region of th...
Edward RobertsDirector of Product Marketing, ImpervaEdward Roberts leads Product Marketing for Imperva Advanced Bot Protection. Prior to Imperva he led marketing at Distil Networks and has over twenty years of experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Softw...
Ran RosinDirector, Product Management, ImpervaRan Rosin Joined Imperva two years ago and is currently leading the Cloud Data Security solution. Prior to joining Imperva, Ran founded and lead two start-ups in the area of mobile Application and IoT.
Phillip WylieLead Curriculum Developer, Point3 FederalPhillip Wylie is the Lead Curriculum Developer for Point3 Federal, Adjunct Instructor at Dallas College, and The Pwn School Project founder. With over 22 years of experience, he has spent the last eight plus years as a pentester. His passion for mentoring and education inspired him to start teaching and to found The Pwn School Project, a bi-m...
Tod BeardsleyDirector of Research, Rapid7Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, ...
Glenn KapetanskyChief Security Officer & Technology Lead, Trexin GroupGlenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...
Eric WolffSr. Product Marketing Manager, Cloud and App-layer Data Protection, Thales Cloud SecurityEric Wolff is a Senior Product Marketing Manager for Thales application-layer data protection and solutions for public cloud security. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications, a...
Kelsey NelsonSr. Product Marketing Manager, OktaKelsey Nelson is a Senior Product Marketing Manager at Okta, leading workforce IT and security solutions, including getting beyond the buzzword of "Zero Trust." Prior to joining Okta, she led product and business communications at tech startups varying from enterprise software to edtech to consumer music hardware, and prior to that taught sec...
David MassonDirector of Enterprise Security, DarktraceDavid Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various u...
Susan HansonVice President, Human Resources, Provation MedicalSusan has over 20 years of healthcare experience in Human Resources and Compliance. Susan joined the Provation team in 2017 and brings her experience of building and growing high-performing teams with a dynamic, results-oriented culture and strong leadership. Susan also has experience in healthcare compliance specifically in HIPAA and HITECH ...
Paul LanziCo-Founder & COO, RemediantPaul Lanzi, is the co-founder and COO of Remediant. Remediant is a cybersecurity startup focused on delivering a new approach Privileged Access Management. Paul and his co-founder at Remediant, Tim Keeler, worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At eac...
Adam WaltmanSr. Sales Engineer, MalwarebytesAdam has over 20 years of experience in technology and serves as a senior technical member of the Malwarebytes field sales organization, providing expertise to customers in the Eastern U.S. Prior to joining Malwarebytes almost 5 years ago, Adam’s travels took him from various operational roles to other pre-sales engineering roles with Symante...
Eddie DoyleGlobal Security Strategist, Check Point Software TechnologiesEddie Doyle works with enterprise organizations, university think tanks and corporate leaders to articulate the complex subject of cyber security in an engaging manner, championing his customer’s initiatives to fruition and finding the holy grail of cyber security… making cyber a profit center for the business.
LinkedIn recognizes Eddi...
Tom BrennanCIO, Mandelbaum Barrett PCTom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrast...
Andre AlvesCloud Security Architect, Trend MicroAndre Alves has been helping companies to achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a certified AWS Solutions Architect and Hybrid Cloud Security trainer.
Nathan WenzlerChief Security Strategist, Tenable, Inc.Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing, and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new ...
Gurinder BhattiPrincipal Global Security Strategist, OktaGurinder Bhatti is a Principal Global Security Strategist for Okta's pre-sales field teams. In his current role, he works with both customers and prospects in helping them understand the value proposition of Identity as a security strategy. Prior to Okta, Gurinder was an AVP of Cyber Security engineering at Moody’s and implemented numerous se...
Mike LloydCTO, RedSeal NetworksDr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-...
Mark OstrowskiHead of Engineering, East US, Check Point Software TechnologiesMark Ostrowski is the Head of Engineering for the East region of US at Check Point Software Technologies. Mark has over 25 years’ experience in IT security and has helped design and support some of the largest security environments in the country. As an evangelist and member of the Office of the CTO at Check Point Software, Mark provides thou...
Davitt J. PotterDirector, MSSP and Channels, Americas, Digital ShadowsBorn and raised in the Black Hills of South Dakota, Davitt has over 25 years of experience in the OEM, VAR & MSSP channels realm. From starting as a field services engineer fresh from school at the South Dakota School of Mines and Technology, and eventually defining and managing IT operations and strategy for numerous companies in a CTO capac...
Michael LopezDirector of Cloud Services, AccessIT GroupMike Lopez, Director of Cloud Services at AccessIT Group, has a history of designing cloud architecture with a security focused approach for government and fortune 500 clients. He has worked with private and public cloud environments including AWS, Azure, Oracle, and Google Cloud. Mike leads AccessIT Group’s Cloud practice by helping its cust...
Gillian LockwoodEnterprise Information Security Program Administration and Governance, Partners HealthcareBrian CareyManager, Advisory Services, Rapid7Brian Carey is a Rapid7 Manager of Advisory Consulting, specializing in: Security Program Assessments, Security Program Development, Risk Management, Vulnerability Management Program Development, Security Awareness and Policy Development. Before joining Rapid7 Brian was Information Security Director and interim Security Officer at LafargeHolc...
Adam WinnProduct Manager, Cisco Umbrella, CiscoAdam Winn is the platform product management lead for Cisco Umbrella. He got into cloud security product management in 2013 and never looked back. In 2016, he joined OpenDNS shortly before it was rebranded as Cisco Umbrella. He is a life-long California resident and a fan of live music (and can't wait for it to come back).
Yuk Fai ChanCo-Leader, OWASP Toronto ChapterYuk Fai Chan is Co-Leader of the OWASP Toronto chapter, where he actively promotes software security within the Toronto community. Professionally, Yuk Fai is a Co-Founder at Proack Security Inc., a Toronto-based information security consulting firm. He specializes in application security, penetration testing, threat modelling, security incide...
Bobby ModhaSecurity Consultant, Security CompassBobby Modha is a Security Consultant with Security Compass. He specializes in security assessments in the application security space including web application, APIs and mobile app penetration testing. In his spare time, Bobby enjoys working on personal projects such as developing scripts and participating in capture-the-flags.
Jeremy CastlemanCloud Security Specialist, Check Point Software TechnologiesJeremy Castleman is the Cloud Security Specialist supporting the Cloud Team for Check Point Software Technologies. Jeremy brings 15 years of experience in technology sales, marketing, business development and cloud migration services in the partner ecosystem. He has worked in multiple countries around the world, in various markets, and across...
Achint SehgalGlobal Head of Solutions Engineering, OneTrustAchint Sehgal, CIPP/E, CIPM, serves as a Global Head of Solutions Engineering for OneTrust Vendorpedia—a purpose-built software designed to operationalize third-party risk management. In his role, Sehgal advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, fra...
Robert WongExecutive Vice-President, Chief Information Officer, Toronto HydroRobert Wong is EVP & CIO at Toronto Hydro, responsible for information technology, operational technology, cyber security, and telecommunications. Robert was also Chief Risk Officer, responsible for corporate enterprise risk management, strategic planning, corporate governance, and business continuity.
Robert is on the Board of Directo...Lois TulloExecutive in Residence, Global Risk Institute; CFRO/CCO, Novera Capital, Risk Management Faculty, Schulich School of Business, York UniversityGuidePoint Security RepresentativeNick RitterCISO, First Financial BankNick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost...
James GoepelTreasurer and Member, Board of Directors, Cybersecurity Maturity Model Certification (CMMC) Accreditation BodyJames Goepel is Treasurer and Member, Board of Directors for the CMMC-AB. He is also an adjunct professor of Cybersecurity at Drexel University and CEO of Fathom Cyber, a trusted agent for senior management and developer of defensible cybersecurity strategies. Jim earned his BSECE from Drexel and his JD and LLM degrees from George Mason Unive...
Edward EttorreOperational Risk Consultant, Wells FargoEd is an Operational Risk Consultant working within the Technology Information Security group. He has been with Toastmasters International (TMI) since 1997 and has multiple certifications from TMI. Ed is a resourceful, creative, and solution-oriented person who was frequently able to come up with new and innovative approaches to his assigned ...
Devon CampbellDigital Forensic Examiner, TransPerfect Legal SolutionsDevon Campbell is a Digital Forensic Examiner at TransPerfect Legal Solutions in the Forensic Technology and Consulting division. Devon has experience conducting forensic examinations of mobile devices, computers, social media data, cloud-based data, and email data. Prior to joining TransPerfect Legal Solutions, Devon earned her Master's degr...
Christina GriffinIT Security and Risk Manager, Chatham FinancialCybersecurity professional specializing in risk management and information security. She holds an MBA, a master’s in information technology leadership, and also has a CISSP certification. She has professional experience working in both higher education and finance industries and is currently employed as an IT Risk and Security Manager at Chat...
Tedrick HoushPartner, Lathrop GPM LLPTedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the ...
Steve HengeliAttorney at Law, PolsinelliWith a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technolog...
Nan L. GrubeConsulting Attorney, PBL ConsultingOwner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandabl...
Scott Laliberte, ModeratorPresident, ISSA Delaware Valley ChapterScott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Scott also leads Protiviti’s Emerging Technology practice where he enables clients to leve...
Jason PatelChief Technology Officer, EnsightenAs Chief Technology Officer Jason leads the Product and Engineering teams at Ensighten. Being part of Ensighten’s development team over six years ago when the Tag Management Platform was first designed gives him a unique perspective and experience on all our solutions; he has hence been influential in designing and implementing the majority o...
Sunny NotaniSpecial Agent, United States Secret ServiceSunny Notani has worked as a Special Agent for the United States Secret Service for 18 years. SA Notani was initially assigned to the New York Field Office (NYFO) for eight years. During his time in the NYFO, SA Notani specialized in Financial Institution Fraud, Electronic Crimes, Network Intrusions, and Social Engineering. SA Notani was assi...
Steve MagowanDirector, Data Protection and Resiliency, Royal Bank of CanadaSteve Magowan is Director of Data Protection with the Royal Bank of Canada. A Veteran of the Canadian Airforce, since retiring Steve has spent the past 20 years engaged in a wide assortment of Risk Focused, Data Protection, Security Architecture & Enterprise Risk Management initiatives.
Including the remediation of active security...
MJ CouldridgeDirector, Business Development, Canadian Cyber Threat ExchangeMJ Couldridge is the Director of Business Development for the Canadian Cyber Threat Exchange. The CCTX is Canada’s threat sharing hub for all companies doing business in Canada. It provides analysis and enables collaboration of cyber security insights impacting Canada. Providing both a cross-industry and by-industry context, it serves small, ...
Sabrina StanichCybersecurity Manager, DarktraceSabrina Stanich is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from financial services to manufacturing, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting an...
Will MishraCybersecurity Manager, DarktraceWill Mishra is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autono...
Taylor LehmannCISO, athenahealthTaylor Lehmann is the VP and Chief Information Security Officer at athenahealth, a healthcare information technology organization with headquarters in Watertown, MA and operations around the world. Taylor has been in information security and risk management for over 15 years. He was most recently the CISO at Wellforce, an eastern MA-based, Tu...
Myles KellermanChief Cybersecurity Analyst, Alpine SecurityMyles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many ...
Lauren ProvostProfessor, Computer Science, Western Governors UniversityDr. Lauren E. Provost is an ethical hacker, author and professor. She directs The Ethical Hackers Cybersecurity organization, a virtual community for educators and industry providing comprehensive planning and risk management updates, network and cloud security knowledge and information on other cybersecurity topics such as general penetratio...
Sam RastogiProduct Marketing Director, IllumioSam Rastogi is a veteran of the security industry with 18+ years experience marketing leading security products at Illumio, Palo Alto Networks, Cisco Systems, HP Enterprise, McAfee, Juniper Networks, and Oracle. Sam is a Product Marketing Director at Illumio, where he is responsible for leading go-to-market and marketing activities for zero t...
Leland DeanVP, Global Corporate Security, Bank of New York MellonLeland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).
Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal ...
Torry CrassAgency CISO, North Carolina State Board of ElectionsTorry Crass currently serves as the Agency CISO at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.
Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry was a CI...
Brian NeesbyCIO, N.C. State Board of ElectionsBrian Neesby is the CIO of the State Board of Elections. Prior to this role, he was the Chief Data Officer. Brian has served as a fact witness, been deposed several times, and executed declarations on behalf of the State Board concerning his knowledge of North Carolina’s Statewide Voter Registration Database. He investigated data discrepanc...
Michael DickersonDirector, Mecklenburg County Board of ElectionsMichael Dickerson is currently the Director of Elections for Mecklenburg County and has held this position since 1998.
Prior to coming to Charlotte, Mr. Dickerson was with the Federal Election Commission as a Deputy Assistant Staff Director. Mr. Dickerson spent 14 years at the Federal Election Commission.Currently he is a membe...
Karen Brinson BellExecutive Director, N.C. State Board of ElectionsKaren Brinson Bell has served as executive director of the North Carolina State Board of Elections since June 2019. She has worked in elections administration since 2006 in county, state, and national roles. As North Carolina’s chief elections official, she leads about 65 full-time employees at the state agency, which is charged with administ...
Patrick GannonPublic Information Officer, N.C. State Board of ElectionsPatrick Gannon is the public information director at the State Board of Elections. He has served in this role since since October 2016, just before the presidential election. His responsibilities include managing the State Board website, drafting press releases and social media content, responding to public records requests, and answering que...
Boris VishnevskyBoard Member and Technology Strategist, Cloud Security Alliance - Delaware Valley (CSA-DV)Boris Vishnevsky, MBA, CISSP, DIA is a board member and advisor of the Cloud Security Alliance- Delaware Valley Chapter, Distinguished IT Architect of the Open Group and is a frequent speaker and presenter, taking part in review panels and advising innovative Cyber Security Companies. Mr. Vishnevsky is a solutions principal advising companie...
Marc TabagoSolutions Engineer, Trend MicroAs a Solutions Engineer, Marc Tabago works with enterprises to solidify and strengthen their digital security policies against malicious threat actors. However, he believes that having a concrete digital security posture starts at the use case level, driven and experienced by its users and not simply read off a PowerPoint slide. Once the dust...
Justin BourgeoisSales Engineer, MimecastJustin Bourgeois is a Solution Engineer at Mimecast. He has a background in implementation project management, IT consulting and has spent his off time programming as a hobby. Justin’s main responsibility is educating people about the ever-evolving threat landscape that not only threatens their infrastructure but also their partners and the g...
Joe ZurbaCISO, Harvard Medical SchoolIn his role as the leader of Information Security at Harvard Medical School, Joe Zurba has been responsible for defining and building capabilities to meet the requirements of an extraordinarily diverse community of clinical and research faculty, students, and staff. Joe develops strategy, improves capabilities, and manages risk for all inform...
Michael AnayaSupervisory Special Agent, Cyber, FBI (Prior)Michael is the Head of Cyber Risk at Expanse (one of Forbes' 25 fastest-growing venture-backed startups likely to reach a $1 billion valuation). He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies' and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent...
Tony HowlettCISO, SecureLinkTony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP and GNSA certifications, and a B.B.A in Management Information Systems. Tony is curre...
Ian WoolleyChief Revenue Officer, EnsightenIan’s impressive background and management expertise in digital marketing and advertising are fueling his success in driving adoption of Ensighten’s solutions worldwide. Ian started his career at Dun & Bradstreet Europe before working at Interpublic Group’s Draft Digital as Managing Director. After building his own premium publisher business,...
Samara WilliamsThreat Intel Engineer, Cardinal HealthSamara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about ...
Melisa OzcanCybersecurity Account Executive, DarktraceMelisa Ozcan is a Cyber Security Account Executive at Darktrace, the world’s leading AI company for cyber defense. At Darktrace, Melisa works with leading organizations in a range of industries from private equity to media and entertainment to deploy and operationalize cutting edge technologies. During Melisa’s tenure at Darktrace, the compan...
Kelley MisataCEO, Sightline SecurityDr. Kelley Misata, CEO of Sightline Security, President and Executive Director of OISF (Suricata), and former Director of Communication of The Tor Project - a cyber and information security executive with 15+ years of experience in cyber and information security, marketing, and communications. Expert in bridging the gap between technical and ...
Sergeant Michael DavisCyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center UnitSgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Ho...
Michael ButterfieldRegional Architect - Mid-Atlantic, Check Point Software TechnologiesMichael Butterfield is Security Architect at Check Point, where he supports 30+ engineering teams responsible for hundreds of customers across the Mid-Atlantic. He is primarily focused on helping enterprises design, consolidate, and integrate security controls into emerging technology platforms. Over an 18-year career in cybersecurity, Michae...
Andrew HooverSr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon UniversityAndrew Hoover is a Senior Engineer with the CERT Division of Carnegie Mellon University’s Software Engineering Institute. As a member of the Cybersecurity Assurance Team, he performs risk and resilience management work for a variety of organizations, mostly relating to critical infrastructure protection. Andrew has 16 years of experience in i...
Katie StewartSr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon UniversityKatie Stewart is a senior member of the technical staff within the CERT® Division at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. She has more than 15 years of experience advising clients in engineering, information technology, and telecommunications industries. Katie’s current research int...
Juan MarinSales Engineer Manager, IntSightsA cybersecurity professional and avid technologist advocate with 10 years of experience in effective cyber-security practices, advanced threat prevention, malware and incident response; Juan has worked with the likes of McAfee/Intel Security and Trend Micro in the past, fulfilling technical sales, advisory and customer success roles, and toda...
John AmaralHead of Product, Cloud Security, CiscoJohn Amaral is the Head of Product for Cisco Cloud Security. In this role, he is responsible for product management, planning and strategy for Cisco's leading cloud security offerings including Cisco Umbrella and Cisco Cloudlock. John joined Cisco through the acquisition of Cloudlock, where he was Head of Product; responsible for product deve...
Stacy HarperPartner, Spencer Fane LLPStacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and ...
Rick DotenVP, Information Security, Centene CorporationRick is VP of Information Security at Centene Corporation and CISO of the Medicaid healthplan based in Charlotte, NC.
In his prior role, Rick worked as Virtual CISO supporting international companies. During that time Rick educated corporate boards, developed and matured security programs, and created the curriculum for a Cybersecuri...
Dr. Atefeh (Atty) MashatanFounder & Director, Cybersecurity Research Lab, Ryerson UniversityDr. Atefeh (Atty) Mashatan is the Founder and Director of the Cybersecurity Research Lab at Ryerson University. SC Magazine recognized her as one of top five Women of Influence in Security globally in 2019. She joined the School of Information Technology Management of Ryerson University in 2016 focusing on Information Systems Security, Crypto...
Rob DalzellBISO Team, Global Information Security, Bank of AmericaRob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awa...
Tammy Klotz, ModeratorCISO, TrinseoTammy Klotz is a vibrant and accomplished executive with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned...
Pete MurphyIT Advisory Executive, CareSourcePete Murphy is a well-established leader, builder and collaborator with high standards for personal integrity and a bias for action. He has demonstrated senior level leadership experience building, growing, improving and operating business systems and processes as a CIO, CTO, CISO, Risk Leader and Data and Analytics executive.
He speci...Joshua CloudDirector of Information Security, NFIJoshua Cloud is currently serving as the director of information security for NFI. He has over 20 years of infrastructure and security leadership experience spanning professional services, manufacturing, retail, and logistics industries in countries all over the world. Cloud is a transformational security leader with a business focus who evan...
Paul IhmeCo-Founder & President of Consulting Services, SoteriaPaul is an accomplished Security Professional with 14 years of experience in multiple information technology domains, specializing in computer network exploitation, computer network defense and security incident response. His expertise includes planning, coordinating and performing offensive computer operations.
Paul leads the firm’s ma...Douglas JamborSr. Cybersecurity Manager - IT Advisory, Dixon Hughes Goodman LLPDouglas has 13 years of penetration testing experience in the information technology field, focusing on information systems security and information security risk management. He is DHG’s cybersecurity subject leader and manager over all of the firm’s technical cybersecurity services, which includes internal, external, wireless and web applica...
Trend MicroKevin DreyerIT Director & CISO, Maple Reinders GroupKevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the...
Jana WhiteCOO, Alpine SecurityJana White is the Chief Operating Officer of Alpine Security. Jana has an extensive background in banking, compliance, and loss prevention and serves as one of the virtual CISOs for Alpine Security clients. Jana has degrees in criminal justice and cybersecurity and is certified as a crime scene evidence technician. She also holds many cyber...
Olivera ZatezaloChief Security Officer, Huawei CanadaOlivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada’s operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Olivera is best known for creating value through collaborative leadership style, agi...
Kenrick BagnallToronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/InstructorKenrick Bagnall has 17 years of law enforcement experience, the last eight of which were in the Coordinated Cyber Centre (C3) as a Cybercrime Investigator. Prior to law enforcement, he spent two decades working in the Information Technology industry primarily in the financial services sector. During this time, he spent twelve years in Bermuda...
Tamika PuckettRisk Manager, Corporate Security, ZoomAs the City of Chicago’s Chief Risk Officer, Ms. Puckett was responsible for implementing and managing the city’s enterprise risk management governance framework, including the implementation of policies and procedures to identify and manage organizational risks. A career risk manager, Ms. Puckett possesses over 15 years of experience managin...
Tanya Tipper-LusterIT Audit/Advisory Professional, Wyndham DestinationsTanya Tipper-Luster has spoken at cyber conferences such as the (ISC)2 Security Congress and was featured as a cybersecurity expert in the Orlando Business Journal. She is a Cybersecurity Audit thought leader and visionary. She represents the alignment of emerging technology, critical business processes and key cybersecurity controls to infl...
Robert RybaSr. IT Audit / Advisory, Wyndham DestinationsRobert Ryba has spoken at cyber conferences such as the (ISC)2 Security Congress. He is a Certified Public Accountant and Certified Information Systems Auditor with an Internal Audit and Cybersecurity background. As a millennial who is deeply passionate about information technology, he is motivated to learn why millennials are so indifferent...
Ethan StrayerSr. IT Advisory Analyst, Wyndham DestinationsEthan Strayer has spoken at cyber conferences such as the (ISC)2 Security Congress. Ethan is a Certified Information Systems Auditor, Cybersecurity and Information Technology (IT) Governance Risk and Compliance professional. He supports the Company's risk tolerance while also improving the IT posture of the organization. Ethan specializes in...
Chris TurleyLeader, RISC Education & Awareness, FISI lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previo...
Brian ColemanAssociate CIO, Information Security Officer , University of Massachusetts Medical SchoolBrian is a seasoned leader, Chief Information Security Officer, and IT executive. His experience spans Insurance, Financial Services, Health Care, and Cloud Security. His specialty is optimizing Information Security and Risk Management / Compliance organizations, his passion is employee mentorship, continuous improvement and process developme...
Donna RossPresident, WiCyS Delaware Valley AffiliateDynamic leader and board member demonstrating over 20 years of diverse risk, compliance, information security, technology, and operations experience within the manufacturing, insurance, banking, financial services, and retail sector. Adept in developing and implementing strategic technology and risk solutions, performing research and analysis...
Nancy Hunter, ModeratorBoard President, WiCyS Delaware Valley AffiliateNancy Hunter is the VP, CISO and Data Privacy Security Officer at the Federal Reserve Bank of Philadelphia. With more than 25 years of experience in technology including 15 years in Information Security, Nancy joined the Federal Reserve Bank in 2017 where is accountable for Information Security Operations and Consulting, Information Risk Mana...
Mark Eggleston, CISSP, GSEC, CHPSCISO, CSCMark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, ...
Joshua SorensonSr. Director, Global Security, EquifaxJoshua is a Global Information Security Leader with 14 years of professional experience. Joshua currently serves as Equifax's Senior Director of Global Mainframe Security where he has responsibility for transforming zSeries platform security around the world. Prior to joining Equifax, Joshua served in security leadership roles, leading transf...
Ted DemopoulosPrincipal, Demopoulos AssociatesTed Demopoulos’ professional background includes over 35 years of experience in Information Security and Business, including over 30 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent...
Joel LoweDirector of Physical and Cyber Security, Red VenturesJoel Lowe has more than 14 years of experience in remediating threats, vulnerability management, risk management, data privacy, and information security programs. These programs focus on overseeing private data protection, corporate governance, risk management strategy, Certification & Accreditation, Incident Response, forensics and executive...
Canadian Cyber Threat Exchange (CCTX)The Canadian Cyber Threat Exchange (CCTX) is a sharing hub and collaboration organization that provides insight into cyber events directly impacting Canadian business, along with mitigation options and tools to combat identified threats. Learn about the CCTX and enjoy a special, CCTX-hosted guest presentation. Details available soon.
Ken E. SiglerBoard of Advisors, University of Detroit Mercy, Center for Cybersecurity and Intelligence StudiesKen Sigler has served as a full-time faculty member of the Computer Information Systems program at the Auburn Hills Michigan campus of Oakland Community College since 2001, while his primary research is in the area of cybersecurity education, policy, and management; software management; and software assurance. Ken serves as the Liaison for th...
Daniel GoldenbergDirector, IT Infrastructure, Barton AssociatesDan is a business results-focused information technology leader with a background in information security, infrastructure, and technical operations; experiences range from fledgling start-ups to enterprise corporate environments.
Tammy MoskitesPonemon Institute Distinguished Fellow, Career CISO & Former CISO, Time Warner Cable; CEO & Founder, CyAllianceTammy is the CEO and Founder of CyAlliance. She is a strategic advisor to companies, vendors and startups by leading, building and scaling security offerings while providing CISO as a Service and virtual CISO (vCISO) services for companies worldwide. With her 30 years of experience, she is noted by her peers to be a results-driven and passion...
Adam KarcherCyber Special Agent, FBISpecial Agent Adam Karcher has been with the FBI for over 16 years running cyber investigations and operations across the full spectrum of criminal and national security programs. SA Karcher's experience spans local field investigations to national and international strategic engagement against the most sophisticated cyber threats. His curren...
Matt DonatoCo-Founder & Managing Partner, HuntSourceMatt Donato is a Co-Founder & Managing Partner of HuntSource- the preeminent Executive Search and Talent Solutions firm with a niche focus in Cyber Security & Data Intelligence. Matt possesses fifteen years of experience in executive recruiting, talent solutions, workforce planning, and talent management. He is a thought leader and recruiting...
Helen OakleyDirector of Secure Software Supply Chains and Secure Development, SAPHelen Oakley, CISSP, GPCS, GSTRT, is a cybersecurity leader driving standards for AI transparency and security. She co-leads key initiatives, including CISA.gov’s AIBOM and OWASP’s Agentic AI Security – threats and mitigations, shaping frameworks to address emerging risks in AI. As Director of Secure Software Supply Chains and Secure Developm...
(ISC)2 Local ChapterThe International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization."
Joe ProvostInformation Security, Avidia BankJoe's been in cyber since the internet was a piece of string tied between two soup cans! He's a former Army warrant officer (network warfare), MIT Lincoln Laboratory IAM, IBM (XForce Cyber Range) “The Cave” member, teaches professional ED at MIT with the Geospatial Cyber Security group, and has a Masters in Cyber from Utica College. His forme...
Michael MeyerCTO & CISO, Spring Oaks Capital, LLCMichael Meyer is a visionary technology and security executive with 20+ years of expertise in technology, enterprise security, and financial regulatory compliance. As CTO & CISO at Spring Oaks Capital, he architects and deploys cutting-edge security frameworks that fortify AI driven digital solutions, mitigate emerging cyber threats, and driv...
Don McKeownInformation Security Manager, Wolters Kluwer HealthDon McKeown is currently an information security manager for a provider of healthcare solutions that facilitate effective clinical decisions. There he developed and teaches a threat modeling course, teaches code scanning, contributes to corporate application security advisory committees, and consults for technical and product teams. Previousl...
Doug GrahamChief Security and Privacy Officer, LionbridgeDoug is the Chief Security and Privacy Officer at Lionbridge Technologies, a global leader in localization and data training. He has over 20 years of global experience in the enterprise security space and brings a balance of leadership, customer focus, and technical expertise to the table. He previously served as CSO of Nuance Communications ...
Gabriel DoncelDirector, Information Security, Drexel UniversityGabriel Doncel joined Drexel University in 2019 where is currently Director of Information Security. He is also part of the University of Delaware and Wilmington University Adjunct Faculty. As a member of the Information Security team at Drexel, and working closely with the campus community and outside parties, his focus is to protect the peo...
Margarita RiveraVP, Information Security, Risk & Compliance, LMC (a Lennar Company)An Information Security Executive with over 15 years of experience, Margarita Rivera has thrived her entire career on solving complex problems. Margarita has dedicated her professional journey to building Information Security Risk, Compliance and Privacy Programs and continues to do so as the Head of Information Security at LMC, a Lennar Corp...
Mike Ste MarieSecurity Program Manager, Office of the Secretary, Commonwealth of MassachusettsMike has more than 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, ...
Adel DaneshCISO, Analytics 4 LifeAdel Danesh has over 20 years of experience in IT and information security. Over the course of his professional career, he has been holding information security leadership roles in various organizations and spearheaded mission critical security and infrastructure projects. In his current job, Adel is a CISO at Analytics For Life, a medical re...
Dominique WestSr. Cloud Security Consultant, EY, Instructor, Georgia Institute of TechnologyDominique West is a senior consultant for Ernst & Young based in Atlanta, GA. She has eight years of experience in Information Technology, five of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries...
Daniel PepperPartner, BakerHostetlerDan Pepper is a partner on BakerHostetler's Privacy and Data Protection team. Utilizing 25 years of comprehensive experience in information technology, data privacy, and cybersecurity law, Dan advises clients on proactive data security practices, data breach incident response, and regulatory compliance. He frequently handles security incident...
Michael EffiongHead of Cybersecurity, Tango NetworksMichael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas,...
Arif HameedCISO, C&R SoftwareArif Hameed is a seasoned and award-winning Cybersecurity leader with more than 20 years of technology experience. He is a Chief Information Security Officer and has had roles in Security Advisory, IT Risk and IT Audit at various Financial Institutions and Service Providers. He actively volunteers for professional associations including ISACA...
Imran AhmadPartner and Head of Technology; Co-Chair of Data Protection, Privacy, and Cybersecurity, Norton Rose Fulbright Canada LLPImran Ahmad is the Canadian head of our technology sector and Canadian co-head of our information governance, privacy and cybersecurity practice. He is based in our Toronto and Montreal offices and is recognized as a leading cybersecurity lawyer by several legal directories.
Imran advises clients across all industries on a wide array ...
J. Zhanna Malekos SmithSr. Associate, Aerospace Security Project, and Adjunct Fellow, Strategic Technologies Program, Center for Strategic and International StudiesJ. Zhanna Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of ...
Larry SnyderAssociate Professor, Bloomsburg University of PennsylvaniaProfessor Larry Snyder has nearly two decades of experience in law enforcement, fraud, and auditing in the US Army and a variety of industries, and 15 years in the field of cybersecurity education. Larry believes that cybersecurity strategists must have a broad understanding of the cyber issues facing organizations, as well as the skills need...
Ryan HausknechtInstructor, University of North Carolina at CharlotteRyan Hausknecht specializes in red teaming as a Security Consultant at SpecterOps and is an instructor for cybersecurity at UNC Charlotte. He is a former Forensic Consultant, Information Security Analyst, and Penetration Tester who has dealt with clients ranging from local government to enterprise-sized businesses. Ryan graduated Summa Cum La...
Stephen PurpuraFounder, [Stealth Mode]Stephen Purpura is an American entrepreneur and an applied machine learning researcher. He has co-founded four companies that focus on evolving the future of work, including Context Relevant (renamed Versive and acquired by eSentire) and SkyEye LLC (also acquired). He holds degrees from Harvard University’s Kennedy School of Government and th...
Karen HolmesVP and CISO, TrueBlue Inc.Karen Holmes is the Vice President and CISO at global staffing company TrueBlue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating...
Tom BechtoldDigital Event Director, SecureWorldTom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also worki...
Garrett WhitneyCIO, Delta Dental of WashingtonGarrett Whitney is the Chief Information Officer at Delta Dental of Washington, the largest dental benefits provider in Washington State. He developed a passion for technology at an early age by learning to program Pascal, C, and 8086 Assembly languages prior to graduating high school. Garrett is a veteran of the United States Navy, specializ...
Kat JungckPrincipal Enterprise Security Architect, F5 NetworksKat is an experienced cybersecurity practitioner with a background in both enterprise cybersecurity and secure product development with deep domain experience in cloud security, identity and access management, and secure product development. Kat enjoys working with local cybersecurity chapters and programs to recruit and develop the next gen...
Brian SheaBISO, SalesforceBrian is an IT Executive with 29 years of experience from Security Operations and Support, Compliance, Risk Management, Technology Innovation, IT Operations and Supportand. Currently, Brian is a Business Information Security Officer (BISO) supporting multiple business units at Salesforce, delivering security and compliance across our people, ...
Sean VenturaCISO, AtmoseraSean has over 30 years of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Chief Information Security Officer at Atmosera, implementing and maintaining the company’s security posture, while providing security and compliance expert advisory to Atmoser...
Mukesh DixitCTO, Washington State Department of Labor and IndustriesChief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...
Austin McBrideThreat Data Scientist, Cisco UmbrellaAustin McBride is a Threat Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. His current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets...
Burak SerdarCo-Founder, ConsentGridBurak is one of the co-founders and the technical lead at Cloud Privacy Labs. He has more than 25 years of experience as a software engineer and recently left his position at Red Hat as Principal Software Applications Engineer. His work includes large scale back-end applications for distributed environments and open-source tools for enterpris...
Jaymin DesaiThird-Party Risk Offering Manager, OneTrustJaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficie...
Clint SowadaDirector of Product Security, CollibraAs the Director of Product Security at Collibra, Clint Sowada is responsible for delivering secure applications and protecting customer’s data. He has been in the security industry for nearly a decade and has proven track record in building secure SDLC programs at companies that range from endpoint protection to large scale cloud service prov...
Ashish PopliDirector of Product Security, Privacy & Compliance, UiPathAshish thrives on pragmatism, innovation and building teams that deliver a promise. He started his career over 20 years ago, as a computer scientist in upstate NY, and since then has been learning the 'art of impossible', by wearing multiple hats, including writing code, conducting pen tests, finding and fixing security bugs, building and shi...
Dr. Ben EdwardsSr. Data Scientist, Cyentia InsituteDr. Benjamin Edwards joined Cyentia at the beginning of 2019 as hire #1. He was formerly with IBM Research, where he worked in applying advanced machine learning techniques to solve real world security problems and shaped the next generation of analytical security models. Before that he received his Ph.D. from the University of New Mexico wit...
Jeff RaymondSales Engineer, AvananJeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakesurfing (depending on the se...
Justin SchluesslerData Protection Officer, Compassion InternationalJustin Schluessler has served with Compassion International, a global child development non-profit, for 21 years. Starting in IT and then transitioning to Risk Management, Justin was the organization’s very first information security employee—building a comprehensive security and compliance program from the ground up. In his current role as ...
Jerry VergerontAttorney, Vergeront Law, PLLCJerry Vergeront is the founder and attorney at Vergeront Law, PLLC. With over 25 years in Information Security before becoming an attorney, he brings an industry understanding to data security, privacy, and compliance law.
Tim DanksVP, Risk Management & Partner Relations, Huawei Technologies (USA)As VP Risk Management & Partner Relations Mr. Danks is responsible for understanding and managing business risks in the context of cybersecurity and privacy across Huawei USA businesses and toward external stakeholders. Further, he is responsible for developing and enhancing partner relationships towards key external stakeholders across acade...
Bruce PotterCISO, ExpelBruce Potter is the CISO at Expel. Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company. He also served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security, and co-founded the Shmoo Group in 1996.
Anand SinghCISO, Alkami TechnologyDr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currentl...
Drew SimonisVP & Deputy CISO, Hewlett Packard EnterpriseDrew Simonis is a Vice President and serves as the Deputy CISO at Hewlett Packard Enterprise (HPE). He has worked in some of the largest and most complex environments in the public sector and the private sector with firms such as IBM, AT&T, EDS and Symantec. Prior to joining HPE, Drew spent 8 years as the CISO for Willis Group Holdings (now W...
Robert WaldenChief Information Officer, EpsilonRobert Walden is the Chief Information Officer at Epsilon where he is responsible for cybersecurity, data center and public cloud infrastructure services, and network services. Additionally, Robert is responsible for providing all IT workplace services for a global user base. Robert has been delivering business value through technology for ov...
Tianne Strombeck, ModeratorAssociate Director, Network Security, VerizonTia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has work...
Michael BlahaSr. Director, Cloud Operations, NucleusHealthMichael Blaha is currently Sr. Director of Cloud Operations and Security at NucleusHealth. Throughout his career, Michael has made a focus of integrating security and cloud native principles into his delivery and operations teams in both the healthcare payer and healthcare Software-as-a-Service space.
Ian SchnellerCISO, Health Care Service CorporationA 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...
Craig SwinteckIS Manager, Town of Castle RockCraig Swinteck has a comprehensive background in IT operations and cybersecurity, with a career spanning across entrepreneurship, small businesses to global corporations, serving the public in local and federal government, and providing cybersecurity guidance in challenging industries such as Finance, Healthcare, and Manufacturing. Craig’s pa...
Joe DietzNetwork Security Architect, CenturyLinkA technology focused senior level IT security professional with an excellent balance of business experience and knowledge of systems/network security. Always conducting oneself with integrity and ethical behavior following the motto of “Always do the right thing.”
Diana HennelCTO, Catalyst Corporation Federal Credit UnionDiana Hennel is currently the Chief Technology Officer for Catalyst Corporate Federal Credit Union. In her role, Diana is responsible for the long-term strategic direction and implementation of technology strategy, security, and processes. She oversees the corporate’s network operations, technology development and information systems securit...
Joshua CarlsonData Privacy and Technology Law Attorney, The Carlson FirmJoshua Carlson is a privacy lawyer but also is a technologist and understands sytem engineering, he has for a long time held his CISSP, CIPP, CIPP/G, CIPP/E and provides guidance and advisory to organizations around the world.
Jay JacobsChief Data Scientist & Co-Founder, Cyentia InstituteJay is a Co-founder and Chief Data Scientist at Cyentia Institute, a research firm dedicated to advancing the state of information security knowledge and practice through data-driven research. Prior to Cyentia, Jay served as the Lead Data Analyst on the Verizon Data Breach Investigations Report and is the co-founder of the Society for Informa...
Christopher CalarcoSpecial Agent / Private Sector Coordinator, FBI DenverSpecial Agent (SA) Christopher A. Calarco has been in law enforcement for 25 years. He was previously a local and federal prosecutor, and has been an Agent for the FBI for over 20 years. SA Calarco has investigated a number of matters to include reactive violent crimes, gangs, organized crime, fraud and major theft. SA Calarco was also a m...
Scott BennettVP, Applications, Lear CorporationScott Bennett leads Lear Corporation’s global applications as the Vice President of Applications, Deployment and Development. Prior to joining Lear Corporation, he served as the Global Chief Information Officer to International Automotive Components Group, a $6 billion Tier 1 automotive supplier. Before that, Scott was the North America CIO...
Zahira (Zah) GonzalvoSVP and Chief Information Security & Privacy Officer, Flagstar BankZah joined Flagstar Bank Information Security & Privacy team in 2018 as a Senior Vice President and Chief Information Security & Privacy Officer. Prior to her CISO role, Zah was the head of ERM and the Operational Risk teams since 2013 when she joined Flagstar Bank. Zah was the Strategy Leader for Diversity and Inclusion (D&I) for the Bank si...
Janet LawlessCEO & Founder, Center for Threat IntelligenceJanet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge holistic threat intelligence program including assessments, consulting and training. Janet’s former leadership roles at Microsoft and Cisco, creating and managing global programs focused on compliance and securi...
Jason RaderDirector, Network & Cloud Security, Insight Cloud + Data Center TransformationJason Rader joined Insight in 2015 as the National Practice Director of Security. He is charged with managing Insight’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true s...
Dennis HodgesCIO, Inteva ProductsDennis Hodges is the Chief Information Officer for Inteva Products, LLC, a position he has held since March 1, 2008. Prior to this assignment Dennis was Chief Information Officer for Delphi Interiors and Closures. Prior to joining Inteva, Dennis served as the Global Business Systems Director at Huntsman Corporation. He began his career at She...
Tammylynne JonasCIO, Self Esteem BrandsTammylynne Jonas (TLJ) is a seasoned digital and technology executive with almost 20 years of experience leading large, international teams. TLJ is the Global CIO for Self Esteem Brands, the parent company for Anytime Fitness. In this role, TLJ has responsibility for multiple franchise brands, with almost 5000 locations across almost 40 count...
Brenden SmithCISO, FirstBankBrenden Smith is the Chief Information Security Officer at FirstBank. Having spent the last 10 years at FirstBank he is passionate about their community involvement and “Banking for Good” philosophy. In his current role Brenden is focused on aligning security with the needs of the business to help drive better business outcomes through better...
Christopher RileyCISO, Ntirety (formerly HOSTING.com)Chris is a seasoned IT Strategist with 20 years of leadership experience in Project & Program Management, Technology & Infrastructure, and Security & Governance. He creates and scales internal technology operations for sustained hyper-growth, builds security operations for Managed Security Provider and spearheads Compliance certification pro...
Ronald WilliamsonInformation Security Officer, Medical College of WisconsinRonald Williamson has over 20 years’ experience in Information Technology and Information Security. He has held roles within the banking, retail, and healthcare industry. Currently, he is Information Security Officer at the Medical College of Wisconsin. Driven by a belief in promoting a strategic vision and utilizing best practices to accompl...
Bill MeredithCloud Security Engineer, Charles SchwabBill Meredith has over 25 years of experience designing, implementing, and supporting IT solutions for large enterprises, of which 10 years have been in the cybersecurity area. He is a cybersecurity professional with experience across a diverse set of cyber domains and industries such as Cloud Security, Financial, Forensics Investigation, Te...
Panel DiscussionKevin BeaverIndependent Information Security Consultant, Principle Logic, LLCKevin Beaver, CISSP is an information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. • With over 31 years in IT and 25 years in security, Kevin specializes in independent security assessments and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sen...
Doug BoykinSolutions Engineer, OneTrustDoug Boykin serves as a Privacy Engineer at OneTrust – the #1 most widely used privacy, security and third-party risk technology platform. In his role, Boykin advises many of the world's leading organizations on CCPA, GDPR and ePrivacy (Cookie Law) solution implementations, focused on formulating efficient and effective responses to data prot...
John CallaghanSr. Security Engineer in SOC Operations, Forensics, and Threat Hunting, Pulte Financial ServicesAs a security practitioner of 30 years, Jack's experience began in the 80s with commercial and military venues, and expanding in early days of the Internet. It continued to be shaped by the growth of malware and data breaches as global threats against business, nations, and individuals. While developing some of the earliest proactive IPS syst...
Patrick Benoit, ModeratorCISO, Brink's Inc.Patrick was previosuly the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting comp...
Jeff KenneyCIO/CISO, Grasshopper Bank30+ years IT and Information Security practice. CIO/CISO at the first digital commercial bank in the US. Previously served as the Global Head of Wealth Technology for Thomson Reuters wealth management business line. Lead a team of over 380 developers and technologists supporting the TR BETA, BETA Online, and Thomson One products. Previously t...
Dale DrewChief Security Officer, Zayo GroupDale is currently the Chief Security Officer of Zayo Group, Inc, a global telecommunications service provider based in Boulder, Colorado. Dale is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, having worked in Federal/State Law Enforcement and with Inte...
Rob WalkSr. Security Engineer, TenableRob is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying, and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable, he helps organizations reduce risk due to Cyber Exposure.
Kelce WilsonGeneral Counsel, InfraGard North TexasKelce S. Wilson was in the U.S. Air Force, both active duty and reserves, retiring as a Lieutenant Colonel. He has a B.S., M.S. and PhD in electrical engineering, an M.B.A., a J.D., US PTO patent practitioner registration, and is a certified privacy professional with CIPP-US, CIPP-E, and CIPM. During his military and engineering career he wor...
TJ GonenCo-Founder , Protego LabsTJ is a subject matter expert on cloud security who has decades of experience solving enterprise problems with innovative solutions. His current project, Protego Labs, is two years in the making. With Protego, TJ has developed an award-winning platform that automates security for serverless applications. The combination of reduced development...
Book SigningParthasarathi ChakrabortyDirector, Security Architecture, Bank of MontrealPartha has over 20 years of cyber security leadership experience in financial services industry. An active speaker and panelist in cyber security conferences around the world. Very much passionate about learning new technologies and writing on recent cyber trends. Currently heading up infrastructure security architecture for Bank of Montreal....
Rob MaynardSolutions Architect, Trend MicroRob Maynard is a sales engineer and DevOps SME for Trend Micro. He has been in the IT field for over 11 years working with various cloud, automation, and virtualization technologies. He lives in Michigan with his wife and two children.
Jennifer ReichertsCertified Ethical Hacker, Healthcare Information Security AnalystJennifer Reicherts is an Information Security Analyst with over 16 years of experience working in the Healthcare and Public Health sector. Her passions include IoT cybersecurity and threat intelligence. Jennifer is a Certified Ethical Hacker (CEH) and an Executive Board Member of InfraGard Minnesota Member Alliance.
Michael HiskeyChief Marketing Officer, AvananMichael Hiskey is a long-time data, analytics, cloud, and AI industry executive. An accomplished writer and speaker, he has published articles in Forbes, InfoWorld, TechCrunch, ITProPortal, etc. He spends his time thinking about how these innovations impact B2B organizations and their customers. Michael has a background in enterprise technolo...
Rebecca HarnessVP & CISO, QuickbaseRebecca Harness is VP & Chief Information Security Officer for Quickbase. Rebecca has an established 25-year career in information technology with the past twelve years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technology startups over the course of h...
Scott HoggChair Emeritus, Rocky Mountain IPv6 Task ForceScott Hogg is CTO and a co-founder of HexaBuild.io, an IPv6 consulting and training firm. He is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. He is the author of the a Cloud Guru course, “Rapidly Deploying IPv6 on AWS.” Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member o...
Joseph MarentetteMIM, Network Engineer 3, Washington University in St. LouisJoe Marentette, MIM (WashU IT Network Engineer 3), has worked for the university for over 20 years. Joe leads the design and engineering of the WashU enterprise network and the research network. Joe has a long history of collaboration with the Information Security department, and most recently built the data collection network to capture netw...
Eddie HoFormer CIO & COO, Los Alamos National BankEddie Ho is the former COO and CIO for Los Alamos National Bank in New Mexico and CIO and CISO at OmniAmerican Bank in Texas. Prior to banking leadership roles, Eddie was in Technology Risk Management, cyber security, and Enterprise Architecture for IBM, Dell, Grant Thornton, and Blockbuster. Eddie is a board member for ePayAdvisors and is a ...
Marc AshworthCISO & SVP, First BankMarc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...
Frank LeyvaSystems Engineer, RadwareFrank Leyva is a Systems Engineer with Radware, a market leader in cybersecurity with a focus on Network and Application level availability, and security. Prior to that, he was a subject matter expert in network security defense with a leading anti-malware company, performing advanced threat analysis, deep packet inspection, and creating hack...
Rod Aday, ModeratorDirector, Information Risk Management, VerizonRod Aday is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built Information Security and Business Continuity Programs from the ground up at three different financial ...
Mark NagielCISO, Supreme LendingMark is currently serving as the Chief Information Security Officer at Supreme Lending. Prior to Supreme Lending, Mark Served as the CISO at Prime Lending, Head of Information Security at MetroPCS (a T-Mobile division), VP of Information Technology and VP of Information Security at InCharge Institute, Head of NEC Information Security Consulti...
Beth YoungSr. Security Incident Response Consultant, AflacBeth Young has 20 years of cyber security experience. She is currently a Senior Security Incident Response Consultant with Aflac. Beth has previously worked for a financial services company and for one of the Information Sharing and Analysis centers. She just completed her Masters in Applied Data Science from Syracuse University. She has prev...
Christopher McMahonSpecial Agent, Global Investigative Operations Center, United States Secret ServiceChris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Servi...
Siam LuuLead Security Architect, Colorado Judicial DepartmentSiam Luu has worked information security for over 8 years beginning as an analyst, graduating to an engineer, and currently is employed as a security architect. He has worked in both the public and private sectors in a myriad of different careers and locations in both technical and non-technical roles. At present, he has his CISSP certificati...
Melissa Van BuhlerCybersecurity & Data Privacy Attorney, Focal LawMelissa’s legal practice focuses on cybersecurity, privacy, and regulatory compliance. Her key strength is helping organizations achieve cyber resiliency through legal and regulatory compliance.
Before joining Newman Du Wors in 2018, she served more than 15 years as a Judge Advocate General officer in the United States Army where she s...
Quin DeVriesUX Researcher, Automotive Cybersecurity, Mitsubishi Electric Automotive AmericaQuin DeVries is exploring the realm where technology and human behavior meet to create engaging user experiences. As a curious researcher, he is eager to tackle the challenges of today and the future.
His research background includes topics in design thinking and ideation in engineering, managerial accounting and neuropsychology, and ...
Alan BerryVice President, Cybersecurity, Centene CorporationAlan Berry is the Vice President for Cybersecurity at Centene Corporation. He leads the Cyber Incident Response, Security Strategy, and Threat and Vulnerability Management teams, as well as the Business Resilience and Crisis Management teams. Alan brings 30 years of experience in cyber operations, communications, and command and control. Prio...
Matthew ClaphamDirector of Cybersecurity, GE HealthcareMatt Clapham is a Directory of Cybersecurity at GE Healthcare. He and his team make products more secure.
Michael RogersDirector, Cyber Defense, Optum / UHGMichael Rogers is on a mission to make organizations more secure by executing on the basics of cybersecurity. He is a certified nerd with nearly 20 years of IT experience, and has spent the last decade developing his understanding of information security, business strategy, and communications. Mike earned his MBA from the Carlson School of Ma...
David StaussPartner, Husch Blackwell LLPDavid is the leader of Husch Blackwell’s national privacy and data security practice group. Accredited by the International Association of Privacy Professionals as a Fellow of Information Privacy, Certified Information Privacy Professional/United States, and Certified Information Privacy Technologist, David brings to the table a deep engageme...
Marc HarwinInformation Security Professional, Harwinet LLCMarc Harwin is an Information Security Professional with more than 20 years of experience. He has worked to improve Information Security at multiple Fortune 500 organizations with a focus on:
- Security Operations
- Vulnerability Management
- Incident ResponseMarc has a Master of Science in Information Systems from W...
Preston BukatyGRC Consultant / Privacy & Compliance Specialist, IT Governance USA Inc.Preston Bukaty is an attorney and consultant working for IT Governance USA. He specializes in data privacy GRC projects, from data inventory audits to gap analysis, contract management, and remediation planning. His compliance background, and experience with operationalizing compliance for a variety of industries, give him a strong understand...
Jeff WilburTechnical Director, Online Trust Alliance, Internet SocietyJeff Wilbur is the Technical Director of the Internet Society’s Online Trust Alliance. He is responsible for integrating, developing, and extending the OTA initiative within the Internet Society’s overall mission and objectives. He has over 25 years of experience in high technology, all focused on bringing new, industry-transforming communica...
Selim AissiSVP and CISO, Ellie MaeSelim Aissi is Senior Vice President & Chief Security Officer at Ellie Mae’. He is responsible for Ellie Mae’s Security Engineering, Operations, Strategy and Information Technology Risk & Compliance. Before joining Ellie Mae, Selim was the Vice President of Global Information Security at Visa. In that role, Selim transformed Visa’s informatio...
Sudesh GadewarSecurity Engineer, Ellie MaeSudesh Gadewar is Sr Staff Security Engineer at EllieMae. Sudesh holds 10+ years of experience in security where passion is in offense and defense of security. Sudesh holds various Security Certifications which he use as attestations to his skillset. His core area of expertise is in product and application security, where he build SSLDC lifec...
Janelle HsiaDirector of Privacy and Compliance, American Cyber Security ManagementJanelle Hsia is a trusted advisor for strategic and tactical decision making within organizations of all sizes. She brings a diverse background with strong leadership, technical, and business skills spanning 20 years of experience in the areas of project management, IT, privacy, security, data governance, process improvement, and software dev...
Carlin DornbuschPresident, American Cyber Security Management (ACSM)Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of moder...
Ethan SailersSolutions Engineer, OneTrustEthan Sailers serves as a Privacy Engineer at OneTrust, the largest and most widely-used dedicated privacy management technology platform to operationalize privacy, security, and third-party risk management. In his role, he advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the w...
Carlos GarciaEnterprise Architect, Office of CIO, OptumCarlos has specialized in Identity and Access Management systems for the past 20 years. His experience has been in the architecture and implementation of large enterprise and consumer IAM systems. Most of his career has been spent designing and running the large scale IAM systems for UnitedHealth Group. His experience and leadership led him t...
Tom MuehleisenDirector of Cyber Operations, Norwich University Applied Research InstitutesTom Muehleisen, CISSP and Retired Army Lieutenant Colonel, is a proven leader in cybersecurity. He is currently the Director of Cyber Operations for NUARI, a non-profit focused on improving our nation’s cybersecurity. He has a rich emergency management background as a National Guardsman, ranging from fighting fires to writing Washington State...
Dave RuedgerCISO, RMSDave Ruedger is the Chief Information Security Officer for Risk Management Solutions based out of Newark, CA. RMS is a premier provider of catastrophe risk models for the insurance industry that help organizations forecast losses for hurricane, earthquake, flood, wildfire, terrorism and cyber risk in a cloud hosted SaaS environment. Dave ho...
Kevin PaigeCISO, FlexportKevin Paige is the Chief Information Security Officer (CISO) at Flexport, provider of the Operating System for Global Trade. Prior to Flexport, Kevin was the CISO at MuleSoft, and brings over 20 years of leadership in delivering solutions and programs that optimize security, compliance and technical operations for both the private and public ...
John HeasmanCISO, CheggJohn Heasman is the CISO of Chegg, the leading student-first connected learning platform where he is focused on proactive approaches to building secure software. Prior to Chegg, John was the Deputy CISO at DocuSign. He has presented at Black Hat, DEF CON, OWASP AppSec and other industry forums on a diverse range of topics from web application...
Maarten Van HorenbeeckCISO, ZendeskMaarten Van Horenbeeck is Chief Information Security Officer of Zendesk since March 2018. He has also been a Board member of the Forum of Incident Response and Security Teams (FIRST) since 2011, and is the Lead Expert to the IGF Best Practices Forum on Cybersecurity. From July 2015 to March 2018, he served as Vice President, Security Engineer...
Rinki SethiVP & CISO, TwitterRinki Sethi is an information security executive known for change, technical and thought leadership across security and enablement disciplines. She is a veteran in the cyber security domain and throughout her career has built and matured technical security teams across security operations, product security, application security, security arch...
Gary S. ChanSystem VP & CISO, SSM HealthGary S. Chan helps organizations innovate, stay secure, and meet compliance using information security as the vehicle. He has architected anti-fraud systems for state agencies, led the information security teams for a large-cap technology company, leads the information security department for a large multi-state healthcare system, owns an inf...
Jonathan CranHead of Research , Kenna SecurityJonathan Cran is an information security expert based in Austin, Texas. He’s a principal at the strategic consulting firm Pentestify, and founder of the the open security intelligence platform, Intrigue. His passion is security assessment, architecting systems to measure and ultimately prevent security incidents. Currently, he’s building a wo...
Ann NagelInstitutional Privacy Officer and former UW Associate CISO, University of WashingtonAnn Nagel is the Associate Vice Provost for Privacy, University Privacy Officer, and European Union General Data Protection Officer for the University of Washington (UW). She is responsible for developing a cohesive strategy for the humanitarian and legal aspects of privacy across the UW. To help ensure privacy is included in the design of th...
Lynette CraneFounder & CEO, Quiet Brilliance Consulting LLCLynette Crane, MA, is a Minneapolis-based mentor to introvert CEOs, an acclaimed national speaker, corporate trainer, executive coach and author, and Founder of Quiet Brilliance Consulting LLC Trained in psychology, she has more than 30 years' experience in her field. Lynette Crane and Quiet Brilliance Consulting help smart companies who are ...
Mark DarginDirector, Security & Architecture, QualfonMark Dargin is the Director of Security Architecture at Qualfon Inc., an organization with over 16,000 employees across North America, South America, and Asia. Mark has over 19 years of experience designing, managing, and securing complex WAN and LAN infrastructures. He is a member of the Michigan Cybersecurity Civilian Corps, FBI citizen’s a...
Swathi JoshiSr. Technical Program Manager - Incident Response, NetflixSwathi Joshi is a Senior Technical Program Manager, on the Security Incident Response Team at Netflix where she works on advancing the crisis management program and maturing the incident response function. Previously she worked at Mandiant as an Engagement Manager and as an Escalations manager, managing and solving most critical technical eff...
Sarah LangeCISO, Allgress, Inc.Sarah has over 23 years of experience in Information Security Management, Risk Management, Third Party Oversight, and Governance in both internal and consulting roles. She is an experienced leader with a background in design, and implementation of GRC and Security programs working with technologies that enable these programs to be effective. ...
Zach TurnerEnterprise Sales Engineer, MimecastZach joined Mimecast in 2017 as an Enterprise Sales Engineer in Denver, CO. Previously, Zach worked in the enterprise space for AirWatch by VMware, where he focused on cloud-based Mobile Device Management solutions involving mobile security, content management, and email management. Most recently, he worked for Fuze, Inc., a $1 billion UCaaS ...
Christopher FrenzAVP, Information Security, Interfaith Medical CenterChristopher Frenz is the AVP of Information Security for Interfaith Medical Center, where he worked to develop the hospital’s information security program and infrastructure. Under his leadership, the hospital has been one of the first in the country to embrace a zero trust model for network security. Christopher has also played a role in pus...
Holger WeeresExecutive Account Manager, baramundi software USA, Inc.Holger is a seasoned UEM expert with over 20 years of experience in endpoint Automation for company of all sizes. He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company's general challenges and common obstacles in ach...
Dr. Jason EdwardsCybersecurity Regulatory Testing Lead, USAAJason Edwards has over 20 years of IT/Cybersecurity experience and currently works for USAA researching, developing and executing enterprise cybersecurity assurance testing. Jason is a 22-year veteran of the US Army and has served multiple tours of duty in Iraq, Afghanistan, and elsewhere. Jason is currently awaiting final approval for his do...
Kristie PfosiSr. Director, Enterprise Security (CISO), Delta Faucet CompanyKristie Pfosi stands at the forefront of one of automotive’s greatest challenges: cybersecurity. A well-respected policy maker and program manager with deep technology expertise, Kristie has been a champion for best practices in cybersecurity for over a decade as a technical intelligence officer at the CIA and as an OEM employee, most notably...
Amy ChuSr. Director, Automotive Product Security, HarmanAmy Chu is Senior Director, Automotive Cybersecurity at HARMAN, a wholly-owned subsidiary of Samsung Electronics Co., Ltd. HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide, including connected car systems, cyber security solutions, audio and visual products, enterprise automati...
Jennifer TisdaleAssociate Principal, GRIMM, a Cyber Research, Consulting & Education firmJennifer Tisdale is the Associate Principal for Embedded Systems and Advanced Transportation Security Programs at GRIMM, a cybersecurity research and engineering firm. Previously, Jennifer served as R&D Program Manager of Vehicle Product Cybersecurity at Mazda North America. While at Mazda, Jennifer bridged the gap between R&D and Government ...
KC ConditCISO, G6 Hospitality, LLCKC Condit has been an information security practitioner and IT leader for 30 years with a diverse resume including hospitality, financial services, retail, and private, post-secondary education. He is currently the CISO for G6 Hospitality, LLC, and is responsible for information security, data privacy, IT risk management, and IT compliance fo...
Sonja TorsethSr. Training Consultant, Kalles GroupSonja Torseth is a Senior Training Consultant at Kalles Group. She designs communications strategy and learning experiences with a sharp focus on end-goals: to affect staff behavior change, especially for security risk mitigation. She has more than 10 years’ experience in communications, learning design, and project delivery, and holds a B.S....
Jeanette RogersDirector of Learning, Kalles GroupJeanette Rogers is the Director of Learning at Kalles Group, helping companies build world-class security awareness and training solutions. She has over a decade of experience in design, development, and delivery of global corporate technology-based programs and holds a Master's degree from Stanford University.
Abigail McAlpinePhD Cybersecurity Researcher, Secure Societies Institute - University of HuddersfieldAbigail McAlpine is a CyberSecurity Researcher at the Secure Societies Institute at the University of Huddersfield. Her research is specialised in PII data published on digital systems that leads users to become vulnerable to a number of threats to their identity and safety long-term.
Andy PurdyChief Security Officer, Huawei Technologies USAAndy is Chief Security Officer for Huawei Technologies USA, overseeing Huawei USA's cybersecurity assurance program and supporting Huawei’s global assurance program. Andy is the Huawei global lead for the East-West Institute Global Cooperation in Cyberspace Initiative and serves on the Steering Committee of The Open Group Trusted Technology F...
Elvis M. ChanSupervisory Special Agent, Squad CY-1, National Cyber Center, FBI San FranciscoElvis Chan is a Supervisory Special Agent (SSA) assigned to FBI San Francisco. SSA Chan manages a squad responsible for investigating national security cyber matters. With 14 years in the Bureau, he is a decorated agent who is recognized within the Intelligence Community as a cyberterrorism expert. SSA Chan was the lead agent on significant c...
Mary ChaneyChairwoman, CEO & President, Minorities in Cybersecurity, Inc.Mary N. Chaney, Esq., CISSP, CIPP/US has over 30 years of experience in Information Security, Privacy and Risk Management. She graduated from Xavier University with a B.S.B.A in Information Systems and became a licensed attorney in the State of Texas in 1999 after obtaining her J.D. from Texas Southern University - Thurgood Marshall School of...
Tara SchauflerInformation Security Awareness and Training Program Manager, Princeton UniversityTara Schaufler is the Information Security Awareness and Training Program Manager at Princeton University. Tara has worked at Princeton for 17 years, spending the last 10 focusing on training and technical communications, and over the past five years has built a robust security awareness and training program from the ground up. She is a membe...
David SherryCISO, Princeton UniversityDavid Sherry is the CISO at Princeton University, with university-wide responsibility and authority regarding matters of information security and information risk. He is tasked with the development and maintenance of Princeton's information security strategy, policies and best practices, security training and awareness programs, as well as on...
Steven LentzHead of Security, MojioSteven is the Head of Security, CISSP, CIPP/US. He has presented for SC Magazine and in Las Vegas regarding Cybersecuirty and Security Awareness.
Paola SaibenePrincipal, Teknion Data SolutionsPaola Saibene has been a technologist for 26 years, having held multiple C-suite roles (CIO, CTO, CSO) in large, global organizations, having received national awards in innovation and cybersecurity, and having led thousands of her own team members to fulfill business missions, and thrive despite constraints. She has also worked as a Data Pri...
Benjamin BrooksFounder & President, PraevalidisBenjamin D. Brooks is a cybersecurity professional United States Navy Veteran and Drilling Reservist, with over 20 years of information and cyber security experience across multiple industries, local, and the federated government. A CISSP and Ponemon Institute Distinguished Research Fellow, his work as founder of Preavalidis, LLC is based ar...
Abhijit SolankiFounder & Managing Director, Whiteboard Venture PartnersAbhijit Solanki is the founder of Whiteboard Venture Partners, an early stage venture capital firm helping entrepreneurs achieve their whiteboard dreams.
Ann Marie MortimerManaging Partner, Los Angeles Office, Hunton Andrews Kurth LLPMortimer is the managing partner of Hunton Andrews Kurth LLP’s Los Angeles office and co-head of the firm’s commercial litigation practice. Her practice is cross-disciplinary and includes significant business and class action consumer claims litigation experience and crisis management in relation to data breach, consumer related labeling clai...
Kenneth HartmanInstructor, The SANS InstituteKenneth G. Hartman is a security engineering leader in Silicon Valley. Ken's motto is "I help my clients earn and maintain the trust of their customers." Ken is an Instructor for the SEC545 Cloud Security Operations course offered by the SANS Institute. Ken has worked for a variety of Cloud Service Providers in Security Architecture, Engineer...
Scott ReynoldsIndustrial Security Manager, Johns ManvilleScott Reynolds is the Industrial Security Manager at Johns Manville. He has over 14 years of Industrial Engineering experience and is an active member of the OT / IT community. Scott has held leadership roles in the International Society of Automation (ISA) for the last four years and is currently an Executive Board Member. Scott has an elect...
Chris McLaughlinInformation Security Officer, Johns ManvilleChris McLaughlin is the Information Security Officer at Johns Manville, a Berkshire Hathaway company. JM is leading global manufacturer of insulation, roofing and glass fibers products. Chris has over 20 years of security and infrastructure experience leading the vision for a highly complex manufacturing environment. Chris has a passion for i...
Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceStephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government ...
Jack Freund, PhDDirector, Risk Science, FAIR InstituteDr. Jack Freund is a leading voice in cyber risk measurement and management. He is an expert at building relationships to collaborate, persuade, and sell information risk and security programs. Jack is currently serving as Director, Risk Science at RiskLens and previously worked for TIAA as Director, Cyber Risk. Jack holds a PhD in Informatio...
Nick SelbyDirector, Cyber Intelligence and Investigations, NYPDNick is the Director of Cyber Intelligence and Investigations for the New York City Police Department. He serves the NYPD's Intelligence Bureau, helping advise the strategy and policies that govern how the Bureau assesses and manages investigations and intelligence in the Cyber domain. For nearly a decade Nick has served the public as a Texas...
Serge BorsoCommunity Instructor, SANS InstituteSerge Borso is the founder and CEO of SpyderSec, an organization specializing in penetration testing, security awareness training, and OSINT. He also resides on the board of directors for the Denver OWASP chapter and teaches with the SANS Institute. He is an expert in a variety of information security fields, having served in many roles in th...
Michael LandeweCo-Founder & Chief Privacy Officer, AvananBefore cofounding Avanan in 2014, Michael Landewe had over 20 years of internet startup experience, starting with cofounding an ISP in 1996. He was an early employee of Network Physics, an internet traffic performance company that was one of the first technology companies to develop detection response for the Blaster worm. As a research engin...
Don PetersonSupervisory Cybersecurity Analyst, Federal Reserve BoardDon Peterson is a Supervisory Cybersecurity Analyst for the Federal Reserve System, based out of the Federal Reserve Bank- St. Louis. He is tasked with overseeing the supervision of the largest and most systemically important financial institutions in the United States with assets of $100B+. His duties also include participating in the develo...
Daniel StiegmanCyber Threat Intelligence Engineer, Pathfinder IntelDaniel is a 15-year Intelligence Professional, with a career in US Army Intelligence and the National Geospatial Agency. His primary focus has been in Counter-Terrorism, Asymmetrical Warfare, and Intelligence Analysis methodology. Daniel was a national-level instructor in All Source Intelligence Analysis and has written several published whit...
Craig ReedsCybersecurity Compliance Manager, Electric Power Systems InternationalCraig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Complia...
Tina HauriFormer CISO, City of Chicago; President, Bradford Garrett GroupTina is President of the Bradford Garrett Group. Her prior roles include CISO for the City of Chicago, Global CISO for AON, CIO for Kudoz.com, Director of Enterprise Risk Management for Discover Financial Services, and Global IT Security Program Manager for Perot Systems at Swiss Bank. As co-founder of the Chicago CISO Networking group, Presi...
Rhia DancelTechnical Manager, Information Security, NSF InternationalRhia is an ISO 27001 and 9001 Lead Auditor and OSINT PenTester for NSF and has previously held several auditing and technical positions in the information security and Pharma quality sectors. Rhia has completed technical writing work and audits for NSF throughout North America, working directly with customers onsite and remotely developing se...
Tony GilesBusiness Leader, Information Security, NSF InternationalTony is an ISO 27001, ISO 20000 and ISO 9001 Lead Auditor and OSINT PenTester for NSF. Currently, Tony is a Business Leader of Information Security, also having served as Director of Operations, Director of Business Development, and Service Delivery Manager. Tony has conducted audits globally for over 10 years and worked on large-scale securi...
Merlin NamuthCyber Risk Advisory Board Member, Pepperdine UniversityMerlin Namuth has spent over 20 years focused in security. His experience includes building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions. Namuth serves on the cyber risk advisory board at Pepperdine Univers...
Alexis WombleSr. Threat Intelligence Analyst, BAE SystemsAlexis Womble is a Sr. Threat Intelligence Analyst at BAE Systems. Previously, she was a Cybersecurity Intelligence Analyst at Express Scripts, where she interned for a year in an EOCC automation development role, Attack Simulation role, and an Intelligence role. She is also a recent grad from Missouri Baptist University, where she can still ...
Linda MarconeSr. Director, Information Security, Serta Simmons Bedding, LLCLinda Marcone has 15+ years of Information Security, Governance, Risk & Compliance, and Fraud Prevention experience. Throughout her career, she has built and transformed Information Security Programs and Teams, worked with FBI & NCFTA to take down an international fraud ring (APT), promoted diversity in the workplace, and acted as a mentor. ...
Samuel BlaneyDirector Cybersecurity, Georgia Technology AuthoritySam is the Director of Cybersecurity & Governance Risk and Compliance (GRC) at GTA and is a Chief Warrant Officer (CW3) retired. Georgia Technology Authority (GTA) Office of Information Security (OIS) is the premier strategic partner for all state and local government organizations in support of a strong State Cyber Security posture. GTA OIS,...
Adam ShostackLeading Expert on Threat Modeling, Shostack & AssociatesAdam is a leading expert on threat modeling, and a consultant, entrepreneur, technologist, author and game designer. He's a member of the BlackHat Review Board, and helped create the CVE and many other things. He currently helps many organizations improve their security via Shostack & Associates, and advises startups including as a Mach37 Sta...
William Lidster, PhDCISO, AAA WashingtonWilliam serves as the leader of AAA Washington’s information security and compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization. William has been with AAA Washington since August of 20...
Bryce VerdierSr. Software Engineer, GroupOnBryce Verdier (CISSP, CEH) is currently a Senior Software Developer at GroupOn. In previous roles, he’s also been a Systems Engineer with an automation and DevOps minded focus, and an Information Security Engineer, focusing on host-based security.
Tamika Albert-WilliamsUndergraduate IT Program Adjunct Faculty, Capella University - School of Business and TechnologyWith a passion for addressing the human element of cybersecurity, Tamika Albert-Williams has 10+ years’ experience in information technology and security. She began her career in IT project management. She is currently a Management Consultant and adjunct IT program faculty at Capella University. She specializes in GRC; and IS program strategy...
Austin RappeportBlue Team Coordinator, Zurich Insurance GroupAustin Rappeport is a Threat Defense Consultant working for Zurich Insurance on their global cybersecurity team. His team is responsible for managing Zurich's SIEM and integrating Zurich's security toolkit to allow for the automated detection of suspicious or malicious activity across Zurich's network. Previously, Austin worked for the Federa...
Chris CarlisRed Team Coordinator, Zurich Insurance GroupChris Carlis is a member of the Zurich Insurance Group Red Team and has built a career helping organizations become more secure through offensive testing. Locally, Chris is a community organizer in the Chicago area and helps coordinate several monthly gatherings designed to connect like-minded information security professionals. In his spare ...
Ed SnodgrassRegional Security Principal, Insight Cloud + Data Center TransformationEd has over 20 years of experience in information security, supply chain security, risk, compliance and mergers and acquisitions. Prior to joining Insight, he served as Chief Information Security Officer for Secure Digital Solutions, a consulting firm providing cyber security program strategy, enterprise risk and compliance, and data privacy....
Paul RussoEnterprise Security Engineer, TenablePaul is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable he helps organizations reduce risk due to Cyber Exposure.
George SchultzeSupervisory Special Agent, Cyber Crime Task Force , Federal Bureau of InvestigationSpecial Agent George Schultzel entered on duty in July of 2010 and was assigned to the New York Field Office. Over the course of his career, SA Schultzel has investigated complex criminal computer intrusions, nation state adversarial action, and cyber terrorism. SA Schultzel is currently serving as the Supervisory Special Agent of the Cyber C...
Joseph ThackerSr. Security Consultant, CroweJoseph Thacker, CISSP, is a Senior Staff Member in Crowe’s cybersecurity practice. With experience in software development, automation, and cybersecurity, he is serving in Security Engineer and Analyst roles to assist in the development and maturing of one of Crowe’s cybersecurity programs. He has a Bachelor’s degree in Computer Science and a...
Tim ChapmanDirector of Security Assurance, ADPTim Chapman serves as ADP’s Director of Security Assurance, leading a team that provides security assurance to ADP’s North American clients. Prior to ADP, Tim’s expertise includes over 17 years of information security, operational risk management, business management, and process improvement experience. Additionally, Tim has been involved wit...
Jeff WheatDirector, Solutions Engineering, @RISK Technologies, Inc.Jeff is the Director of Solutions Engineering at @RISK Technologies as a Technical Director sitting at the nexus of Sales, Deployment, Operations, and Product Development. Interacting directly with customer C-Suite and Technical Staff to drive sales, customer satisfaction, and innovation back into the platform. Jeff provides operational and c...
Tim CallahanSVP, Global Chief Security Officer, AflacTimothy L. Callahan, CISSP, CISM, CRISC Senior Vice President, Global Security; Chief Security Officer Tim Callahan joined Aflac in 2014, bringing more than 30 years of experience in information and physical security, business resiliency and risk management. He was promoted to his current role in January 2016, where he is responsible for dire...
Deborah WheelerCISO, Delta Air LinesDeborah Wheeler is Delta’s Chief Information Security Officer. In this role, Wheeler leads Delta’s Information Security team responsible for the airline’s cybersecurity efforts that secure and protect information important to Delta and personal to its customers, while ensuring the overall cyber resiliency of the airline.
Wheeler’s 25 y...
Michael JonesAttorney, Trusted CounselMichael is a corporate attorney with a strong background in intellectual property and business-oriented technology. As an Attorney with Trusted Counsel, Michael handles licensing and commercial agreement issues. He advises clients on IP and technology licensing, outsourcing and services agreements. He is responsible for negotiating complex te...
Dominick FrazierProgram Manager, Security Learning & Awareness, MetaDominick Frazier is a security professional with over 13 years of security experience with his current role being in Information Technology/Cyber-Security. In his current role he serves as the Security Awareness & Communication Manager responsible for the conversation around security between technical and non-technical teams, which extends to...
David AllenCISO, State of Georgia - Georgia Technology AuthorityDavid Allen is the Chief Information Security Officer for the State of Georgia. He leads GTA’s Office of Information Security, which unifies information security responsibilities for the state’s IT enterprise, the Georgia Enterprise Technology Services (GETS) program, and GTA. Prior to joining GTA in 2019, David served as the Chief Informatio...
Graeme PaynePresident, Cybersecurity4ExecutivesGraeme Payne has over 30 years' experience in security and information technology risk consulting and IT management. He spent the majority of his career at Ernst & Young prior to joining Equifax in 2011 as VP of IT Risk & Compliance. At the time of the 2017 Equifax data breach, he was CIO of Global Corporate Platforms. He now consults with Bo...
Lori AnelloVP, Threat Management & Cybersecurity Operations, GE AviationLori Anello is an adaptive leader with broad background in leading large enterprise teams in the areas of infrastructure, security technology, application architecture, and business solutions. She started her career working for the National Institutes of Health and then moved into private industry in the areas of consulting and manufacturing ...
Kristen EllisSr. Director, Cybersecurity, Clinical Reference Laboratory, Inc.Kristen Ellis is the Security Officer for Clinical Reference Laboratory, Inc. in Lenexa, KS. She obtained her Certified Information Systems Security Professional (CISSP) designation in 2012 and has over 23 years of Information Technology experience, twelve years focused in security. Mrs. Ellis has been instrumental in the development of the s...
Moderator: Beth StrobelSales Director, OnspringBeth Strobel began her career at a global aerospace and defense company, maintaining responsibility for the ethics and legal compliance training and awareness programs. She's since worked in both technical and sales roles at technology companies providing solutions for cybersecurity and governance, risk and compliance. Beth currently serves a...
Mike ShineDirector, Systems Engineering, MimecastMike has over 15 years’ experience designing and implementing IT security solutions for large enterprises, and he’s currently focused on making email safer for businesses. He actively participates in combating existing cyber threats and researching new threats out of Mimecast’s Chicago office. Mike holds a degree in Computer Engineering from ...
Mario ChiockChief of Staff, Itegriti; CISO & Fellow Emeritus, SchlumbergerMario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and m...
Brandon BradshawSales Engineer, Trend MicroBrandon has been with Trend Micro for three plus years, and has been in the IT Industry since the late 1990s. As a Sales Engineer, it's his passion to be the technical bridge between sales and customers.
Stanton GatewoodCyber Security Advisor & Georgia State Coordinator, DHS CISAStanton Gatewood is the US Department of Homeland Security /CISA - Region 4 Cyber Security Coordinator/Advisor - State of Georgia. Gatewood is the former Chief Information Security Officer (CISO) for the State of Georgia, Board of Regents of the University System of Georgia and the University of Georgia.
He has more than 35 years of cy...
Vinay PuriVP, Information Security, Moneris SolutionsVinay is an ex-veteran and a leader in cybersecurity with two decades of experience. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organizations in architecting complete security frameworks. Vinay holds dual masters in Computer Science and Information Warfare from ...
Bryan OrmePrincipal & Partner, GuidePoint SecurityBryan Orme leads the Information Assurance consulting organization; which includes Application Security, Cloud Security, Governance, Risk, and Compliance Services, Threat and Attack Simulation, Incident Response and Forensics. Additionally, Bryan leads the internal IT and Information Security teams as well as the Project Management Office and...
Susan BereznyDirector, Information Security, Royal Canadian MintSusan Berezny is the Director of Information Security at the Royal Canadian Mint. She is responsible for developing a cybersecurity strategy and managing a risk-based security program aligned with business objectives. Prior to joining the Mint, Susan was with The Ottawa Hospital for 23 years in several roles, including Information Security Of...
Bob GordonExecutive Director, Canadian Cyber Threat ExchangeRobert W. (Bob) Gordon is the Executive Director of the Canadian Cyber Threat Exchange (CCTX). The CCTX is Canada’s private sector organization for the sharing and analysis of cyber threat information, and enabling collaboration across all sectors. Most recently, Bob was a Director, Global Cyber Security at CGI. Prior to this, he enjoyed a lo...
Laura FeyPrincipal, Fey LLCLaura Clark Fey, Esq., PLS, CIPP/US, CIPP/E, CIPM, FIP: Laura Clark Fey, one of the first twenty-seven U.S. attorneys recognized as Privacy Law Specialists by the International Association of Privacy Professionals (IAPP) (ABA-accredited), leads Fey LLC, a global data privacy and information governance law firm. She and her team help organizat...
Samuel SuttonComputer Scientist, FBI, Houston Cyber SquadSamuel Sutton is an FBI Computer Scientist. Since 1992 he has worked in Headquarters and Field Offices across the country. He is currently assigned to a Cyber Squad of the Houston Office. Specializing in Computer Security, Network Forensics, "Enhanced Network Capabilities", and Information Security Management, his skills have been applied to ...
Andrew MatushekSenior Special Agent, United States Secret ServiceAndrew Matushek is a Senior Special Agent (SSA) with the United States Secret Service. He is also the Assistant Director of the Kansas City Electronic Crimes Task Force (ECTF) and has over 19 years of experience. He has previously served in Arizona, California, and Washington, DC, prior to landing in Kansas City. SSA Matushek is current activ...
Tim MillerLead Cybersecurity Consultant, Trend MicroTim has over 10 years’ experience in Information Security and 33 years working with computer technology. He started his career with the Apple IIe in his first computer class, through achieving his master’s degree in Network Communications Management. Tim has been with Trend Micro for three years, and his experience in Information Security in...
Intel Analyst from the FBILynn WatsonDirector of Compliance and Risk Management, Dinsmore & Shohl LLPLynn is the Director of Compliance & Risk Management for Dinsmore & Shohl, a national law firm with 1,300 attorneys and employees in 26 offices. Lynn oversees the cybersecurity team and is responsible for all firm security policies, procedures, technology, and initiatives, including the incident response program.
Eric BucherSolutions Architect, Cequence SecurityEric Bucher has over 15 years of experience in the security industry with a technical concentration in financial fraud, advanced persistent threats, forensics, exfiltration, DLP, and overall attack surfaces.
Eugene KesselmanFounder and CEO, TapJetsEugene Kesselman is Founder and CEO of TapJets, the on-demand private jet charter company headquartered in Houston, Texas. Since 2015 the company has been using blockchain ledger technology to conduct its business and since 2016 became the first private aviation company to instantly accept cryptocurrency as a form of payment for its services....
Gustavo CoronelSr. Cloud Security Architect, Check Point Software TechnologiesGustavo (Gus) Coronel is a Senior Cloud Security Architect with Check Point Software Technologies and has been involved with network security for over 25 years. His first foray into network security was serving as the first Firewall Administrator at the US Department of Transportation in 1994. Intrusion Detection, Vulnerability Assessments, P...
Dr. Fred KwongVP & CISO, DeVry UniversityDr. Fred Kwong has been in the information security and technology field for the past 20 years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security O...
Joseph RogalskiSr. Director, Solution Engineering, eSentire Inc.Joe Rogalski is an accomplished Technology and Security Professional with over 20 years of experience developing world-class programs and delivering technology-based solutions. He has served in a variety of technical and management positions during his career, including Security Strategist at Symantec and Information Security Officer at Firs...
Axel PetersExecutive Sales Manager, baramundi Software USA Inc.Axel holds his degree in IT Management and has advised more than 300 small businesses and global enterprises in Europe and the U.S. on tools and strategies to keep technology infrastructure up-to-date, safe, and efficient. Now continuing that role at the baramundi U.S. headquarters in Framingham, MA, Axel is actively helping IT departments ad...
Tasha PhelpsPresident & CEO, Phelco Technologies, Inc.Protecting the integrity of information continues to be a strategic focus within Tasha's cybersecurity efforts. She has seen the impact of businesses being compromised by malicious threats, and shares how building contingency plans can be of value. Her approach is to align business processes with technical solutions to create powerful plans f...
Zaki AbbasVP & CISO, Brookfield Asset ManagementAn accomplished Information Security and Technology leader with proven ability to develop and align strategies with business priorities and establish strong, trust-based partnerships across executive teams, key stakeholders and board members. Zaki has extensive experience in the insurance, real estate, banking, infrastructure, energy, investm...
Chase CresgySr. Healthcare Cybersecurity Consultant, Crowe LLPChase Cresgy attended IUPUI and graduated with a BS in CIT concentrated in information security. He also holds the Security+ and CySA+ certifications. Information/cybersecurity has always interested Chase, and he believes it will be one of the greatest challenges society faces over the next decade. The world of cybersecurity is a fast, ever-c...
Jay RobinsonDirector of Cyber Operations, BlackRockBlackRock's Cyber Operations team manages the global 24x7 operations center responsible for cyber monitoring, incident response, cyber intelligence, cyber forensics, and vulnerability management.
Bob RudisSr. Director, Chief Security Data Scientist, Rapid7Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Bre...
Joel WeinsteinPresident, Greater Boston Chapter, Association of Continuity Professionals (ACP)Joel Weinstein, a native of Washington DC, moved to Boston in 1977, formed his first company in 1986, and currently is in his second term as president of the Greater Boston Chapter of ACP. He has taught at Boston University, Northeastern University, Benjamin Franklin Institute, and ITT Technical Institute for more than 40 years. Joel is inter...
Adib SarakbySr. Sales Engineer, MimecastAdib Sarakby joined Mimecast as a Service Delivery and, after a year, was promoted to a Sales Engineer role. He works closely with the Sales, Marketing, and Educational teams to continually enhance Mimecast's products and promote Cyber Resilience. Email Security is Adib's passion, and as the threat landscape evolves, he splits his time betwee...
Jonathan VillaPractice Director, Cloud Security, GuidePoint SecurityJonathan Villa has 19 years of experience as a technology consultant including 18 years of direct information security experience. For over 10 years Jonathan consulted to a large municipality across several competencies including PCI compliance and training, application architecture and security, vulnerability management, secure coding, web a...
Antona DumasAssociate, XPAN Law GroupAntonia M. Dumas is an associate at XPAN Law Group, a certified Women’s Business Enterprise (“WBE”) and Women Owned Small Business (“WOSB”). At XPAN, Antonia works with clients to create proactive, streamlined, and global approaches to cybersecurity and data privacy. She performs audits, assessments and gap analysis of a client’s existing con...
Les StevensVice President, Information Security, Equifax CanadaAs Vice President of Information Security at Equifax Canada, Les Stevens is responsible for the identification, assessment, and mitigation of inherent, residual, regulatory, security, and compliance risks specifically associated with the business operations of Equifax International business units. His experience building and maintaining infor...
Heather BearfieldIT Risk and Assurance Services Leader, Marcum TechnologyHeather B. Bearfield is a principal in the firm’s Boston office and serves as the IT Risk and Assurance Services leader. She is also a member of the national Real Estate, Alternative Investment, Healthcare, and Financial Services Industry groups. In addition, Ms. Bearfield chairs the Marcum Diversity & Inclusion Committee. She has extensive e...
Chris BradenVice President, Global Channels & Alliances, eSentireChris Braden is a veteran sales and channel executive, bringing over 20 years of experience building, leading, and executing successful programs around the world. In his current role as the Vice President, Global Channels and Alliances, he is responsible for eSentire's global channel program, overseeing strategic partner recruitment, internat...
Mike FabricoSr. Technical Sales Director, TrapX SecurityMike Fabrico is a security expert that has worked for NASDAQ and has over 20 years of industry experience in implementing, architecting, and maintaining critical infrastructure networks. He is also an advisory board member on a number of successful cybersecurity companies worldwide for APT/malware, network intrusion, threat intelligence, digi...
Rosemary ChristianDevSecOps Engineering Coach, ComcastRosemary Christian is Co-President for WiCyS Critical Infrastructure and a Board Member for WiCyS Delaware Valley. She has demonstrated passion, knowledge and proven ability to engage others in the emerging market needs for cybersecurity initiatives. She leverages her experience, communications skills and interpersonal savvy across all levels...
Parker CrookSenior Sales Architect, SentinelOneParker Crook has been in the security industry for over 10 years across multiple verticals. He has experience working on both blue and red teams and has been asked to speak at various regional security conferences. Some of his speaking engagements have covered topics such as purple-teaming, wargaming, orchestration, and his own research. Park...
Matt WilsonChief Information Security Advisor, BTB SecurityMatt Wilson is the Chief Information Security Advisor for BTB, based in southeastern Pennsylvania. Matt has spent his entire career in IT and has over 14 years of experience within Information Security. Throughout his career, Matt has fostered the development of assessment methodologies, toolsets, and techniques for the delivery of security a...
Bruce FormanCISO, UMassMemorial Health CareBruce has several degrees including an MBA in Biotechnology and Health Industry Management. Prior to his current position at UMass, he held other IT Management positions, focusing on Information Security, Risk Advisory, and Security Strategy and Policy, as well as offering consultative services. Bruce is a past president of the Information Sy...
Brian MinickCISO, Fifth Third BankBrian Minick is CISO at Fifth Third Bank. Brian has responsibility for the bank’s information protection program. Brian is a noted speaker and published author. He brings 20 years of technology and cybersecurity leadership and experience to this position. Prior, Brian was VP of Managed Threat Services at Booz Allen Hamilton following the acqu...
Brian TobiaConsulting Systems Engineer, CiscoBrian has been an IT practitioner, consultant, and pre-sales engineer for 15 years, focusing on network and virtualization security. He currently is a consulting systems engineer covering cloud security solutions at Cisco. He holds a CISSP along with other industry certifications.
Andrew DuttonCISO, DuHart ConsultingStrategic Global Cybersecurity leader that is accomplished in complex multinational organizations. Strong interpersonal skills and communicator. Extensive experience in cybersecurity, compliance, governance, architecture. Expert in deployment of enterprise standards, processes, and policies. Strong project management experience. Dedicated and...
Christopher StephenSenior Sales Engineer, SentinelOneChris Stephen is a Senior Sales Engineer at SentinelOne. Chris has over a decade of experience in the IT field, from his initial startup where he designed end-phase punch management systems for commercial and residential builders, to his work at Apple to his work in the medical industry. Chris is a ‘Jack-of-all-trades’ when it comes to IT.
Grant AsplundGrowth Technologies Evangelist, Check Point Software TechnologiesFor more than 25 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s Evangelist, he travels the world enthralling audiences with his passionate and relational storytelling at conferences like RSA and Next100 CIOs an...
Kevin McPeakPrincipal Cyber Architect, U.S. Federal Government, SymantecKevin McPeak is Symantec’s Principal Cyber Architect for the U.S. Federal Government. In this capacity, he serves as the technical SME for eight distinct enterprise defensive technologies. In addition to his CISSP and ITILv3 certifications, Kevin also holds two Masters of Science degrees from Johns Hopkins University and Virginia Tech. In add...
Ondrej KrehelCEO and Founder , LIFARSOndrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise. He actively participates in many high-profile engagements around the world whereby his proprietary methodology is leveraged to achieve the most rapid root-cause analysis and remediation.
He’s the former Chief Information Security Officer ...Katie CreaserSVP and Cybersecurity Practice Lead, AffectKatie is a Sr. Vice President, Cybersecurity Lead at Affect, where she provides counsel to clients that are looking to bring PR and social media into their communications program as part of a thoughtful, holistic strategy. Katie is passionate about helping brands of all shapes and sizes find unique and creative ways to tell their story. She w...
Seth RobertsonPrincipal, Nocturn SecuritySeth is a dynamic information security leader with fifteen years’ experience building best-in-class programs – including launching a security startup, managing NASA’s incident response program, founding the Security Operations Center at a top Wall Street firm, and leading the security program for a global tech company. His work has been used ...
Sandra FathiPresident, AffectSandra Fathi has spent the last 20 years helping technology, healthcare and professional services companies achieve their goals. As President and Founder of Affect, a public relations, marketing and social media agency, Sandra has successfully led the company with consistent growth since the agency’s inception in 2002. Sandra’s commentary has...
Jimmy MillsSenior Solutions Architect, SSH.COMJimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.
Kenneth OlmsteadInternet Privacy & Security Analyst, The Internet Society's Online Trust AllianceKenneth (Kenny) Olmstead is the Internet Security & Privacy Analyst that helps research, analyze, write, and review technical content relating to The Internet Society's Online Trust Alliance issues—identity, security, privacy, and data stewardship. He also helps with communications and engages the OTA Committees on technical and techno-policy...
Jodi DanielsFounder & CEO & Privacy Consultant, Red Clover Advisors, LLCJodi Daniels, founder of Red Clover Advisors, is a Certified Informational Privacy Professional (CIPP/US) with more than 20 years of experience helping a range of businesses from solopreneurs to multi-national companies. Red Clover Advisors has helped hundreds of companies create privacy programs, achieve GDPR compliance, and establish a secu...
Tasneem NipplewalaVP, Information Security; MSIA, CISSP, CCSP, Eastern BankTasneem is a Senior Security Architect at Eastern Bank, the largest and oldest mutual bank in the country with $11B in assets. As part of her responsibilities, she provides internal clients security services when implementing new initiatives across the bank and insurance company to ensure the solutions are built with the highest security stan...
Jason BarrCIO & CISO, FirstupJason has been in the technology sector for over 20 years and has a passion for taking things apart and making them better.
Jeremy RuckerData Privacy & Cyber Partner, Spencer Fane LLPJeremy Rucker leads businesses through the evolving and complex landscape of data privacy, security, and incident response. As a data privacy and cybersecurity attorney, Jeremy regularly counsels clients in all industries on the emerging federal, state, and international data laws and regulations, and also serves as a breach coach to guide or...
John Opala, PhDVP & Global CISO, Hanesbrands Inc.Dr. Omondi John Opala is a seasoned executive with expertise in cybersecurity, IT governance, and leading technology teams, backed by over 20 years of experience. His professional career reflects a steadfast commitment to enhancing digital security, ethical responses to complex cybersecurity challenges, and advancing the application of AI and...
Fred GordyNational Practice Lead – Building Cybersecurity, Michael Baker InternationalFred Gordy is a nationally recognized thought leader, speaker, and expert in building systems cybersecurity specializing in organizational and technical vulnerabilities. He has over 20 years of industry experience including information technology and building controls systems. Fred has been the Chairperson of the Cyber Security Committee for ...
Tom TollertonSr. Manager, IT Advisory, DHGTom has 15+ years of experience in the IT industry, and has extensive experience performing SOC 1 and 2 examinations and reporting, cybersecurity risk assessments, PCI compliance assessments, and system security assessments. Tom is one of DHG’s PCI Qualified Security Assessors and has completed multiple Reports on Compliance for PCI Level 1 m...
Bryan BechardCISO, Flagship Credit AcceptanceBryan is a 20+ year InfoSec career professional currently serving as CISO for an auto finance company and teaching the next generation of InfoSec pros.
Velu JeganathanVP, Security Engineering Solutions Team, State Street CorporationVelu Jeganathan has more than 20 years of IT experience, most of which is around Information Security. He has been extensivly involved in various roles in penetration testing, vulnerability management, security project consulting, and developing security processes, with an emphasis on integrating security into the project lifecycle.
Vince FitzpatrickDirector of Information Security, ChristianaCareVince Fitzpatrick is a 20-year information security professional in the fields of healthcare and finance. Currently, he is the Director of Information Security at Christiana Care Health System (CCHS), one of the largest healthcare providers in the mid-Atlantic region, serving all of Delaware and parts of PA, MD, and NJ.
Jim MenkevichSr. Sales Engineer, NetskopeJim Menkevich is an Information Security, Privacy, and Risk Management professional with 19+ years of experience. Through his career, he has led teams in Cybersecurity, Enterprise Architecture, Systems Integration, and Application Development. Jim specializes in applying methodologies, frameworks, and ideas outside of the intended domain, whi...
Moderator: Joe WalshM.A.C.J. Program Director and Assistant Professor of Criminal Justice/Computer Science, DeSales UniversityJoe Walsh teaches digital forensics and computer security at DeSales University. He previously worked as a senior security consultant where he performed security assessments, conducted penetration testing, and responded to computer security incidents. He has been a police officer for 13 years and is a former member of the ICAC Task Force and ...
Charles SgrilloProfessor of Cybersecurity, Drexel UniversityCharles Sgrillo is an adjunct professor of cybersecurity at Drexel University, teaching on topics such as IT Auditing, Cybersecurity, Penetration Testing, and Computer Forensics. During his time as a principal consultant, Charles has worked with over 50 businesses to implement the NIST Cybersecurity Framework. Along with teaching at Drexel Un...
Christian EspinosaCEO, Blue Goat CyberChristian Espinosa is the CEO & Founder of Blue Goat Cyber and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a U.S. Air Force veteran with a BS in Engineering from the U.S. Air Force Academy and an MBA from Webster University. He holds multiple patents on ...
Daniel SmithHead of Research, Threat Intelligence Division, RadwareDaniel is the Head of Research for Radware’s Threat Intelligence division. He helps produce actionable intelligence to protect against botnet-related threats by working behind the scenes to identify network and application-based vulnerabilities. Daniel brings over ten years of experience to the Radware Threat Intelligence division. Before joi...
Roy WattanasinResearch Security Officer, Massachusetts Institute of TechnologyRoy Wattanasin is an information security professional. He is an avid speaker providing thought leadership at many conferences and webinars. Roy enjoys incident response and building security programs. He is involved with many computer security groups including the Boston Application Security Conference (BASC), OWASP Boston and other local as...
Ron ReidyAudit Analytics Leader, Wells FargoRon has been working in IT for over 30 years. Starting as a software engineer writing database programs on CP/M, MSDOS, VAX/VMS, and UNIX in C, Pascal, VAX/VMS assembler, and FORTRAN. After 15 years, he switched into a database administration role, managing large Oracle databases as well as smaller SQL Server and Sybase databases. Ron became ...
Ernesto DiGiambattistaCEO & Founder, CYBRICErnesto DiGiambattista founded CYBRIC to enable organizations to more easily, confidently and holistically answer the question “How secure are we?” Prior to founding CYBRIC and developing the CYBRIC Continuous Application Security Platform, Ernesto was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, responsibl...
Michael BrownRear Admiral, U.S. Navy (Ret.), President, Spinnaker Security LLC; ACSC Board ClerkMichael Brown, Rear Admiral, United States Navy (Retired) is the Founder and President, Spinnaker Security LLC, a cybersecurity consulting business focused on understanding, identifying and mitigating business risks associated with cybersecurity. Additionally, Brown brings executive leadership, including crisis management, from both public an...
Salar Atrizadeh, Esq.Attorney at Law, Law Offices of Salar AtrizadehSalar Atrizadeh, Esq. is an attorney and IT expert with an extensive background in technology and computer information services. He has conducted seminars before legal and non-legal organizations on similar topics. Salar is licensed to practice in the State of California, District of Columbia, and the United States District and Bankruptcy Cou...
Matt ConnorsIdentity and Access Management Program Manager, University of New HampshireMatt Connors is the Identity and Access Management Program Manager for the University of New Hampshire. His role sits at the cross section of enterprise infrastructure, client experience, and security; as well as leading IAM strategy and practice for a Tier 1 Research University. Matt enjoys collaborating and sharing knowledge with technolog...
Edward DavisPresident & CEO, Edward Davis, LLCDavis has been in law enforcement for 35 years. He served as the Police Commissioner of the City of Boston from December 2006 until October 2013. He administered 6 world championship celebrations and led the highly successful response to the Boston Marathon bombing. Prior to that, Davis was the Superintendent of the Lowell Police Department, ...
Sean BaggettVP & CISO, Blue Cross Blue Shield of MassachusettsSean Baggett is the Vice President and Chief Information Security Officer at Blue Cross Blue Shield of Massachusetts. Sean has been an IT and Security leader in the healthcare industry for over 20 years. He has a BS from the Massachusetts Maritime Academy and is a former U.S Navy Surface Warfare Officer. He currently holds CISSP and CISM cert...
Bryan ScovillManager, Telecom & Network Ops, University of New HampshireLead of the network security team at the University of New Hampshire for 18 years. Areas of focus include development and architicture in the UNH networking enviroment.
Hazel CerraAssistant to the Special Agent in Charge, United States Secret ServiceAssistant to the Special Agent in Charge (ATSAIC) Hazel Cerra is a twenty-two year veteran with the United States Secret Service. ATSAIC Cerra was assigned to the Former President William Clinton Protective Detail in Chappaqua, NY, where she spent four years traveling around the world in support of the Clinton Global Initiative (CGI).
...
Anahi SantiagoCISO, ChristianaCare Health SystemAnahi Santiago is the Chief Information Security Officer at ChristianaCare Health System, the largest healthcare provider in the state of Delaware. Prior to CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. In her role as CISO, Anahi has overall responsibility for the organization's ...
Craig NewellManager, Information Security, Ontario Cannabis StoreCraig is in the business of mitigating privacy and data loss disasters. Constantly keeping abreast of new challenges and developments in the industry, he has evangelized risk-based security and control through the banking and utility industries, private business, governmental agencies, and now, online sale of a really exciting product. A beli...
Bruce SchneierSecurity and Cryptography Expert and AuthorBruce Schneier is an internationally-renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the best-seller "Click Here to Kill Everybody"—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over ...
Arvin VermaSr. Strategic Advisor & vCISO, Sentinel TechnologiesArvin Verma is a highly motivated cybersecurity professional, with over 14 years of experience across a multitude of cyber and IT domains. He has worked in multiple industries spanning over 5 Fortune 500 companies and Big 4 consulting. He is currently a vCISO within the SMB segment.
In addition, Arvin proudly served in the US Navy Rese...Samantha DuttonPresident , DuHart ConsultingDr. Samantha Dutton is the President of DuHart Consulting where she works with her husband in addressing cybersecurity business needs, as it impacts the human factor. She is also an Associate Dean and the Director of the Social Work Program in the College of Social and Behavioral Sciences at the University of Phoenix. She is a Licensed Clinic...
Calvin NoblesCybersecurity Policy Fellow, New America Think Tank, New AmericaDr. Nobles is a Cybersecurity Scientist and practitioner with more than 25 years of experience. He teaches cybersecurity at several universities. He recently retired from the Navy and is currently employed in the Financial and Services Industry. Dr. Nobles is a Cybersecurity Policy Fellow with the New America Think Tank. He authored a book on...
Joseph FontecchioDirector of Infrastructure and Database Services, The University of MassachusettsJoe is currently the director of infrastructure and database services for The University of Massachusetts Information Technology Services department, leading a team of security professionals who support infrastructure and applications used to host shared services. He holds a master’s degree in Information Technology from Worcester Polytechnic...
Girish ChiruvoluDirector, Information Security Risk Management, ExperianDr. Chiruvolu is a CISSP/CISM and has spent several years in the security industry and in particular Finance/e-Commerce and Enterprise industries on cloud/SaaS technologies. He is currently Director Information Security and risk management, and has lead several successful programs on several fronts of Information Security, Risk management and...
Helen PattonAdvisory CISO, Cisco; Former CISO, The Ohio State UniversityWith more years working in the Security, Risk, Privacy and Resiliency professions than she cares to say, Helen Patton advocates using information risk, security and privacy to enable the mission of organizations and to support society at large.
Helen is an Advisory CISO at Duo Security (now CISCO), where she shares security strategies ...
Rori Boyce-WernerInformation Security Compliance Program Manager, University of New HampshireRori Boyce-Werner is currently the Information Security Compliance Program Manager for the University of New Hampshire, where she was previously the Associate Director of IT Client Services and Identity and Access Management Service Owner.She holds a Bachelor’s of Science in Business Administration and is working towards her Masters of Cybers...
Michael GoughFounder, IMF SecurityMichael is a Malware Archaeologist, Blue Team defender, Incident Responder and logoholic. Michael developed several Windows logging cheat sheets to help the security industry understand Windows logging, where to start and what to look for. Michael is co-developer of LOG-MD, a free tool that audits the settings, harvests and reports on malicio...
James BairdFounder and Manager, Cybersecurity Management Consultants, LLCAs a CISO, James has seen his role oversee all the programs and processes involved with Information Security, Operational Security, Technology Risk Management, and IT Compliance, . He has designed and implemented security programs using the ISO 27001, NIST RMF, NIST ICTSCRM, NIST CSF, and ITIL. James holds a Master of Science degree in Inform...
Bryan InagakiSr. Director, Cybersecurity Risk Management & Solutions, Thermo Fisher ScientificBryan's path to information security was anything but direct, and he took a few detours in the worlds of small business, federal law enforcement and financial services before finding himself fully entrenched in the industry. As a physical security professional first and an information security professional second, Bryan enjoys the challenge o...
John HeltSecurity Operations Center Manager, Discovery, Inc. (Formerly Scripps Networks)I have considered myself a "hacker" from the moment I turned on my TI-99/4a. My insatiable curiosity has driven me through a career in IT Operations and InfoSec with both Hewlett Packard (10 years) and Discovery (Scripps Networks Interactive, 18 year). I hold a MS in Information Systems Management and current CISSP-ISSAP, CEH, and CCENT certs...
Candy AlexanderPresident, ISSA International; CISO, NeuEonMs. Alexander has over 30 years of experience in the cybersecurity profession. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed corporate security programs. She is now working as a CISO and Cyber Risk Practice lead for NeuEon, Inc., assisting companies large and small to improve t...
Sandy SilkDirector, Information Security Education & Consulting, Harvard UniversitySandy Silk is the Director of Information Security Education and Consulting at Harvard University, Founder of Cyber Risk and Resilience Consulting, and a member of the Board of Advisors for the MS in Information Security Leadership at Brandeis University. She excels at bringing together executive leaders, business teams, and IT professionals ...
Mike BrannonDirector, Infrastructure & Security, National GypsumMike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."
Brandi KeoughInformation Security Analyst, Novant HealthBrandi Keough is a Charlotte, North Carolina, native who started her college career at UNC Charlotte as a Chemistry major and graduated from Utica College in 2016 with her Bachelors of Science in Cybersecurity and Information Assurance with a concentration in Forensics and Investigations. Brandi is currently an information security analyst wi...
Bernie McGuinnessIT Risk Lead, Campbell Soup CompanyBernie is a cybersSecurity professional with over 20 years’ experience, both hands on and regulatory compliance of multiple complex systems within the Department of Defense and the commercial space. He provides in-depth knowledge on Third-Party Risk Management, Information Security, Assurance, Audit, and IT Operations, within industry. Holder...
Ian BurkeEnterprise Information Security Manager, Road ScholarCurrently the Enterprise Information Security Manager for Road Scholar in Boston, Ian Burke has been working in information security for over 20 years, completing his master’s degree in Information Assurance in 2013. He has worked for companies such as TJX and IBM in the business sectors and Middlebury College in the education sector. He has ...
Dr. Raj SachdevProfessor, Researcher, Lawyer, EducationDr. Raj Sachdev is a professor, researcher, and internationally qualified lawyer (USA and England/Wales). He holds several degrees in business and law and has guest spoken at such institutions as Oxford, Cambridge, Stanford and major industry conferences including having given a TEDx talk. Over the last 15 years, he has taught 50+ differe...
Barry HerrinFounder, Herrin Health Law, P.C.Barry Herrin is the Founder of Herrin Health Law, P.C., a boutique law practice located in Atlanta, Georgia. He regularly assists health care providers in all segments of the industry on health care operations and compliance, medical information privacy and confidentiality, cybersecurity, and data breach response. He is admitted to the bars o...
Tariq ShaikhIT Program Manager, AetnaTariq Shaikh leads the Privileged Access Management practice for Aetna as part of their Global Security team. Tariq has more than 20 years of technology experience and is a certified project manager and information systems security professional. Tariq is an SME in the Privileged Access Management space and has spoken extensively about it at i...
Zubaid KazmiSr. Manager and IAM Practice Lead, SilaZubaid is a Sr. Manager and Identity and Access Management Practice Lead at Sila. With close to two decades of consulting experience, he has helped Fortune 500 organizations develop Identity and Access Management strategies and solutions. Zubaid has worked with clients across multiple industries, including financial services, telecommunicatio...
Greg BennettProgram Manager, Air Force CyberWorx, Center for Technology, Research and CommercializationAir Force Officer for 22 years culminating as the Director of Research for a Department of Defense and Dept. of Homeland Security interagency research center delivering capability to the Homeland Security Enterprise and the Air Force. He was the CEO for a small business in Colorado Springs for 14 years and is currently the program manager and...
Wayne TynesSr. Sales Engineer, MimecastWayne Tynes is a Sr. Sales Engineer at Mimecast and has been designing solutions on Microsoft’s enterprise software stack for over 20 years, including working for Microsoft as a field sales engineer and SharePoint product manager. Wayne spent 5 years as a Solutions Architect at Avanade and was responsible for their Managed Services business i...
Ashwin PatilSr. Security Analyst , MicrosoftAshwin Patil currently works with Microsoft as Senior Security Analyst in Redmond, WA, with over nine years of Blue Team experience in security monitoring and Incident Response. His core work areas are security analytics, threat hunting using Big Data and SIEM technologies with strong interest in Data Science and Machine Learning to analyze s...
Clint HarrisConsulting Systems Engineer, Cloud Security, CiscoClint is a Consulting Security Engineer with Cisco. He has over 19 years of experience in information security. Originally from New Zealand, he was an Avionics Engineer in the Royal New Zealand Airforce for five years before entering civilian life as a System Administrator with Peace Software. Experiencing a company breach and response first-...
Rich ComptonPrincipal Network Security Engineer, Charter CommunicationsRich Compton has been working at ISPs for the last 20 years. He was the very first Network Security Engineer at Charter Communications and has been working in the cable industry for the past 16 years. In his tenure at Charter, he has dealt with all facets of network security. He now focuses on DDoS detection and mitigation, stopping botnets, ...
Tim McCainCISO, City of AuroraTim McCain is the Chief Information Security Officer for the City of Aurora, Colorado. He has been in the governance, risk, and compliance industry for 18 years at the manager, director, and CISO level of start-ups to multi-national corporations, including public and private sector. He sees his role as a business enabler, driving meaningful b...
Aleta JeffressChief Information & Digital Officer, City of AuroraAleta Jeffress is the Chief Information and Digital Officer for the City of Aurora. She has over 20 years as a successful executive business leader and technologist building relationships between business and technology to enable digital transformation and market growth. She drives innovative strategies for business and IT leadership, and ...
Kurt JohnsonSecurity Engineer, Check Point Software TechnologiesCheck Point Security Engineer, three years;
Pro Serve/Consultant, four years;
Sr. Engineer in Financial Services, six years;
Firewall Monkey, two yearsLt. Col. Robert SiauCyber Division Chief, Washington Air National GuardLt. Col. Robert A. Siau is currently serving as the Cyber Division Chief for the 252 Cyberspace Operations Group and duel-hatted to the Washington Joint Forces Headquarters as the Operational Cyber Planner.
Siau is a seasoned cyberspace operator, serving more than 17 years in cyber missions. During Siau's Command of the 262 COS he led ...
Philip MarshallSr. Director, Product Marketing, SecurityScorecardPhil Marshall is a security industry veteran with more than 17 years of experience in both network and data security. At SecurityScorecard, he oversees the company’s go-to-market strategy in partnership with the product management organization. Prior to joining SecurityScorecard, Phil worked at security firms Black Duck, Cryptzone, Rapid7, an...
David CardwellClient Solutions Advisor, OptivDavid Cardwell is a client solutions advisor in Optiv’s major accounts team. In this role he specializes in aligning information security solutions that enable an organization to meet their current and future goals. David has more than 13 years of experience in information security, ranging from frontline support, consulting, and security arc...
Kristopher DaneDirector of Digital Design, Thornton TomasettiKristopher is the Director of Digital Design based out of the Seattle office of Thornton Tomasetti, an international structural engineering firm. Kris has 11 years of experience managing teams, administering technology, and developing custom tools to support the design of over 5 million square feet of structures around the world. In collabora...
Seth KulakowDirector, PromontorySeth is a director in Promontory’s cyber practice, where he advises clients on all aspects of tactical and strategic cybersecurity. He has more than 20 years of experience providing dynamic, secure, and cost-effective security solutions and programs. He has served in senior information security positions at companies ranging from startups to ...
Emily ShipmanSr. Product Manager, RSAEmily Shipman is a senior product manager, responsible for RSA Archer’s Integrated Risk Management offerings. Emily previously spent seven years in Archer’s presales consulting group, working with hundreds of GRC customers globally to develop tailored solutions for cutting-edge risk management. As a product manager, she drives Archer’s innova...
Nick ButcherSr. Engineering Program Manager, Security/GRC, MicrosoftNick is a senior program manager within the Digital Security and Risk Engineering group at Microsoft, where he is responsible for designing, developing, and deploying GRC (Governance, Risk, and Compliance) automation to support every division at the company. Focused on modernizing existing work efforts and building entirely new processes fro...
Moderator: Derek IsaacsSr. Cybersecurity Scientist, L3 HarrisAuthor, speaker, and SME. Specialties and certifications include: CISSP, CRISC, CGEIT, Security+, C|EH, C|NDA, ITILv.3, C|CISO
Eric WongSecurity Engineer, West, ComodoEric Wong is an experienced security engineer with 15 years in the security industry. He has worked with many different security technologies and F-500 clients over the years, focusing on architecting and deploying secure environments. Eric brings the unique expertise of working on both sides of the isle, from the client-side practitioner r...
Cathy HallSr. Manager and Cybersecurity Architect, Sila Solutions GroupCathy is a cybersecurity leader with 18 years of experience providing specialized IT Services to Fortune 500 companies and government agencies, specializing in Identity and Access Management, Information Security, Enterprise Applications and Business Process Management. Cathy brings a unique mix of Federal and Commercial cybersecurity experie...
Zachary LimacherSr. Manager and PAM Practice Lead, Sila Solutions GroupZachary Limacher is a cybersecurity leader, business architect, and strategist with 19 years of experience in architecting and implementing enterprise cybersecurity solutions. He has worked in both consulting and corporate roles. Prior to joining Sila, Zach led Access Management at Charles Schwab & Co. Zach is the Privileged Access Management...
Stacy ScottManaging Director, Cyber Risk, KrollStacy Scott is a Managing Director in Kroll’s Cyber Risk practice, based in Dallas. In addition to founding and operating her own consultancy, Stacy has served in high-profile roles with a leading cyber security consulting firm, a Big Four accounting firm, and the largest not-for-profit healthcare system in Texas. She joined Kroll with over 1...
Deneen DeFioreSVP, Global Chief Information & Product Security Officer, GE AviationDeneen currently serves as SVP, Chief Information & Product Security Officer, for GE Aviation in Cincinnati, Ohio. And most recently she has taken on an expanded role for GE Aviation as co-leader of Aviation’s Digital League 2.0. She has also served as SVP, Chief Technology Officer, Security & Compliance, for GE Digital.
She is respons...
Jesse HoodDirector, DarktraceJesse Hood is a Director at Darktrace, the world’s leading cyber AI company. Jesse has helped many enterprise organizations and SMB’s throughout Colorado and the neighboring states deploy cyber AI to detect and stop emerging threats. He works with businesses across a range of industries, including finance, healthcare, biopharma, local governm...
Anne-Marie ScollaySr. Program Manager, MicrosoftPrior to joining Microsoft, Anne-Marie was the CISO for Axiom Law, where she led the information security strategy for Axiom's products/services, corporation, and governance, risk and compliance (GRC). Before that, she built out and oversaw the infrastructure and security for a Seattle-based SaaS startup and global multi-nationals. Anne-Marie...
Colonel Jeffrey CollinsDirector, Air Force CyberWorxJeff “T-Rex” Collins (PhD, Carnegie Mellon University) is the Director of Air Force CyberWorx, a unit comprising a public-private research and design center located at the Air Force Academy in Colorado. Jeff is the former Deputy Director for Cyberspace Strategy and Policy at the Pentagon and Director of Staff for the Air Force CIO. He recentl...
Co-Presenter: Rich MossHead of Delivery, Mirador, LLCRich Moss is a nationally known technology executive with 17 years of IT leadership experience. Rich started his career designing security and remote connectivity solutions. He has a proven track record of translating business requirements into technical objectives and ensuring execution of complex whole-corporate initiatives. Rich has develo...
Bhuvaneswari RamkumarEngineering Team Lead and Product Owner, GE DigitalBhuvana is a product leader in the field of IoT security. She has a decade of experience both in enterprise companies and startups, wearing engineering as well as product hats. In her current leadership avatar, she leads a team that has built and shipped a variety of IIoT security applications.
JT GaiettoExecutive Director, Cybersecurity Services, Richey May & Co., LLPJT has over 18 years of experience providing enterprise information security and risk management services to a variety of organizations, with a particular emphasis on the financial services industry. He has been a Certified Information Systems Security Professional (CISSP) since 2003, and holds an undergraduate degree in Computer Information ...
Sam MasielloCISO, The Anschutz CorporationSam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to The Anschutz Corporation, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the pro...
Matt ShufeldtCISO, Cognizant HealthcareWinner of the CTA APEX 2017 (inaugural) CISO of Year award, Matt Shufeldt is a leader in the Cyber Security community with 25+ years working professionally in multiple areas of Information Technology. Matt has been a CISO in multiple industries and is the current CISO for Cognizant Healthcare. As a passionate technologist and an avid believer...
Barry KimballSystems Administrator, VFIS of OhioBarry is a Material Science Engineer turned IT System Admin Contractor. He runs the Cincinnati chapter of SMBA (Security Master Beer Appreciation) and is a member of ISSA. He enjoys tinkering with materials that make computers work—through logic electric circuits to board OS's and coding—covering a wide range of the field of IT. His favorite ...
Matt ScheurerChair, CiNPA Security SIG, Financial Services industryMatt Scheurer is a Systems Security Engineer working in the Financial Services industry and serves as Chair of the Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG). He holds a CompTIA Security+ Certification and possesses multiple Microsoft Certifications including MCP, MCPS, MCTS, MCSA, and...
Gary McMullenLead Security Analyst, Great American InsuranceGary McMullen is currently a Lead Security Analyst for the Financial/Insurance industry but has previously utilized his information security skill set to defend the Healthcare industry for nearly two decades. He currently resides in his second term as the president of the Cincinnati Tri-State chapter of the International Information System S...
David HowardSecurity Administrator, 19-facility Healthcare SystemDavid Howard is a CISSP, Certified Ethical Hacker, and holder of many other certifications. He also has 20 years of experience and currently is the senior member of the security staff of a regional hospital system. He is the host of Bring Your Own Security Radio, heard on iHeartRadio's app and many of their AM/FM stations nationwide, and is k...
Nick FerrellTechnical Engineer, Trend MicroNick Ferrell has been helping Trend Micro customers across the world solve security challenges since 2011 as a senior engineer and professional services consultant. A primary focus of this work has been assisting enterprise organizations achieve a unified, automated, and effective set of security controls across diverse cloud and data center ...
Matthew GioiaAssociate Director, IT Security & Compliance, St. Louis Community CollegeMatthew Gioia is Associate Director for IT Security & Compliance at St. Louis Community College where he works with students, faculty, and staff to secure student and employee data. Matthew believes the community is best served with an education partner focused on helping every student establish and work towards achievable goals, and that dev...
Patrick WoodsAsst. Director, Cybersecurity & Technology / CISO, Missouri State Highway PatrolPatrick J. Woods serves as the Chief Information Security Officer for the Missouri State Highway Patrol (MSHP) and the Assistant Director for Cybersecurity & Technology in the Patrol's Criminal Justice Information Services (CJIS) Division. In this capacity, Patrick directs the Patrol's cybersecurity and technology efforts to include network, ...
Micah BrownVice President, Greater Cincinnati ISSAMicah K. Brown is a member of the IT Security Engineering team at American Modern Insurance, part of the Munich RE Group. Over the past two years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations located in North and South America. In this role Micah has learned the many intr...
Tom MooreConsulting Sales Engineer, Cloud Security, CiscoTom has more than 20 years of experience in the information security industry. He has extensive experience in corporate security policy review and design, auditing, vulnerability testing and analysis, network security and application administration. He has held positions as a chief security officer for a worldwide leader in broadcast televisi...
Pratik LotiaSecurity Engineer III, Charter CommunicationsPratik Lotia is a Security Engineer at Charter Communications, responsible for developing new architectures related to firewalls, IDS/IPS, and botnet detection.
Mohamed MalkiDirector, Enterprise Security Architecture, Colorado Governor's Office of ITMohamed Malki, director of enterprise security architecture and HIPAA officer, has been key in transforming the State of Colorado’s security landscape. He’s been critical in building Colorado’s cybersecurity plan, designing Colorado's public cloud architecture and building the requirements for Colorado's Blockchain center of excellence. Moham...
John MacintoshSr. Systems Engineer, Comodo CybersecurityJohn is a Senior Systems Engineer with over 10 years of experience in the security field. He’s previously worked with other cybersecurity firms such as Centrify, bringing trust to devices, users, and applications, and Barracuda Networks, where he worked on a wide range of perimeter defense technologies.
Jenifer ClarkInformation Security & Compliance Engineer, Costco WholesaleExperienced Information Security Professional with a demonstrated history of working in the retail industry. Skilled in Operations Management, Sales, Management, Point of Sale (POS) / Fuel Systems, and Inventory Control. Strive to find ways information security can enable and support business and operations teams with solutions. Actively supp...
Mary RowleyIT GRC and Cybersecurity ProfessionalMary’s several years of leadership experience encompasses many areas of cybersecurity with a focus on IT risk management, IT audit, security awareness training, vulnerability management and incident response. Her extensive information security background includes working at Henry Ford Health System, Comerica Bank, WorkForce Software, Learning...
Stephanie ScheuermannTechnical Leader, Cyber Threat Intelligence, Ford Motor Company; President, Michigan InfraGard Members AlliancePaul GrollDirector of Cloud Services and Research, Department of Technology, Management, and Budget, State of MichiganPaul Groll is a dislodged UP'er and a recovering coral reef theoretical ecologist. At some point, he got roped into a broad array of computer-related research projects at both the University of Hawaii (1984) and Michigan State University (1981, 1990). SCUBA tanks are heavy, so he eventually switched fields and moved into computer science (hey...
Joe OlerichSystems Engineer, RadwareJoe Olerich is a Systems Engineer for Radware. He works on the front lines designing cutting-edge security solutions to aid organizations in defending against the growing threat landscape. Over his 15 years of experience, Joe has engaged in a variety of roles, from designing networks and managing infrastructure, to running network and applic...
Zachary BriggsCorporate Compliance Counsel, PaycorZach Briggs is Corporate Compliance Counsel at Paycor, a human capital management SaaS company based in Cincinnati. He has a management degree from Purdue University and his Juris Doctor from Northern Kentucky University. Zach enjoys seeing how things work and making them work better. He is responsible for driving compliance initiatives acros...
Dan CollinsSecurity Technical Solutions Architect, CiscoDan Collins is a Security Technical Solutions Architect for Cisco Systems. Dan has over 25 years in the Information Security industry, including nine of those years serving in the United States Air Force, focusing on Information Security.
Jennifer CzaplewskiDirector in the Information Security Team, TargetJennifer Czaplewski is a Director in the Information Security team at Target. She leads Product Analytics, Security Ninjas, Cyber Risk Management, and Product Security Engineering functions. Jennifer has been with Target for 12 years and in Information Security for 8 years. Prior to her time at Target, she led efforts in Corporate IT at Pfize...
Jadee HansonCISO, Code42As chief information security officer at Code42, Jadee Hanson leads global risk and compliance,
security operations, incident response, and insider threat monitoring and investigations. To her
position, she brings more than 15 years of information security experience and a proven track
record of building security programs.Sanur SikdarTechnical Specialist Manager, DeloitteSanur is experienced in enterprise and solution architecture, security architecture and design, cloud architecture, threat modeling, Secure DevOps, application development, software testing, and connected vehicle security.
John FaheyCybersecurity Specialist, InfobloxJohn Fahey is a technical consultant with over 25 years of experience in infrastructure and security solutions. John’s career spans healthcare, telecommunications, and software manufacturers such as EMC, Intel Security, McAfee and Splunk prior to his current role as Product Security Specialist with Infoblox’s BloxOne Threat Defense solution....
Brian GorencDirector, Vulnerability Research, Trend MicroBrian Gorenc is the Director of Vulnerability Research with Trend Micro. In this role, Brian leads the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers ...
Scott M. GiordanoVP, Corporate Privacy, and General Counsel, SpirionScott M. Giordano is an attorney with more than 25 years of legal, technology, and risk management consulting experience. IAPP Fellow, CISSP, CCSP, Scott is also former General Counsel at Spirion LLC, where he specialized in global data protection, tech, compliance, investigations, governance, and risk. Scott is a member of the bar in Washing...
Brian CadyPrincipal Enterprise Security Architect, Providence St. Joseph HealthBrian Cady has been working in the information technology industry for more than 20 years with an exceptionally broad background focusing on security, architecture and future technologies. Brian has held leadership positions for IBM and Microsoft along with banking, airline and gaming companies. He is currently leading the Security Strategy &...
Lenny MalyVP, Cybersecurity Architecture & Engineering, Capital OneLenny is the former of VP of Cyber for Capital One, leading the Security Engineering and Architecture tower. Prior to that, Lenny was at Target, where he lead a number of security engineering organizations, including Cloud Security, Vulnerability Management, and Cybersecurity.
Timothy ColbyRegional Account Executive, Comodo CybersecurityTim has been selling and consulting in the Information Security industry for nearly 7 years. He has worked alongside security practitioners within Small-to-Medium size businesses up go Fortune 10 companies, delivering numerous security products and services throughout the years. Tim is responsible for developing Comodo Cyber Security’s chan...
Michael WestraConnected Vehicle Cyber Security Technical Manager, Ford Motor CompanyMichael Westra is the Connected Vehicle Cyber Security Technical Manager at Ford Motor Company focused on cybersecurity for connectivity into vehicles and connected technology, including embedded modems, infotainment, cloud, and mobile systems. Mike has 20 years at Ford, with roles including leading software architect for SYNC, Solution Archi...
Thaddeus HoffmeisterLaw Professor, University of DaytonLaw professor who is writing a book on IoT and the law.
Hema LakkarajuCEO & Founder, HAYAG CorpHema Lakkaraju has worked in the healthcare industry for 10 years in software and IT compliance.
Christine WantaCSO & Founder, CSO4Less (a cfw1 company)Over 35 years of security, technology, and business leadership experience with expertise in delivering complete, effective, and strategic security solutions across a breadth of industries, including those with regulatory requirements as well as Secret/Top Secret environments. Proven expertise in DLP solutions across industries including globa...
Brent LassiCISO, Bluecore, Inc.Brent Lassi is currently the CISO at Bluecore, Inc. He has nearly 20 years of experience in the information security field. Brent's previous roles include CISO at Carlson Wagonlit, Director of Information Security at UnitedHealth Group, CISO and VP of Information Security at Digital River, Inc. for a decade. He also co-founded one of the worl...
Brian BoboCISO, Sun Country AirlinesBrian Bobo is the Chief Information Security Office for Sun Country Airlines in Eagan, Minnesota. He is responsible for all aspects of the security and disaster recovery strategy, implementation, and effectiveness. Sun Country Airlines focuses on vacation destinations taking vacationers to the tropical beaches of Mexico, Costa Rica, and the...
Sujata RamamoorthySr. Director, Information Security, CiscoSujata is a Sr. Director of Information Security at Cisco and leads the group. Sujata and her team partner across Security & Trust Organization, Supply Chain, IT and various Product teams to deliver foundational capabilities to secure Cisco’s business operations and Cloud Offers. This includes establishing security standards, partnering to bu...
Jimmy SandersHead of Information Security, Netflix DVDJimmy has spent the better part of two decades securing data and systems from cyber threats. In addition to his duties at DVD.com, Jimmy has served as the San Francisco Bay Area chapter president of the Information Systems Security Association (ISSA) since 2014. He is also on the ISSA International Board of Directors. Furthermore, he has been...
Robert TroupExecutive Sales Manager, baramundi Software USA Inc.Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex netw...
Bruce SussmanDirector of Media & Content, Podcast Host, SecureWorldEmmy-winning journalist Bruce Sussman spent more than 20 years on TV screens in Portland, Oregon. During his "second career," he became fascinated by cybersecurity while working with CISOs at Gartner. He joined SecureWorld in 2017 to help grow its media division. Currently, he hosts the Remote Sessions daily web conference series and SecureWo...
Miles EdmundsonBusiness Information Security Officer, EquintiMiles has spent over 20 years in senior and executive leadership positions building cybersecurity programs with global and national companies across a variety of vertical markets. He has experience in risk assessments, remediation prioritization, business continuity management/disaster recovery, incident response, policy/standard development,...
John SchielPrincipal InfoSec Engineer, CenturyLinkJohn has over 12 years of hands-on experience in network and information security and security architecture. John was the primary DDoS architect and provided direction and support to Network Operations on how to best protect CenturyLink’s network from DDoS attacks. He has decades of cross functional network and application experience and toda...
Kurt AubuchonFounder and Principal Consultant, Portunus ConsultingKurt is a computer forensics and incident response consultant and an Assistant Professor of Cybersecurity at Maryville University. He has been in the IT field for nearly 20 years, with the last 11 focused on information security.
Chris SorensenSr. Cybersecurity Researcher, GE DigitalChris Sorensen has been in the IT industry for over 30 years practicing a wide range of specialties in multiple industries. He started in the Defense industry as a system administrator and developer before progressing to the Education sector where he taught system administration and security. From there he moved into the Automotive world wher...
Victoria ThomasCybersecurity Awareness Program LeaderVictoria L. Thomas is an award-winning senior leader with talent for designing, developing and implementing world-class, global cybersecurity awareness programs. With nearly 10 years experience, she brings a strong creative perspective to the field and provides practical solutions that not only build awareness, but also cultivate advocacy and...
Ryan AniolDeputy CISO, State of MinnesotaRyan Aniol is the Deputy CISO for the State of Minnesota. A cyber threat expert with over 19 years of cyber security experience, Ryan has specialized in cyber threat intelligence, threat actor profiling, incident response, penetration testing, and digital forensics spanning multiple industries. He is a recognized security researcher and thoug...
Lothar DetermannPartner, Baker McKenzieLothar has been helping companies in Silicon Valley and around the world take products, business models, intellectual property, and contracts global for nearly 20 years. He advises on data privacy law compliance, IT commercialization, copyrights, open source licensing, electronic commerce, technology transactions, sourcing, and international ...
Teresa MerklinCyber Fellow, Aeronautics Cyber Range, Lockheed MartinTeresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Chr...
CSO CouncilTim WittenburgInformation Security Officer, FPX, LLCTim Wittenburg is the Information Security Officer at FPX, LLC, a B2B company providing industry-leading CPQ software that improves sales force productivity by preparing complete and accurate product quotations. As ISO, Tim is responsible for the delivery of a catalog of security and compliance services based on industry leading cybersecurity...
Co-Presenter: Joseph SzmadzinskiCEO, IT Management ResourcesJoseph R. Szmadzinski has served as interim and permanent CIO (over 12 times) or as an advisor to the chief executive teams/ officers to troubleshoot, restructure, and manage client systems during turnaround, growth, and profit improvement efforts. Joe has served clients in a wide variety of industries, including financial services, transport...
Milinda Rambel StoneVP & CISO, Provation MedicalMilinda Rambel Stone is an executive security leader with extensive experience building and leading security programs, including Information Security Governance, Vulnerability Management, Incident Investigation & Response, Security Awareness, and Risk Management & Compliance. With significant experience in creating and managing large-scale in...
Donald SmithPrinciple Security Architect, CenturyLinkDonald Smith is responsible for technology leadership, proposals, and strategic direction. His contributions include DCID 6/16, NISPOM chapter 8, DNS changer working group (DCWG), Conficker WG, and numerous security BCPs and RFCs. He has been a SANS handler since 2002. He has spoken at many conferences; including NANOG 33,42,52,71; University...
Moderator: Kristin JudgeCEO & President, Cybercrime Support NetworkKristin Judge founded the nonprofit Cybercrime Support Network in 2017 to be a voice for cybercrime victims. She's a national speaker, sharing cybersecurity best practices with elected officials, businesses, and consumers. She's appeared on the C-SPAN Network and local news outlets, and been called on by numerous technology publications, to s...
Tam NguyenCybersecurity Engineer, CISSP, MS, MCS, MA, U.S. Department of Health and Human ServicesTam Nguyen is an IEEE and ACM peer-reviewed cybersecurity researcher whose with recent publications on Software Defined Network's security (CSNet - Paris, France), and instructional design evaluation of CEH v10 Online Course (IC4E - Tokyo, JP). Tam's research interests include large-scale cyber threat modeling, cyber behavioral science, and a...
Michael LandeckCISO & Executive Director, Social Interest SolutionsMike Landeck led the security implementation and then operationalized two of the country’s largest cloud-based healthcare IT projects. He has been responsible for the overall security of systems with financial transactions of over $4 billion per month, as well security programs regulated by HIPAA, SOX, PCI, FISMA (NIST 800-53), the IRS (FTI I...
Peter ChestnaCISO of North America, CheckmarxPete Chestna serves as the CISO of North America at Checkmarx, where he provides customers and prospects with practical advice for building successful application security programs. Bringing more than 15 years of direct AppSec practitioner experience, Pete has held roles ranging from developer and development leader to his most recent positio...
Ryan MostillerSr. Manager, IT Security, BorgWarnerRyan Mostiller is a security leader in the Metro Detroit community, currently serving as the Security Operations Manager for BorgWarner. After more than a decade in both technical and management roles in security, Ryan enjoys any opportunity to engage with fellow practitioners and share learnings. Ryan has worked across various industries and...
Skip HansenVice President of IT Operations, APi Group, Inc.Keith ‘Skip’ Hansen is the Vice President of IT Operations at APi Group Inc., a multi-billion-dollar parent company to more than 40 independently managed life safety, energy, specialty construction and infrastructure companies located in over 200 locations worldwide. Skip is responsible for aligning APi’s information technology strategy with ...
John BassDirector, Global Data Risk, Duff & PhelpsJohn W. Bass is a director in the Global Data Risk Practice at Duff & Phelps. John is an acknowledged thought leader on risk management, the human dimensions of cyber risk, and insider threats. John was a Central Intelligence Agency (CIA) National Clandestine Service (NCS) operational executive with 27 years in national security and internati...
Jeremy BarnettSVP, Marketing and Business Development, NAS InsuranceJeremy Barnett is Senior Vice President of Marketing and Business Development for NAS Insurance, based in Los Angeles. Jeremy works across all NAS lines of business including Cyber, Specialty Products and Reinsurance solutions to provide brand strategy, product marketing, sales training, and producer support. Barnett is responsible for all co...
Ernie HaydenFounder & Principal, 443 Consulting LLCErnie Hayden is the Founder and Principal of 443 Consulting LLC. He holds a CISSP, CEH, GICSP (Gold), and PSP. Ernie's consulting experience includes work on every continent except Antarctica.
Mark LangfordPrincipal Consultant, Aberfoyle AssociatesMark is the Founder and Principal Consultant at Aberfoyle Associates, a Plano based cybersecurity consulting firm. Mark is a Board Member of the North Texas ISSA, was recently inducted into Infragard, and is called upon periodically to speak at cybersecurity industry events. He holds a Bachelor’s Degree in Management from Clemson University a...
Justin BermanCISO, ZenefitsJustin is the CISO at Zenefits. Previously he lead security at Flatiron Health, lead security architecture at Bridgewater Associates, and built business at Aspect Security. He focuses on data and adversary driven approaches to security, and on centering security in business value.
Steve BrownThe Bald Futurist, Former Chief Evangelist and Futurist, IntelSteve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.
Steve is passi...
Judy QuintonInformation Security Officer , CIBC Bank USAJudy Quinton is a driven professional and highly-skilled executive who is responsible for implementing innovative risk-based problems that address cybersecurity requirements while meeting strategic goals. Judy joined The PrivateBank, now known as CIBC Bank USA, as the Information Security Officer in 2011. Before that she worked at Xerox, HSBC...
Torsten GeorgeSr. Director, Product Marketing, CentrifyTorsten George is a security evangelist at Centrify and frequent speaker on cybersecurity, identity and access management, and risk management strategies worldwide. He regularly provides commentary and byline articles for media outlets, covering topics such as data breaches, incident response best practices, and effective cybersecurity defens...
Zoe LindseyCustomer Advocacy, Duo SecurityZoe Lindsey is Duo Security’s Advocate Manager, where she educates and advises organizations with unique compliance challenges including the healthcare, government, and financial industries on strong security policy and best practices. She has been hooked on tech since getting her first Commodore 64 at age 10, and joined Duo with a background...
Fatih OrhanVP, Threat Labs, Comodo CybersecurityWith more than 15 years of experience in the technology industry, Fatih Orhan brings a great deal of expertise to his role as director of Comodo Cybersecurity’s Threat Research Lab (CTRL). Working with over 200 security analysts, Orhan and his digital intelligence team are committed to using the best combination of cybersecurity technology an...
David BentonDirector, The American Society of Digital Forensics & eDiscovery (ASDFED)In 1994, David began his investigative career as a Counterintelligence Special Agent. During his tour, he conducted numerous investigations across multiple continents. After the military, he joined the Georgia Bureau of Investigation and left as a supervisor on their computer evidence recovery team. He worked for a fortune 25 company and late...
Richard DeveraSecurity Architect, Check Point Software Technologies, IncRichard Devera is the Security Architect at Check Point Software Technologies, Inc.. His background includes 20+ years of industry security experience. Richard is involved in providing best practices security strategies for all areas in networking. He is considered on of the thought leaders within the company providing strategic and technolog...
Pierre-Olivier Fur, CISSPCybersecurity Manager, RadwarePierre is a Cybersecurity Manager for Radware, where he brings 20 years of experience in the Information Security space. He holds a Master Degree in Computer Science and is a CISSP. Wearing various hats over the years as programmer, open source security expert, cryptography evangelist, network security architect, and CISO. Pierre is currently...
John ShaiaDirector, Steiner Electric CompanyJohn has over 30 years of experience in information technology with leadership in data center operations, software development, change management, network infrastructure, security, business continuity, acquisition integration, and transforming technology teams to become business focused.
Currently, John is a Director at Steiner Electri...
Charles WilliamsSolutions Architect, Trend MicroWith over 17 years in security and compliance, Charles is a technology evangelist enabling customers globally from a pre-sales and post-sales perspective to ensure proper deployment and configuration of endpoint, gateway, and datacenter security solutions.
Kim Dale, CISSP, CISAIT Audit Specialist , Federal Reserve Bank of ChicagoKim Z. Dale is an IT Audit Specialist at the Federal Reserve Bank of Chicago. Her previous work experience includes Northwestern University, the US Government Accountability Office (GAO), US Steel, and Management Science Associates. Additionally, she is a freelance writer, speaker, and playwright. Ms. Dale earned a master’s degree in informat...
Mary KavaneyChief Operating Officer, Global Cyber AllianceMs. Kavaney is the Chief Operating Officer for the Global Cyber Alliance (GCA), where she manages the daily operations of GCA, including strategy, personnel and legal responsibilities. She also engages in partnership development and outreach. Previously, Ms. Kavaney worked at the Center for Internet Security, where she developed relationships...
Aimee Larsen KirkpatrickGlobal Communications Officer, Global Cyber AllianceAimée Larsen Kirkpatrick is the Global Communications Officer for the Global Cyber Alliance (GCA), where she is responsible for strategic communications for the international nonprofit. Prior to GCA she was President of ALK Strategies, a communication and public affairs consulting practice. Aimée was formerly with the National Cyber Security ...
Alexandra PanaretosAmericas Lead for Human Cyber Risk and Education, EYWith a background in broadcasting and operational security, Alex specializes in secure communications and education, awareness program development, the psychology of social engineering, human-based risk mitigation, and behavior analytics. She has over 12 years of experience developing and implementing security awareness, communication, and ed...
Jeff ButlerFounder, JButler InternationalJeff Butler is a speaker, author and passionate millennial who helps organizations improve their relationships with millennial employees. Unlike other experts on millennials, Jeff has been in the trenches of what it means to be a millennial and what it takes to retain and keep them engaged. With Jeff ‘s versatile background, he has helped for...
Gary JohnsonSr. Director of Cybersecurity and IT Infrastructure, Kansas City Power & LightGary Johnson is a US Army veteran who has over 30 years of IT experience. He is the Sr. Director of Cybersecurity and IT Infrastructure for Kansas City Power & Light. Prior to that he spent 10 years at Cerner Corporation helping build their IT Infrastructure for the first five years and then led their security program the last five. He has a ...
Kenneth GeersSenior Fellow, Atlantic CouncilKenneth Geers (PhD, CISSP): NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate, TSN University of Kyiv Professor, Ukraine. 20 years US Government (US Army, NSA, NCIS, NATO); FireEye Senior Global Threat Analyst. Author “Strategic Cyber Security”, Editor “Cyber War in Perspective”, Editor “...
Tighe BurkePartner, JobplexTighe Burke is a Partner and Cybersecurity Practice Lead with Jobplex Inc. in Denver, securing the next-generation of leaders on behalf of technology clients around the globe. Tighe has developed powerful domain expertise executing searches for InfoSec functional roles as well as on behalf of security providers.
He previously spent 5 ...
Ryan EwingSpecial Agent, FBI Kansas City DivisionSpecial Agent Ryan Ewing has been with the FBI for over 8 years with assignments within Cyber Task Forces in the Miami Field Office, Columbia Field Office and Kansas City Field Office. He has had investigative cases for Cyber Criminal matters as well as Cyber National Security matters. Through the FBI continuing education program, he has held...
Steven ShalitaVice President, Marketing and Business Development, Pluribus NetworksSteven Shalita has 20+ years of technology experience across the Enterprise, Cloud and Service Provider technology segments. He has market and technology expertise spanning across Cybersecurity, network security, forensics, SDN/NFV, and IT infrastructure. He has spent a considerable amount of time in the performance monitoring marker and was ...
Celia CortesPresident, Seva 6 Security ConsultingCelia Cortes, is a Certified Forensic Interviewer (CFI), Licensed Private Investigator, and an Interviewer & Interrogations instructor. She has an extensive background in corporate security, investigations, security design, and personal safety. She is adept at planning, strategizing, and executing security and surveillance operations.
Aaron DeaconFounder & Managing Director, KC Digital DriveAaron Deacon is the founder and managing director of KC Digital Drive, a nonprofit civic organization with a mission to make Kansas City a digital leader and help cities adapt to disruptive technology change. He works with mayors, entrepreneurs and civic leaders in Kansas City and around the world to help build ecosystems that connect infrast...
Donna VieiraSecurity Risk and Compliance Analyst, Johnson County (KS) GovernmentDonna Vieira , CRISC, has been an Information Security Awareness Professional for since 1999. She is a Certified Risk and Information Systems Control (CRISC) through ISACA, which is designed for IT professional with hands-on experience with risk identification, assessment, evaluation, response and monitoring.
Justin DanielsAttorney, Baker DonelsonJustin Daniels is a thought leader in cybersecurity who believes cybersecurity must be treated by the c-suite as a strategic enterprise business risk. He provides strategic advice to companies to help them understand cyber risk and create a comprehensive approach to address it. Justin is general counsel to one of the largest enterprise data c...
Jon NeiditzPartner & Cybersecurity Practice Leader, Kilpatrick TownsendJon Neiditz co-leads the Cybersecurity, Privacy and Data Governance Practice at knowledge asset protection law firm Kilpatrick Townsend & Stockton LLP. Jon has been named a “Cybersecurity Trail Blazer” by the National Law Journal and a Ponemon Fellow, is listed as one of the Best Lawyers in America® both in Information Management Law and in P...
Joseph MunizCisco, Security ArchitectJoseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Joseph runs thesecurityblogger website, a popular resource for security and product implementation. He is the author and contributor of sev...
Scott SwansonBoard Member & Sector Chief Program Leader, InfraGard Chicago Members AllianceScott Swanson is a former cleared national security intelligence professional who has focused for the past decade on Business Risk Intelligence and Financial Crimes as a thought leader and practitioner. He currently works for PwC’s Financial Crimes Unit, is certified in Fraud Investigations, Mobile Forensics, Anti-Money Laundering, and focuse...
Norman ComstockManaging Director, UHY Advisors TAP, Inc.Norman is President and Managing Director of UHY Advisors TAP, Inc., a subsidiary of UHY Advisors, bringing over 25 years of experience in strategic consulting services. Norman advises clients on enterprise risk management, IT assurance and governance, and cybersecurity. He is also an Instructor for courses in Business Ethics, and Governance,...
Mia Boom-IbesVice President, Information Security Strategy, Innovation and Analytics, Allstate Insurance CompanyMia Boom-Ibes is Vice President, Security Innovation, Strategy and Analytics, ATSV for Allstate Insurance Company. In this role, she is responsible for Allstate's cybersecurity strategy and priorities. She manages relationships with key business and technology stakeholders to ensure alignment and oversees architectural standards to enable con...
James “Mark” HarlessSpecial Agent, FBISA Harless has been a Federal Law Enforcement Officer for 24 years, including 3 years as a Special Agent with The U.S. Air Force Office Of Special Investigation (AFOSI), and 21 years as a Special Agent with the FBI. SA Harless has over 11 years of leadership experience as an FBI Supervisor, and has a broad law enforcement background in matte...
Bruno Haring, CISSP, CIPT, CRISC, CISADirector and Market Leader, PwCBruno is a Director and Market Leader with PwC’s Cybersecurity and Privacy practice based in Atlanta, GA. With over 21 years of experience, both nationally and internationally, in cybersecurity and IT risk management and transformation. Bruno helps Fortune 500 organizations navigate and address cybersecurity, IT, and governance risks, resulti...
Brian MorovitzDirector of Sales Engineering, Trend MicroFor the past 10 years, Brian has helped organizations deploy and operationalize enterprise security solutions. With a background in customer success management, he built Trend Micro’s centralized premium support center of excellence in Las Colinas, Texas. Prior to Trend Micro, Brian led product launch, organizational change, process improveme...
Moderator: Pamela NigroSenior Director GRC, Blue Cross Blue Shield of ILPamela Nigro, MBA, CRMA, CISA, CGEIT, CRISC, is a multifaceted, highly experienced IT Audit and IT Controls leader who brings unique experience with experience with external Big 4 auditing, and cost-effective management of corporate risk and regulatory compliance with the 4th largest health insurance company. Ms. Nigro is a subject matter ex...
Moderator: Alisha WencCorporate Programs Manager, ISACAAlisha Wenc is the manager of corporate programs at ISACA. In her first year with ISACA, she launched the SheLeadsTech program, which has engaged over 1,000 members in its first 6 months. SheLeadsTech aims to increase the representation of women in technology leadership roles and the tech workforce. Alisha’s previous experience includes ex...
Diana SalazarCISO, College of American Pathologists (CAP)My experience consulting with organizations, corporate and non-profit, navigate the new digital frontier advising on cyber security issues and building technology strategies that drive performance and business value. I have led and managed implementations for organizations in a wide variety of industries, Global 2000, Fortune 1000, small and ...
Brenda CallawaySecurity Management and Risk Divisional Vice President, Blue Cross Blue Shield of IllinoisTed ClaypoolePartner, Womble Bond DickinsonLawyer, business adviser, lawfirm team lead for cybersecurity/privacy, licensing and FinTech, chair of American Bar Association, Business Cyberspace Law Committee, former in-house counsel for Bank of America and Compuserve, co-author of books Privacy in the Age of Big Data, and Protecting Your Internet Identity.
Tauseef GhaziPrincipal, RSM US LLPGhazi currently serves as a principal in RSM’s security, privacy, and risk practice with more than 15 years of infrastructure security, system implementation and application security review experience. He leads RSM’s security, privacy and risk practice for the Central Region and leads RSM’s critical infrastructure practice nationally. In his ...
Christopher KarInfoSec Advisor, Fort Bend ISDMr. Kar is the Information Security Advisor for Fort Bend ISD, the 7th largest school district in TX with ~74,500 students, ~11,000 employees and contractors spanning 80+ educational and administrative campuses. Chris has previously held leadership roles at both public and private sector organizations including Memorial Hermann, the U.S. Hous...
Roy WilkinsonPrincipal, CISO/CIO Services, Rausch AdvisoryRoy Wilkinson, PhD, CISSP, CPCS, CHS-V, HISP, is a former CSO & CISO with 30+ years in Information Security and 25+ years in physical security. He is currently Principal for a virtual CIO/CISO practice with an executive advisory firm and was recently elected as Vice President of ISSA International. Dr. Wilkinson is a recognized security leade...
Rene KolgaSr. Director of Product Management, NyotronRene Kolga, CISSP, heads Product Management and Business Development for North America at Nyotron. Prior to working at Nyotron, Rene was Head of Product at ThinAir. Rene also spent eight years at Symantec where he managed multiple enterprise security product lines in the areas of encryption and endpoint security. Additionally, Rene led dozens...
Rebecca Finnin, ModeratorAVP, Chief Security Office, AT&TRebecca Finnin is an Assistant Vice President in the Chief Security Office of AT&T. During her tenure, she has served in a variety of information security and privacy roles.
Ms. Finnin has led teams to embed security features into the software defined network, developed tools to allow DevOps teams to self-identify relevant security r...
Lynn GoodendorfDirector, Information Security / CISO, Mandarin Oriental Hotel GroupLynn Goodendorf is the Director of Information Security for the Mandarin Oriental Hotel Group with a global scope of responsibility for the information security program at all hotels and corporate offices. She is known for a strategic and risk-based approach with over 25 years of leadership in technology, cybersecurity, data privacy and risk ...
Paul BragerTechnical Product Security Leader, Digital Technology, BHGE (Baker Hughes, a GE Company)Paul W. Brager, Jr has been a contributing member of the cyber security community for over twenty-three (23) years, with expert level knowledge of security architecture and defense-in-depth design, critical infrastructure/industrial cyber, IoT, and IIoT. He has extensive cyber experience in the oil and gas, manufacturing, power utility, chemi...
Brian EngleCEO, Riskceptional StrategiesBrian A. Engle, CISSP, CISA Founder and CEO Riskceptional Strategies Brian Engle is an experienced security and risk management professional who works with business leaders to create and implement successful strategies for implementing sustainable risk-based information security programs. Prior to founding Riskceptional, Brian led the Retail ...
James WatersGlobal CISO, Black & VeatchCurrently the Global CISO for Black & Veatch and responsible for the security of all things digital/cyber within the enterprise. Previously the Chief IT Strategist and Security Director for HNTB, and prior to that as Senior IT Architect for the Federal Reserve.
Pete Lindstrom, InstructorLeader in Cybersecurity Strategy, Innovation, and EconomicsPete Lindstrom has an extensive expertise in cybersecurity but is best known as an authority on strategic cybersecurity topics such as metrics, estimating risk, and measuring the benefit of security programs. He focuses on applying these core economic and risk management principles to new cybersecurity architectures and platforms. Pete has ov...
Blake CollinsDirector of Clinical Engineering, Christiana Health Care SystemBlake Collins has been in the Health Technology field for over 27 years and the health care industry for over 34 years. He retired from the United States Navy after 21 years in 2004. He received his basic and advanced BMET training in Aurora, Co. at the United States Army Medical Equipment and Optical School. After retirement, he became a Reg...
Chris ThieletAccount Executive, Wombat SecurityChris has over 15 years' experience in training program development. For over two years at Wombat he has worked with security professionals in over 22 countries to plan, develop, and implement successful cybersecurity education programs. These programs have focused on phishing simulations, training methodologies, and engaging end users to red...
Sonia AristaPrincipal, Healthcare Strategy: Governance, Risk and Compliance, GuidePoint SecuritySonia E. Arista is a seasoned Information Security and Technology specialist with over 20 years' experience. As a management consultant with Dell Services and Perot Systems she has worked internationally in the financial, healthcare, telecommunications and manufacturing verticals. She has also served as a senior information technology directo...
Michael PodemskiSenior Manager in the Risk Advisory Services Practice, Ernst & Young LLPMichael Podemski, CISA, CISM, CRISC, CIPM, CIPT, is a Senior Manager in the Risk Advisory Services practice of Ernst & Young LLP. He focuses on managing and delivering high-quality IT assurance and advisory engagements, including financial statement audits/internal controls over financial reporting (SOX 404), pre- and post-implementation syst...
Frank DownsDirector, Cyber Information Security Practices at ISACA and DoD InstructorDowns, an 11-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity were two very different concepts, Frank pro...
Arlene YetnikoffDirector of Information Security, DePaul UniversityArlene Yetnikoff is the Director of Information Security for DePaul University, which offers numerous degrees in Computer Science, including Masters and Bachelor's in Information Security fields. Arlene has worked in Information Security for many years as a consultant, educator and hands-on practitioner. Today, Arlene leads DePaul's Informati...
Thomas HartCISO, Cyber Guide LLCThomas F Hart - Tom has been in the IT field since 1978(EDP), starting as a programmer trainee (Assembler and COBOL). First computer worked on was an IBM360 system (PCs were a long way off). He has been a Programmer, Systems Analyst, Operating Systems Programmer, Network Systems Programmer, DR / BCS Specialist, IT Auditor, GRC, Sr. Security A...
Nicholas DavisTechnical Product Manager, Rapid7Nick Davis began his career at Rapid7 in 2013 as a Software Engineer building InsightIDR. In this role, he was focused on building key detections and establishing scalability across the platform to keep up with a growing user base. Now, as the Technical Product Manager for InsightIDR, Nick works closely with engineering, SOC Analysts, and cus...
Nuno SousaStrategic Engineering Manager, Check Point Software Technologies, Inc.Nuno is the Check Point Strategic Engineering Manager in the Northeast. 10+ years of experience in the cybersecurity industry. He has held various positions in the vendor, system integrator and private sector including Security Engineer, Security Architect, Security Consultant and now managing Check Point SE’s responsible for Check Point’s la...
Moderator: Mark AielloBoard Member, (ISC)2 Eastern Massachusetts; President, CyberSNHaving more than 30 years of IT and cybersecurity consulting/staffing experience, Mark joined Signature Consultants, one of the largest IT Staffing Firms in the U.S., to lead, build and cultivate the cybersecurity talent and workforce throughout the organization’s 26 locations, serving 100s of clients throughout North America. Former Presiden...
Chris DeMale, CFAStrategic Account Executive, ISACAChris DeMale, CFA is a Strategic Account Executive for ISACA, where he serves enterprises across the globe on ISACA’s full suite of assessment, training, and cybersecurity products, and as a dedicated technical resource with expertise in the financial services sector. Before joining ISACA, Mr. DeMale served as Senior Vice President at Blueroc...
Cindi CarterCISO & C-Suite Advisor, Check Point Software TechnologiesCindi Carter is a global, multi-industry Cybersecurity and Information Technology Executive who consistently seeks the optimal outcome for any endeavor. As a transformational leader from startups to enterprises, she excels at building cybersecurity practices in highly-regulated industries, turning strategic goals into actionable outcomes, and...
Akshay FinneyAssociate, Meditology ServicesAkshay Finney is an IT Risk Management Associate who specializes in Security risk assessments and Medical Device Security. As an Associate, he works closely with the Risk Management Team to assess and identify the client’s risks, and guide them in mitigating the identified risks. He also specializes in security and network operations to provi...
Tyrone JeffressDirector of IT Risk Management, Meditology ServicesTyrone is an experienced consultant who has over 12 years’ experience advising covered entity and business associate clients on cybersecurity, privacy and compliance matters. His expertise includes HIPAA security risk assessments, HITRUST certification, SOC 2 certification, security governance and strategic planning, vendor risk management an...
Bob BennettChief Innovation Officer, City of Kansas City, MOBob Bennett became the Chief Innovation Officer for the City of Kansas City, Missouri, in January 2016 after a 25-year career in the US Army. He leads the Smart City initiatives, a suite of projects including: data analysis, Public Wi-Fi, digital kiosk installation, and smart lighting programs in the city’s downtown core. Kansas City’s initia...
Diane GlickInvestigative Auditor, State of Texas30+ years experience in auditing and investigating white-collar crimes. Currently employed by Texas Office of Attorney General Medicaid Fraud Control Unit. Assisted Harris County DA in successfully prosecuting a case of cash theft of $150,000. Hold ACFE, CIA, and CGFM certifications. Past President of Houston Chapter, ACFE. Business Administr...
Josh SokolInformation Security Program Owner, National InstrumentsJosh Sokol, CISSP, graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies, including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as the Information Security Program Owner at National Instruments. In his cur...
Robert McKoskyAsst. Professor, Drexel UniversityDr. Robert McKosky served as the Director of Information Security at MBNA America and was the Technical Program Director for the Network Infrastructure Laboratory at GTE. He has organized and participated in various simulated attacks (Tiger Teams) to identify weaknesses in security systems. Mac has consulted to the CTIA, NSA, Secret Service, ...
Stephen JonesVice President Managed Services, GuidePoint SecurityStephen is the Vice President of Managed Services at GuidePoint Security and began his career in Information Security, Information Technology Management, Vulnerability Management, and Security Operations Center (SOC) operations. Before joining GuidePoint Security, Stephen worked for ManTech International at a large federal agency managing SOC...
Matthew GardinerPrincipal Security Strategist, MimecastMatthew Gardiner is a Director of Security at Mimecast and is currently focused on email & web security, phishing, awareness training, malware, and cloud security. With more than 15 years focused in security, Matthew’s expertise in various roles includes threat detection & response, network monitoring, SIEM, endpoint threat detection, threat ...
Katie StebbinsVice President for Economic Development, University of Massachusetts President's OfficeKatie Stebbins is the Vice President for Economic Development at the University of Massachusetts. She serves as a liaison to the business community, establishing and growing research and workforce development partnerships to benefit the university and the Commonwealth of Massachusetts. Representing UMass, the state’s second-largest employer a...
Edward MosesAssociate Executive Director, Kennesaw State UniversityEdward Moses, MS MBA CISSP CISA GSNA GCIH GPEN PCIP is the Associate Executive Director of Cybersecurity for Kennesaw State University.
Britney KennedyGlobal BISO & Director of Business Partnership, Cardinal HealthBritney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since...
Ravi ThatavarthyCISO, Rite Aid CorporationRavi currently serves as CISO at Rite Aid. With 30k+ employees and multi million customers and a noble purpose of helping you achieve whole health for life, Ravi is helping with transforming their Information Security Program. Ravi served as the VP & CISO of BJ's Wholesale Club where his responsibilities included information security, policy,...
Rex JohnsonDirector of Cybersecurity, BKD CPAs & AdvisorsRex is a strategic and technical leader with more than 25 years of experience in security and privacy, enterprise risk management, security management and operations, IT governance, application development, internal and external audit, regulatory compliance, and controls assurance. He has served as the lead executive with responsibility for p...
Steven "Doc" Simon, PhDProfessor, IT / Captain, US Navy (Ret), Mercer UniversitySteven “Doc” Simon was commissioned in the Navy in October 1989. He served his first tour aboard the USS BLAKELY (FF-1072), homeported in Charleston, SC earning his Surface Warfare Qualification. Upon de-commissioning of the Blakely he cross-decked to the USS SAMUEL ELLIOT MORRISON (FFG-13) before being assigned to Naval Construction Force, ...
Yaron LeviCISO, Dolby LaboratoriesYaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ...
Jim BenantiSr. Partner, Consulting Engineer, Arbor NetworksJim comes to Arbor with over 20 years in the security field as a Pre-Sales Engineer, Sales Representative, Competitive Analyst, and Solutions Consultant. He has been with Arbor for the past six years, where he currently is a Sr. Partner Consulting Engineer.
Jim received his Bachelor’s degree from Clarion University of Pennsylvania and h...Nir ValtmanHead of Application Security, NCR CorporationNir Valtman heads the application security of the software solutions for NCR Corporation. Before the acquisition of Retalix by NCR, Nir lead the security of the R&D in the company. As part of his previous positions, he was working in several application security, penetration testing and systems infrastructure security positions. Nir is a freq...
Amy BakerVP of Marketing, Wombat Security TechnologiesAmy Baker, Vice President of Marketing at Wombat Security Technologies, has been in the information technology and security industry for almost 20 years and has been specifically focused on info security awareness and training for the last several years. Amy led the development of Wombat’s Best Practices Methodology for Security Education pro...
John KveragasOwner, TJM Professional Services, LLCJohn E. Kveragas, Jr., CPA, CISA, is a seasoned Internal Audit Executive with over 20 years’ experience in IT, operational, financial, and compliance auditing in multiple industries. John has extensive expertise with building effective internal audit functions, training and development, and managing regulatory exams with positive outcomes for...
Michael HoehlSecurity Leader, Independent ConsultantSecurity Leader with experience in Health, Manufacturing, Financial Services, and Retail Industries.
Frank DuffCybersecurity Engineer, MITREFrank Duff is a principal cyber operations engineer at MITRE. His work has focused in endpoint security and cyber deception. He is the current principle investigator of the Leveraging External Transformational Solutions research and development effort that seeks to assist the integration of innovative commercial cybersecurity solutions into o...
Devon BryanGlobal CISO, Carnival CorporationDevon Bryan joined Carnival Corporation in October 2021 as the Global CISO with responsibilities for conceiving, implementing and leading technology solutions that assure compliance, protect personal data and corporate assets, increase organizational capability and advance productivity within Carnival Corporation and our world-leading cruise ...
Tim HillDirector, Product Management & Strategy, Centrify CorpTim Hill joined Centrify in the fall of 2017 as the Director of Product Management & Strategy, he is a US Air Force Veteran who post military joined Amp Inc./TE Connectivity Inc. through the embattled years as part of Tyco International Inc., as their Information Security Manager, and M&A team member, later at PHEAA as the VP of Enterprise Se...
Vana KhuranaSr. Security Architect, ZoomVana Khurana is CISSP, AWS Certified Architect (A), CCSP, CCSK, GSEC, and TOGAF certified. Vana serves as Director of Training and a Board Member of Cloud Security Alliance Delaware Valley Chapter. She is also an Adjunct Faculty at Temple University, Philadelphia. Vana has authored the book "IT Process Management," available on Amazon.
Penny ChaseSr. Principal Scientist, MITREPenny Chase is in the Cybersecurity Solutions and Information Technology Technical Centers at The MITRE Corporation. She leads MITRE’s support to FDA on medical device cybersecurity and preparedness and response, and is developing a Common Vulnerability Scoring System rubric tailored to medical devices.
Margie ZukSr. Principal Cybersecurity Engineer, MITREMargie Zuk is in the Cybersecurity Solutions and Information Technology Technical Centers at The MITRE Corporation. She leads MITRE’s support to FDA on medical device cybersecurity and preparedness and response and is developing a Common Vulnerability Scoring System rubric tailored to medical devices. Margie has a Bachelor of Arts in Mathemat...
Happy HourMichael ThelanderDirector of Product, VenafiMichael has a 20-year history in product marketing and product management, with a focus over the last seven years on cybersecurity. He held senior product marketing and product management roles at security leader Tripwire, and has other career highlights that include co-founding a successful startup and receiving patents for network technolog...
Tom PlummerCybersecurity Fellow, Lockheed MartinCybersecurity Fellow to provide architecture guidance across products and programs. BS Computer Engineering. CISSP.
Katie GreerCEO, KL Greer Consulting, Featured on: CNN, The O'Reilly Factor, Inside Edition, The Huffington Post, TIME Magazine, USA Today and morePreviously of the Massachusetts Attorney General's Office and MA State Police, Katie Greer travels the country presenting to hundreds of thousands of law enforcement, communities, school staff/administration and students on the trends, safety and best digital safety/social media practices. Katie serves as a media industry expert, and has been...
Brian HarrellAssistant Director, Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency (CISA), DHSBrian Harrell was appointed by the President of the United States in December 2018 to serve as the Department of Homeland Security’s Assistant Secretary for Infrastructure Protection. Brian now serves as the first Assistant Director for Infrastructure Security within the newly renamed U.S. Cybersecurity and Infrastructure Security Agency (CIS...
Brian ShieldCIO, Boston Red SoxBrian is responsible for the strategic direction of technology and day-to-day IT operations in support of the Boston Red Sox, their fans, and Fenway Sports Management.
Joanne KossuthCIO, Mitchell CollegeCurrently Joanne acts as the Chief Information Officer for Mitchell College with responsibility for academic, administrative, and enterprise computing and library information services. Joanne also serves as principal in her consulting services company, 1MountainRoad, which specializes in strategic business process re-engineering; aspirant and...
Ben LevitanCEO, Cedalion PartnersBen Levitan serves as CEO of Cedalion Partners, a Management Advisory firm to Investors, Boards, and CEOs. Ben serves as Board Director of OGSystems, a GEOINT solutions company, and Bricata, a cybersecurity company. Ben has more than 25 years of leadership experience, having served as CEO or COO of five companies—in venture, growth equity, an...
Vincent CampitelliRegional Partner with Coopers & Lybrand (now PWC), Former IT Risk Manager, Goldman Sachs, Wells Fargo, and McKessonVince has extensive experience in the converged fields of information technology and risk management. As a Regional Partner with Coopers & Lybrand (now PWC) he was a member of a small team of partners who led the adaptation of technology into the traditional fields of accounting and auditing. Post public accounting, he applied his mastery of ...
Alejandro LangurenInformation Security Officer, DLL GroupAlejandro is a cybersecurity professional, experienced in Information Security, IT Infrastructure, and Software Development areas—with working experience in multinational organizations covering positions in the United States and Latin America. Currently working in a world class financial organization, with continuous collaboration with divers...
Cheryl Carmel, ModeratorOwner, Carmel Consulting LLCMs. Carmel is a member of (ISC)2 where she holds her CISSP, and IAPP where she holds her CIPT. She is a member of InfraGard and has been on the Advisory Council for SecureWorld for many years.
Ms. Carmel began her career in technology with experience in application development, infrastructure operations, technical support, and teachin...
Stefanie ParenteChief Privacy Officer, Large Financial InstitutionStefanie Parente is currently Chief Privacy Officer (CPO) at a large financial institution. Prior to that she was the CPO for Viewpost, an invoicing and payments platform. At Viewpost, she ensured that the company met their regulatory and contractual obligations regarding privacy, information security, and marketing, while also maintaining th...
James LamDirector, E*Trade FinancialJames Lam is the president of James Lam & Associates and a director of E*TRADE Financial, where he chairs the risk oversight committee. He previously served as president of ERisk, partner of Oliver Wyman, chief risk officer of Fidelity Investments, and chief risk officer of GE Capital Markets Services. Lam was named to the NACD Directorship 1...
Carlos MoralesVice President, ASERT and Global Pre-Sales, Arbor NetworksCarlos is responsible for Arbor’s Security Engineering & Response Team as well as the global pre-sales organization. ASERT is one of the industry’s most respected research organizations, responsible forproviding tactical and strategic threat intelligence to Arbor’s customer base and for curating ATLAS, Arbor’s global threat intelligence infra...
Brian SelfridgePartner, Meditology ServicesBrian leads Meditology’s IT Risk Management practice and has advised hundreds of healthcare organizations across the country. Brian is based in Philadelphia and has over 15 years of experience in healthcare security and privacy. He is a frequent presenter and expert speaker on an array of healthcare security topics, including: ethical hacking...
Geoff JenistaChief of Cybersecurity, Region 7, DHS CISAMr. Jenista serves as the Regional Cyber Security Advisor for Region VII (IA, KS, MO and NE) for the Cybersecurity & Infrastructure Security Agency (CISA), Integrated Operations Division. Based in Kansas City, KS, he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation's criti...
Levone CampbellCyber Team Lead / Incident Coordinator, Aramco ServicesLevone Campbell is the Cyber Security Lead / Incident Coordinator for his organization. Levone holds two Bachelor degrees in Management and Marketing from North Carolina A&T State University, a Masters in Business Administration from Walden University, and a Masters in Technology Management from Georgetown University. He also holds numerous c...
David DumasSr. Principal, Security Risk Management, VerizonDavid Dumas, CISSP, CISM, has a B.A. in Computer Science. He has 40 years in the security field working at both Digital Equipment and Verizon. He has 9 years as a director of network security at Verizon. He has designed and run 19 cyber exercises since 2006. In 2024, he formed his new company, Dumas Cyber Security as a CEO, security coach, an...
Charlie LoboscoCo-Founder, The VisionOp Group LLCCharlie Lobosco is a Shared Leadership Expert, Certified Agile Expert, and (agile) coach and trainer—with lessons learned in over 25 fortune ranked companies. Since 1973, Charlie has been making a difference in the workplace even as one person!
Stephen HeadNational Director – Cyber Risk Center of Expertise, Jefferson WellsAs the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both pub...
Rebecca RakoskiCo-Founder & Managing Partner, XPAN Law PartnersRebecca L. Rakoski is the managing partner at XPAN Law Partners, LLC. Rebecca advises her clients on a proactive, multi jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She uses her extensive experience to work with her clients to create and tailor a security and privacy...
Jordan Fischer, InstructorFounding Partner & Owner, Fischer Law, LLCJordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and techno...
Conor GilsenanEditor in Chief, All Things Auth, Founder, Two Factor Buddy (2FB)Conor Gilsenan is a software engineer who has spent the past eight years focusing on security. He has worn many hats, including: programmer, architect, specification author, and UX contributor. He believes that UX is a critical and historically discounted component of any security solution, and is passionate about putting users first. He is t...
Lisa TuttleCISO, SPX CorporationLisa Tuttle has served as an executive leader of global organizations, managing technology teams with her engaging enthusiasm and unique combination of information security, privacy, legal, compliance, project management and business management expertise. As CISO of SPX Corporation, she provides technology vision and strategic leadership for ...
Amirali SanatiniaPhD Candidate / Research Assistant, Northeastern UniversityAmirali Sanatinia is a Computer Science PhD candidate at Northeastern and holds a Bachelors degree in Computer Science from St. Andrews University. His research focuses on security and privacy, and has been covered by publications such as MIT Technology Review, Ars Technica, and Threatpost. He is a recipient of RSAC Security Scholar and the C...
Peter IancicSr. Manager, TD BankPeter has over 10 years of experience in cybersecurity, working for financial industry companies such as JP Morgan Chase and The Bancorp. He holds multiple certifications, including CISSP, CEH, and CHFI.
Brian CyprianSpecial Agent for the Cyber Intrusion Squad, FBI Charlotte DivisionBrian N. Cyprian has been the supervisor for the FBI’s Charlotte Cyber Task Force since March 2016. He worked at FBI Headquarters managing national security computer intrusion investigations prior to arriving in Charlotte. Brian has a B.S. in Computer Information Systems and an MBA in Commerce from Texas A&M University.
Roy ZurFormer Major in Israeli Intelligence Forces, CEO and President, Cybint Solutions/BARBRIRoy Zur is a cyber intelligence expert, an attorney, and the founder and CEO of Cybint Solutions, a cyber education company. Roy has over a decade of experience in cyber and intelligence operations from the Israeli security forces (Retired Major), and has developed cyber education programs and technological solutions for companies, educationa...
Thornton MayFuturist, Author & Professor, Named "One of the top 50 brains in technology today" by Fast CompanyThornton is one of America’s premier executive educators, designing and delivering high impact curricula at UCLA, UC-Berkeley, Arizona State University, The Ohio State University, Harvard University, the University of Kentucky, Babson, and the Olin College of Engineering. His programs mine the knowledge of the audience delivering practical in...
Doug CassleDirector, InfraGard CyberCampDoug Cassle is a Board Member of the Charlotte InfraGard chapter and is the Director of the 5th annual Charlotte InfraGard CyberCamp. Doug has an extensive background and currently works for Palo Alto Networks as a Security Specialist. Doug is a highly accomplished professional with a successful 13-year career defining strategies to deliver s...
Brent ChapmanChief Information Officer / Chief Information Security Officer , RoundPoint Mortgage Servicing CorporationBrent Chapman is a successful technology executive with 17 years’ experience and currently serves as Chief Information Officer and Chief Information Security Officer of RoundPoint Mortgage Servicing Corporation. Mr. Chapman is the senior leader responsible for technology and information security, developing short and long term corporate strat...
Javed IkbalCISO & VP, Information Security & Risk Management, Bright HorizonsJaved Ikbal is the CISO at Bright Horizons. Prior to that, he held CISO positions at Upromise Rewards, GTECH, and Omgeo, and brings 20 years of information security experience in financial services, gaming, and scientific research sectors. He specializes in building or re-engineering information security programs, regulatory compliance, appli...
Vani MurthyRisk Consultant, Cloud Security Alliance working groups contributorVani Murthy (CISSP, CRISC, PMP and ITIL) is a Risk Consultant with over 17 years of experience in IT. Vani holds a MS and an MBA. She also contributes to the Cloud Security Alliance working groups.
Sue BergamoCIO & CISO, BTE PartnersA global CIO & CISO, Sue brings broad technology and operational experience to help companies secure and grow through innovation, and optimization in cloud, on-prem environments and acquisition. She’s held strategic positions at Microsoft, ActiveCampaign, Precisely, Episerver, Aramark, and CVS Pharmacy. Sue is the author of "So, You Want to b...
Scott DavidDirector of Technology, Center for Information Assurance and Cybersecurity, University of WashingtonScott L. David, J.D., LL.M., is the Director of Policy at the Center for Information Assurance and Cybersecurity (CIAC) at the University of Washington. Scott is a member of the World Economic Forum's Global Futures Council on Digital Economy and Society, and the WEF Initiative on Ethics of AI and Machine Learning. Previously, Scott worked as...
Brandon SwaffordCTO, Insider Threat, Engineering, ForcepointBrandon has 12 years of experience in legal, counterintelligence, and financial security across worldwide organizations. He has worked with hedge funds, the US Intelligence community, and the International Monetary Fund.
Jean PawlukExecutive Consultant, ISSA Distinguished FellowJean is an Executive Consultant, ISSA Distinguished Fellow, and honored as a 2015 SC Magazine “Woman of Influence”. With a global focus on strategy, architecture, and technology in the high tech and financial industries, she alternates between technical and executive leadership roles. Once focused on security and cryptography for the financi...
Aravind SwaminathanPartner, Cybersecurity & Data Privacy, White Collar, Investigations, Securities Litigation & Compliance, Orrick LLPAravind Swaminathan is global co-chair of the firm's Cybersecurity & Data Privacy team, which was named Privacy Practice Group of the Year in 2016 by Law360, and is nationally ranked by The Legal 500 in two categories. Aravind earned "particular praise" from Legal 500, as part of a team known for being "extremely responsive and client focused...
Christopher WilliamsAdvisory Solutions Architect, RSAChristopher is a leading voice in the convergence of operational IT practices and Identity, Audit, and Compliance programs. His career features 15 years as a practicing manager of data centers, operations & technical services and consulting teams for fortune 500 companies and DOD contractors; plus another 20 years of technical services, pro...
Zach ForsythSecurity Architect, Juniper NetworksZach Forsyth thrives on understanding advanced threats and designing solutions to combat them. His 20-year career has focused on malware delivery and weaponization, advanced malware prevention, next generation firewalls, automation, threat hunting, deception networks, adversarial response systems, intrusions, exploits, social engineering and ...
Jim MontgomeryPrincipal Engineer, Trend Micro, Inc.Jim Montgomery has been securing Enterprise infrastructure for over 25 years. Jim has worked in all facets of the IT industry and holds several OS and security related certifications. Jim has spoken at numerous events across the country including, VMUG, ISSA, RMSIC and ISACA. As a Sales Engineer for Trend Micro, He currently assists Enterpris...
Moderator: Michael T. MetzlerSr. Compliance Officer, CenturyLink BusinessMichael (CISSP, CGEIT, CISM) has over 35 years of industry experience delivering security consulting service internationally in security policy, security risk management, network design, and troubleshooting. He has designed global networks and provided security consultation for many corporations, as well as for U.S. Defense contractors and f...
Simon GibsonFellow Security Architect & CISO, GigamonSimon Gibson is a Fellow Security Architect at Gigamon. He provides security strategy and technology roadmap direction for Gigamon products that secure physical and virtual network traffic. Simon has been working on Internet infrastructure for nearly 20 years. From small ISP’s , to developing streaming media technology at AOL/Time Warner and ...
Ryan PetersChief Data Scientist & Development Director, BluVectorAs BluVector’s Chief Data Scientist, Ryan Peters leads the company’s efforts in data science and analytics-related efforts for updating and improving the product’s malware detection engines. Peters’ contributions have included rewriting most of the company’s supervised machine learning engine, developing “In-Situ Learning” to allow customers ...
Kevin R. KleinDirector, Colorado Division of Homeland Security and Emergency ManagementKevin R. Klein is the Director of the Colorado Division of Homeland Security and Emergency Management, and Governor Hickenlooper’s Homeland Security Advisor. Kevin has been involved in public safety for over 30 years, and is well versed in the homeland security and emergency management issues facing the nation.
James ChristiansenVP, CSO - Cloud Security Transformation, NetskopeJames Christiansen is Netskope’s vice president of cloud security transformation and leader of the Global Chief Strategy Office. He is focused on enhancing Netskope’s global clients understand the challenges and solutions of cloud deployments by helping drive thought leadership in cloud security transformation.
James brings extensive e...
Grant SewellHead of Information Security and Privacy, Safelite GroupGrant Sewell manages the Information Security and Privacy program at Safelite Group, the largest provider of vehicle glass repair, replacement, and calibration services in the United States. He serves on the board of directors for the Retail & Hospitality ISAC, the Central Ohio Chapter of (ISC)², and has held information security leadership r...
Cynthia WrightPrincipal Cybersecurity Engineer (The MITRE Corporation), CEO (Synthus, Inc.), The MITRE CorporationCynthia Wright is a retired military officer with over 20 years’ experience in national security and cyber strategy. She also co-developed a methodology to assess the cyber needs of developing nations, and assisted DHS in drafting the National Cyber Incident Response Plan and incentivizing market-driven approaches to cyber risk management.
Dr. Jacob RubinCISO | Executive Advisor, EVOTEKJacob Rubin is a successful security and risk executive with broad Fortune-class experience in technology, manufacturing, hospitality, healthcare, and consulting. Academically, Jacob holds a Doctorate of Philosophy and double Master’s degrees with a primary field of study in Behavioral Cyber Security. Jacob focused his dissertation work on th...
Jim WanserskiMobile Threat Prevention Sales Manager, Check Point Software Technologies, Inc.Jim has over 23 years of sales experience, from Technology Networking and Telecom to Mobile Applications and now Mobile Security.
Frank SimorjayDistinguished Fellow, ISSAFrank Simorjay (CISSP, ISSA Distinguished Fellow) is a cloud security and compliance subject matter expert. Frank works for Microsoft Azure global ecosystem organization as the Lead PM of the Azure automation Blueprint program, that includes the PCI automation blueprint. Frank has written an extensive library of papers, and blogs (http://clou...
Chris VaughnCISO, Unify SquareChris Vaughn is an information security and risk management leader with two decades of experience developing information security strategies and programs for international organizations. He is the Chief Information Security Officer (CISO) at Unify Square, the leading provider of software and managed cloud services for Microsoft Skype for Bus...
Frank VianzonDirector of Security Architecture and Engineering, Instructor, OWASP Board Member, Red Rocks Community CollegeFrank Vianzon works for a large corporation as the Director of Security Architecture and Engineering. He also writes and teaches courses for Red Rocks Cybersecurity Program, including Vulnerability Assessment. Frank has also served on the Board for the Denver Chapter of OWASP.
LTC John Sutherland, PhDSr. Client Technology Architect, CenturyLinkJohn is a Senior Technology Architect at CenturyLink, a retired US Army intelligence officer, a former Defense Attaché, and SE Asian Foreign Area Officer fluent in Vietnamese with over 26 years of experience in information security and political-military operations. CISM, CISSP.
Bruce LobreeSecurity & Privacy Information Systems Leader, PhilipsBruce Lobree has participated in and managed technical security, technical architecture, audit and consulting, teams as a first level manager up to having Global responsibilities at an executive level managing multi-million programs. He has working experience in government, retail, financial, software and utility industries generating cost ef...
T.J. AdamowiczSr. Solutions Engineer, North America, MimecastAn IT professional for over 15 years with more than half of that time dedicated to email, T.J. has worked in the university and financial sectors before coming to Mimecast, where he engages with many organizations in protecting against email-borne threats.
Shaun DrutarSecurity Manager, FujitsuA leading security practitioner with over 18 year of experience in cybersecurity, forensics, and incident
response. Shaun leads security practice and persuits for a global technology organization.Kacy ZurkusCybersecurity Writer, Cybersecurity VenturesZurkus is an influential cybersecurity writer, covering a variety of topics on security and risk for Cybersecurity Ventures and CyberDB. She’s contributed to a variety of publications including K12 Tech Decisions, CSO Online, CIO, and The Parallax. She authored a regular blog, Security Newb, for CSO Online. In addition, Zurkus has created con...
Chuck DavisAdjunct Professor of Computer Foresnics and Ethical Hacking, University of DenverChuck Davis teaches ethical hacking and computer forensics graduate courses in the University of Denver's computer science program. Mr. Davis holds the CISSP-ISSAP, he has co-authored two books, has 8 patents, 3 patents-pending and 9 invention disclosures. Mr. Davis is frequently interviewed by various media on the subject of cybersecurity. ...
Adrian LiuDirector, Alliances and Business Development, GigamonAdrian is the Director of Alliances and Business Development at Gigamon, where he is responsible for Gigamon’s Ecosystem Partners. Adrian has over 20 years' experience in the Security and Networking Industries, having worked at various hi-tech startups and large corporations in the Silicon Valley. Adrian holds a Bachelor’s Degree in Business ...
James CarpenterCISO, Texas Scottish Rite Hospital for ChildrenJames Carpenter is a Healthcare Information Technology & Security Professional with 20 years of IT leadership experience. James is currently the Director of Information Technology & Security for Texas Scottish Rite Hospital for Children in Dallas, Texas. Over the course of his career James has created and led healthcare information security ...
Jeff WhitneyCertified Computer Examiner, CTINJeff Whitney is a Certified Computer Examiner at eDiscovery Inc. in Bellevue, Washington. Most of his work is for civil litigators on either the plaintiff or defense side and he has testifying experience.
Allison GoodmanCertified Computer Examiner, CTINAllison Goodman is a Certified Computer Examiner at eDiscovery Inc. in Bellevue, Washington. Allison is the President of CTIN, a local non-profit organization that provides training to other digital examiners. She is also a dialogue leader for the Sedona Conference WG1 on transparency and cooperation in the discovery process. Most of her w...
Doc BlackburnIT Risk and Compliance Manager/SANS Instructor, University of Colorado Denver/SANS InstituteDoc Blackburn has over 30 years of experience in system and software design, server and network administration, and programming. Doc ran a successful consulting firm until he found his passion was in cybersecurity. He has vast experience at various levels of information technology from technical support to security leadership roles.
Deanna LockeSr. Enterprise IT Compliance & Risk Trainer, Bellevue CollegeDeanna Locke, CIPP, CISSP, CISA, ITILv3, is a privacy/security professional with 25+ years combined IT, security, international privacy, Big 4 audit and cybersecurity advisory, and corporate risk and governance experience. Ms. Locke works with senior leadership to shift static, compliance-adverse, and vulnerable enterprise cultural behaviors...
Ronald WattersRegional Cybersecurity Advisor, Region 10, DHS CISARon Watters currently serves as the Region X (WA, OR, AK, ID) Cybersecurity Advisor for the Stakeholder Engagement and Cyber Infrastructure Resilience Division of the Office of Cybersecurity and Communications (CS&C) National Protection and Programs Directorate (NPPD). Based in Seattle, WA, he supports the Department of Homeland Security (DHS...
Esteban MorinAssociate in Cybersecurity, Privacy and Technology Transactions PracticeEsteban Morin is an attorney in Brownstein’s Cybersecurity and Technology Transactions, Licensing, Advanced Media and Privacy practice group. Drawing on years of experience in the private sector counseling large consumer-facing companies and in the public sector advising federal agencies, he provides clients with a unique perspective on priva...
Tracy LechnerShareholder and Head of Cybersecurity, Privacy & Technology Transactions Practice and Adjunct Professor of LawTracy L. Lechner leads Brownstein’s Cybersecurity and Technology Transactions, Licensing, Advanced Media and Privacy practice groups. With more than a decade of in-house experience in the media industry, Tracy has a unique, inside understanding of the complexities that organizations face in monetizing their data and protecting their assets. S...
Karl WeaverBusiness Development Director, Newport TechnologiesMandarin Chinese-speaking, Mobile Device ecosystem specialist for the Smart Card sector of the Wireless industry. Newport Technologies is Karl’s public speaking vehicle to evangelize cutting edge mobile technologies within Greater China and Asia. Karl’s career in the Smart Card/Semiconductor ecosystem and embedded software World spans 13 ye...
Launa RichManaging Director, CyberSNManaging Director Launa Rich specializes in cybersecurity recruiting services for the San Francisco office of CyberSN, a national specialized cybersecurity staffing firm. With a passion for Infrastructure and DevOps, Launa is excited to continue building her network as an integral member of the San Francisco cybersecurity community.
Alan LevineCyber Security Advisor, Wombat Security TechnologiesAlan Levine is the former CISO for two Fortune 500 companies, Alcoa and Arconic, with 20 years experience leading global cyber security programs. He has a BA from John Jay College of Criminal Justice, an MA from City College of New York, and is ABD from Carnegie Mellon University. Alan is currently an independent cyber security advisor, bas...
Christopher GorogCTO, BlockFrame IncChristopher Gorog, CTO of BlockFrame Inc., Lead Faculty for Cyber Security at Colorado Technical University, and the host of the New Cyber Frontier Podcast, He is a published author, is an advisors to the Cyber Institute of the National Cybersecurity Center, and member of the BODs for Cyber Resilience Institute.
Sheryl RoseChief Information Security Officer, Catholic Health InitiativesSheryl Rose, an experienced IT security and audit professional, has been Chief Information Security Officer since 2010 at Catholic Health Initiatives, a nonprofit, faith-based health system that is the nation's third largest, comprised of 103 hospitals and a variety of other health-based facilities spanning the inpatient and outpatient contin...
Mary HaynesVP, Network Security Operations, Charter CommunicationsMary Haynes is the Vice President of Network Security Operations at Charter Communications. Mary currently leads the network security program for Charter’s core networks and Spectrum services, including High Speed Internet, Telephony, and Video products. Mary is also responsible for Charter’s Customer Security Operations, Law Enforcement Resp...
Ben FeldmanGDPR Solutions, OneTrustBen Feldman serves on the GDPR Solutions team at OneTrust. In his role, Feldman manages relationships with leading enterprise organization's and provides resources to operationalize data privacy compliance. Prior to OneTrust, Feldman spent 3 years at a leading global provider of telecommunications services where he gained valuable experience...
Cheyenne GoodmanRegional Sales Director, SentinelOneCheyenne Goodman is a Bay Area native & has worked in the field of cyber security for over 10 years. She has held positions at such industry leading names as McAfee & FireEye. She has a passion for helping customers address the complex challenges that we face in today's threat landscape.
Jeremiah CruitChief Cyber Security Officer, Bremer BankJeremiah Cruit has been working in security for the past 20 plus years coving all aspects of security including penetration testing, incident response, infrastructure security and security management. Currently working as Chief Cyber Security Officer at Bremer Bank where he manages the teams that run all aspects of IT security.
Randall FrietzscheCISO, Denver HealthRandall’s career started as a Law Enforcement Officer. With the technical aptitude, he moved into technology, starting as an MCSE on Windows NT 4.0. Over the next 22 or so years, he evolved to become the Enterprise Chief Information Security Officer for Denver Health and Hospital Authority. He also teaches cybersecurity courses for Harvard an...
John C. PowersSpecial Agent, Federal Bureau of InvestigationFBI Agent in the Counter Intelligence and Insider Threat group.
Andrew GyenisAccount Executive, DarktraceAndrew Gyenis is a Cybersecurity Account Executive at Darktrace, the world's leading machine learning company for cyber defense. He has worked extensively with clients across the numerous industry verticals, from Fortune 500 energy companies to the federal government, helping them deploy Darktrace's Enterprise Immune System, the only AI techn...
William SawyerManager, CyberSecurity and Privacy, PwCBill Sawyer is a Manager in PwC's Advisory Services. As a member of PwC’s Security Architecture Center of Excellence, he is responsible for developing and delivering PwC’s Security Architecture security offerings. Across his 17 year career, Bill’s experience in both consulting and industry includes application security, security architecture ...
Parker AshleyManager, DarktraceParker Ashley is a Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Finance to Aerospace, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to earl...
Tim O'BrienPresident, (ISC)2 Silicon Valley ChapterTim O’Brien is a 17-year information security professional and a subject matter expert in risk and
incident management, intrusion and data analysis and secure architecture design. Tim is well versed in
developing technical solutions, determining the best options for the business and its goals, and creating
comprehensive impl...Mike EhlersGlobal Sr. Manager, Information Security, OlinSenior cybersecurity professional with years of experience (Engineer/Architect, Senior Manager, Director, and CISO roles) architecting and managing large scale IT Security, Network Infrastructure, and Development projects. Heavy experience collaborating with diverse cross-functional groups of people, both domestic and international. Recognize...
Michael DuffChief Information Security Officer, Stanford UniversityMichael completed his undergraduate and graduate degrees in physics and computer science at MIT. He founded a web-based EMR startup and later served as CTO of the acquiring organization. Michael taught computer science courses at Miami University, and then led the information security program at SRI International for the next 11 years. He joi...
Jeffrey PricherEnterprise Accounts, Security Engineer, Check Point SoftwareJeffrey Pricher has over 17 years of cybersecurity experience working in many different industries, and currently works for Check Point Software. He holds a master’s degree in Network Security, and serves part-time as a lead threat hunter for the Missouri Guard’s Computer Network Defense team, focused on providing security for the state’s cri...
Matt LoebCEO, ISACAMatt Loeb, CGEIT, FASAE, CAE, is chief executive officer of ISACA. Prior to joining ISACA, he completed a 20-year career as staff executive for the Institute of Electrical and Electronics Engineers (IEEE) and as the executive director of the IEEE Foundation. His experience includes enterprise strategy, corporate development, global business o...
Kierk SanderlinDirector of Engineering, Check Point SoftwareKierk Sanderlin is the Director of Engineering at Check Point Software Technologies. He has been in the cyber security space for almost 20 years and has been a regular speaker at various cyber security events across the region.
William J. Malik, CISAVP, Infrastructure Strategies, Trend MicroWilliam Malik helps clients structure their IT environments to minimize the loss, alternation, or inadvertent exposure of sensitive information. His information technology career spans over four decades. Prior to Trend Micro, he worked at Gartner for twelve years where he led the information security strategies service and the application int...
Ike BarnesAssistant to the Special Agent in Charge, U.S. Secret ServiceAssistant to the Special Agent in Charge (ATSAIC) Ike Barnes is a graduate of the United States Military Academy at West Point. After serving in the US Army, ATSAIC Barnes became a Special Agent with the Secret Service in 2000 and was assigned to the New York Field Office. While there, ATSAIC Barnes was a member of the New York Electronic Cri...
Christine FiggeManager, RubinBrown LLPChristine has over 10 years of public accounting and consulting experience analyzing financial information and internal controls for companies. She manages SOC engagements for companies across a variety of industries. Her knowledge spans industries and includes working with companies directly as well as with third party service providers.
Timothy GraceDirector of Technology Risk Advisory Services, Mueller ProstTimothy M. Grace, CIA, CISA, CISM, CRISC, Director of Technology Risk Advisory Services - As the Technology Risk Advisory Services leader for Mueller Prost. Tim brings more than 30 years of business experience delivering solutions that drive business innovation, optimization, and change within world class organizations. He is a leader in the ...
Shanee YelderIT Audit Specialist, Meadowbrook Insurance GroupShanee has Big 4 accounting firm and private sector (financial services) experience working as an IT Auditor. She holds a BS in Business Administration with a concentration in Information Systems Management and is currently pursuing a MBA.
Gretel EganSr. Security Awareness Training Strategist, ProofpointGretel Egan is a senior security awareness training strategist for Proofpoint, a leading provider of cybersecurity services and solutions. She is a Certified Security Awareness Practitioner (CSAP) and has been working in technical, business, and consumer communications for more than 20 years. Gretel has extensive experience in researching and...
Michael HamiltonFounder and President, Critical InformaticsMr. Hamilton is a former cybersecurity policy adviser to Washington State, CISO, City of Seattle, and VeriSign Managing Consultant.
Bobby BuggsMobility Expert, Check Point Software TechnologiesBobby Buggs is a telecommunications professional that hails from Flint, MI. Bobby has worked in the mobile/wireless industry for over 19 years. Over the course of his career, Bobby has held numerous roles in both sales and technical disciplines. Bobby is also an MSU alumnus.
Chris MorrisRegional Expert, Threat Prevention, Check Point Software Technologies, Inc.Chris Morris is the Threat Prevention SME for Check Point's Central United States region. He has been in the IT industry for nearly 20 years, whose experiences include perimeter and endpoint security, network virtualization, disaster recovery, and network design.
Sean MurphySVP & CISO, BECUSean Murphy is the Vice President and Chief Information Security Officer for Premera Blue Cross (Seattle, WA).
He is responsible for providing and optimizing an enterprise-wide security program and architecture that minimizes risk, enables business imperatives, and further strengthens the health plan company’s security posture. He wor...
Austin WinklemanLocal Information Security Officer, Ascension HealthAustin is currently the Information Security Manager for Ascension Health’s system office and five other service locations. He has worked over 30 years in IT, with over 20 years in non-profit educational and healthcare organizations.
Bob BacigalAVP, Information Security, Amerisure InsuranceBob Bacigal is the Assistant Vice President of Information Security at Amerisure Insurance. He has over 30 years of experience in information security management, risk management, incident response, disaster recovery, and business continuity planning. Prior to joining Amerisure, he held security management positions with Great Lakes BanCorp, ...
Matt OlsenFormer Special Counsel , Director of the Federal Bureau of InvestigationMr. Olsen also served at the Department of Justice in a number of leadership positions and was responsible for national security and criminal cases. He was a federal prosecutor for over a decade and served as Special Counsel to the Director of the Federal Bureau of Investigation.
Patrick TurnerVice President and Chief Information Officer, Schoolcraft CollegePatrick Turner, VP & CIO at Schoolcraft College, oversees all areas of IT. Patrick has designed and implemented tier 3+ data centers. Patrick has presented on various topics at MMC, Cisco Academy and Data Center World conferences. Patrick holds MS (MIT) and BS (MTU) degrees in Mechanical Engineering.
Kevin PetersonDirector of Security and Network Transformation, ZscalerKevin Peterson is the director or security and network transformation at Zscaler, where he primarily works with the largest cloud security deployments to ensure that the desired business objectives are achieved. He brings with him the advantage of having lead the security efforts for one of McKesson's (Fortune 10) major business units (75 sof...
Joe CarusilloProgram Director, Security Client Initiatives, IBMJoe Carusillo currently serves as Program Director of Client Initiatives for IBM’s Security Business Unit. His responsibilities include leading the team responsible for developing and driving the implementation of the strategy for vertical industry sales, consulting, solution development and thought leadership for IBM Security. They also in...
Martin BallyVP & CSO, Diebold NixdorfMartin Bally is currently the Vice President and Chief Security Officer for Diebold Nixdorf with more than 20 years of experience. Prior he spent four years in the legal and financial industry and 12 years at Chrysler. He holds a Master’s of Science in Information Assurance and the CISSP, CISM, CISO, and CRISC security certification.
Adam LeisringChief Risk Officer & CISO, PaycorAdam is the Chief Information Security Officer for Paycor, one of the largest independently held Human Capital Management companies in America. He oversees Information Security for Paycor’s 1,400 associates, as well as Paycor’s 30,000 clients of their award-winning SaaS product. In past positions, he has served in leadership roles including T...
Shane HarschPrincipal Solution Engineer, SentinelOneShane Harsch is a Principal Solution Engineer at SentinelOne, a SANS Instructor, and an Adjunct Instructor at the University of Michigan with more than 25 years of experience in military, manufacturing, consulting, and professional services. He is a commissioned officer in the U.S. Army (MI), holds degrees in business (MBA) and computational ...
Eric KapfhammerFounder and Executive Director, MetycusEric Kapfhammer is a data scientist at Microsoft, where he focuses on applying statistical and machine learning approaches to computer and network security. Prior to joining Microsoft, Eric spent the previous decade in the quantitative trading space as a Managing Director and Portfolio Manager, leading teams of data scientists and software en...
Russ McReePrincipal Security GPM, MicrosoftRuss McRee is Group Program Manager of the Blue Team for Microsoft’s Windows & Devices Group (WDG). He writes toolsmith, a monthly column for information security practitioners, and has written for other publications including Information Security, (IN)SECURE, SysAdmin, and Linux Magazine.
Russ has spoken at events such as DEFCON, Der...
Michael StephenSecurity GRC Manager, Rightway HealthcareMichael Stephen is a 20+ year Cybersecurity and Privacy professional who has worked in multiple industries including telecommunications, healthcare, state and local government, finance and restaurant. His experience includes designing, building and supporting security solutions, and successfully implementing compliance and privacy programs to...
Marco FernandesLead Security Architect, DXC TechnologyBorn & raised in Dallas, Marco loved cyber security since youth, leading him to become a Security Architect after graduating from UNT. Marco also served as President of the North Texas Cyber Security Association to help upcoming security professionals. Marco’s hobbies include fitness, card games, & marksmanship.
Jeffrey GromanSenior Manager, Mandiant Global Consulting ServicesMr. Groman is a Senior Manager in the Mandiant Global Consulting Services organization and a senior member
of the Mandiant Central Region leadership team. He is an Information Security veteran with over 18 years of
experience as a practitioner, mentor, and trusted advisor. His primary focus is helping clients prepare for a
s...Bob VishSr. Systems Engineering Manager, Check Point Software TechnologiesBob Vish is a Senior Systems Engineering Manager for Check Point Software Technologies. Previously, Bob held IT leadership positions at Apple, Microsoft, Cisco, Intel, and FireEye. Bob was also a law enforcement officer specializing in cyber crime investigations for over 14 years.
Megan BellFounder, Mumuration, Inc.Megan Bell has 20+ years of experience in building data products and services, and 15+ working with regulated data. Currently, she consults on data anonymization, privacy-by-design, and security/ privacy analytics, as well as training programs for InfoSec analytics. Previously, she led a consulting practice focused on investigations, forensic...
Matt LawlessCounsel - Global Privacy, Cybersecurity and IT Law, The Procter and Gamble CompanyMatt Lawless is a global privacy and information security attorney for The Procter & Gamble Company. He teaches information privacy law at the Northern Kentucky University Chase College of Law, the University of Dayton School of Law, and the University of Cincinnati College of Law. He has been recognized as an Ohio Super Lawyers “Rising Star,...
Laura MacDonaldField CTO, RSALaura MacDonald is a Field Chief Technology Officer with RSA, a Dell Technologies business. She is an extended member of the Dell Cyber Security Intelligence and Response Team (CSIRT), working to understand the latest threats in cyber espionage and attacks. With over 20 years’ experience in networking and information security, she consults an...
Christopher RussellEnterprise Account Engineer, Trend MicroAs an enterprise account engineer at Trend Micro Inc., Christopher Russell focuses on Hybrid Cloud and Data Security, xGEN Endpoint Security, and Network Security. Chris acts as a liaison between enterprise customers, the Trend Micro sales team, and the Trend Micro product teams, providing a hands-on, real-world perspective. Prior to joining ...
Chase NorlinCEO, TransmosisChase Norlin is the CEO of Transmosis and a veteran of the tech industry. He is dedicated to strengthening America's workforce through cybersecurity awareness training and technology training. Norlin is a national and international speaker on workforce development and cybersecurity.
Katherine BrittonAttorney, Law Office of Katherine BrittonKatherine Elvira Britton is an attorney with a broad range of experience in regulatory compliance, corporate training and presentation and focuses her law practice on privacy and data security law, complex civil litigation, employment and human resources counseling, and consumer protection. Katherine advises clients and trains management and ...
Craig KaplanCyber Security Account Executive, DarktraceCraig Kaplan is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Financial Services to Healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting...
Aaron SchubertSecurity Infrastructure Manager, Office of Cyber Security, State of MissouriAaron Schubert joined the State of Missouri in 2003 after graduating college in 2001 with a degree in Networking Systems Technology. His roles as both a network and Unix/Linux administrator reinforced an interest in the Office of Cyber Security, which he joined in 2009. Aaron is now responsible for the deployment, integration and administrati...
Theresa FrommelSecurity Analyst, Office of Administration, IT Services Division, State of MissouriTheresa Frommel is a network security analyst for the Office of Administration, Information Technology Services Division for the State of Missouri. She is responsible for incident response and coordinating end user awareness for the SOC within the Office of Cyber Security. She has a background in access controls, policy development and end us...
David HartleyPrincipal and Virtual CIO, UHY LLPDave Hartley serves as a ‘Virtual CIO’ and ‘Virtual CISO’ helping clients with technology strategy and projects including strategic roadmap development, third party risk management including SOC reports, cyber risk assessments and cybersecurity programs, and digital transformation including cloud, mobile, etc. Dave joined UHY in 2015 followin...
Kevin HardcastleAssociate CISO, Washington University in St. LouisKevin Hardcastle, Chief Information Security Officer (CISO) for Washington University in St. Louis, is a member of the CIO Leadership team and serves a key role in University leadership, working closely with senior administration, academic leaders and the campus community. The CISO is responsible for the development and delivery of a holisti...
Rob FrySr Architect, StackRoxRob Fry is an accomplished architect, inventor and public speaker with 20 years of experience. In his current role, he is part of the executive engineering team and oversees architecture and security detection strategy. Previously at Netflix, he patented a security orchestration platform and specialized in cloud security and automation. In hi...
Douglas DeGroteChief Information Security Officer, Allianz LifeSenior Leader with 28+ years experience of delivering solutions and services in cyber security, risk management, enterprise architecture, business continuity, operations, development and program management.
Christopher RencePresident, Rimage Corporation; CSRO, Equus HoldingsChristopher is President and CEO of Rimage Corporation. He has more than 25 years of experience leading global security and technology transformation for Accenture, FICO, Digital River, and EQ Holdings, with deep expertise in governance and compliance, business continuity and disaster recovery, cloud architecture computing, and sustainability...
Dione McBride, CISSP, CIPP/EConsulting Director, PS InnovationsDione McBride is a data protection expert for PS Innovations, who consults, trains, and tutors customers in privacy, information security and operational processes across multiple regulatory standards. Formerly a CISO for a publicly held healthcare organization, her 15 years of information security experience started as a consultant and inc...
Phil LernerProfessor, St. John's University, Distinguished Engineer, United Healthcare Group / OptumPhil Lerner has been a professor at St. John’s University for the past 10 years. He is the first Distinguished Engineer at United Healthcare Group. He has 26 years of progressive cyber, network and systems security experience in vast enterprises as a customer side senior technology leader. Phil provides consultative guidance and programmatic ...
Victor DevinePrincipal Engineer, Trend MicroVictor Devine has been focused on IT Security for the last 10 years of his 20 year IT career. While playing a big role with securing data centers, endpoint protection and gateways; he joined Trend Micro as a Principle Engineer to expand client education on the importance of IT Security both in and out of the workplace. When he is not talking ...
James Norberg, ModeratorVP Segment & Technology Product Security, HumanaJames Norberg was formerly the Information Risk Management Director at Express Scripts and has been in the Technology field since 2002. His areas of responsibility include the Security Operations Center, Incident Response, eDiscovery, and Cyber Threat Intel & Hunting. He earned his undergrad from Drury University and MBA from Texas A&M. Curre...
Marrci ConnerCIS - Cybersecurity Program Lead, CyberPatriot Mentor, Henry Ford CollegeMarrci has been a Full-time Faculty member of Henry Ford College for the past 10 years. She has over 15 years’ experience as an IT Professional specializing in computer Security. She currently teaches computer programming, digital forensics and cybersecurity courses. Her educational background includes a Bachelor's degree in Business Informat...
Michael RolingLead Technical Project Manager, US eDirectMichael Roling was the Chief Information Security Officer for the Office of Administration, Information Technology Services Division, for the State of Missouri since 2009. He led the Office of Cyber Security and was responsible for overseeing the information security posture for the State of Missouri.
Barbara HiemstraPrivacy Engineer, IT Security and Compliance , Steelcase Inc.Barbara leads the Global Security Awareness/Phishing program to reduce risk and improve the cybersecurity culture at Steelcase. This includes creating content for employee awareness articles, training classes, and conducting multi-language phishing simulation and reporting.
Prior to joining Steelcase, Barb was the Information Security-...
Sean HenryDirector of Sales, BugcrowdSean Henry has been in the cybersecurity industry since 2007 when he started his career in recruiting. Sean's career path includes being a key member of building out the east coast sales team at Rapid7. He was a Partner and helped launch CyberSN's go to market strategy around the Boston market. Sean has also had key stops at GuidePoint Securi...
Swarnika MehtaManager, KPMG LLPSwarnika- Swarnika is a Manager in KPMG’s Cyber practice a frequent speaker at global information security and governance, risk and compliance industry events. She leads Cyber Security and Governance, Risk and Compliance (GRC) related business transformation initiatives for technology and telecommunication industries in the PNW. She has over ...
Eva BennProgram Manager 2, MicrosoftEva Benn is a Program Manager at Microsoft, responsible for coordinating some of the enterprise’s most critical governance, risk and compliance (GRC) efforts. With over 4 years of consulting experience, Eva brings a strong background GRC and Cyber program development, 3rd party risk management and RSA Archer technology solution enablement. He...
Ravila WhiteDeputy Director Strategic Programs, UHGRavila Helen White is the Deputy Director of Strategic Programs – Enterprise Security Architecture for UHG. Prior to that, she headed up the information security programs for Providence Health & Services, The Bill & Melinda Gates Foundation and drugstore.com. Ravila has more than 15 years of professional IT experience, with experience as a st...
Mitchell ParkerExecutive Director, Information Security & Compliance, Indiana University HealthModerator Shamoun Siddiqui, PhDVP & CISO, Neiman MarcusDr. Shamoun Siddiqui is currently the Vice president and Chief Information Security Officer at the Neiman Marcus Group of companies located in Dallas, Texas. has been a leader in the information security space for over 15 years. He possesses a Bachelor’s and a Master’s degree in Mechanical Engineering and a Doctorate in Aerospace Engineering ...
DrPH Gregory "Junkbond" CarpenterOwner, GCE, LLCFormer NSA/CSS & retired military, owner: GCE, National & Cyber Security contributer - newsl.org, BOD ATNA Systems, International Board of Advisors MacKenzie Institute; radio host, author: Reverse
Deception translated into 4 languages. Frequently on Fox, ABD & SiriusXM; International Keynote Speaker. Recipient of NSA Military Performer ...Hudson JamesonCo-Founder, Oaken InnovationsHudson Jameson is a blockchain enthusiast and smart contract developer exploring the intersection of decentralized technologies and security. He is the co-founder at Oaken Innovations, an IoT blockchain start-up that builds identity and security solutions to smart cities and IoT devices.
Barry CaplinVP & CISO, Fairview Health ServicesBarry is the first CISO for Fairview Health Services. He has 35 years in technology/security, an MS in applied mathematics from Virginia Tech, and CISSP, ISSMP, CISA, and CISM certifications. Barry is a frequent speaker on a variety of security, safety and privacy topics. Follow him on Twitter @bcaplin and read his blog http://securityandcoff...
David StromPresident, David Strom Inc.David Strom is one of the leading experts on network and Internet technologies and has written and spoken extensively on topics such as VOIP, convergence, email, cloud computing, network management, internet applications, wireless, and Web services for more than 30 years. He was the founding editor-in-chief of Network Computing magazine, writ...
Robin AustinCTO / CISO, Colliers GroupAs a CTO/CISO, Robin is responsible for overseeing all technical aspects of the company including Cyber Security, Risk and Compliance. Using an active and practical approach, Robin oversees all employees in IT, IO and OT departments to attain the company's strategic goals established in the company's digital strategic plan. Robin has also bui...
A. N. AnanthCEO, EventTrackerAs the co-founder and CEO of EventTracker, Ananth was one of the architects of the EventTracker SIEM solution. With an extensive background in product development and operations for telecom network management, he has consulted for many companies on their compliance strategy, audit policy and automated reporting processes.
Robert HergenroederESD Tech Analyst, Army Corp of Engineers - ACE-ITHugh cyber security buff. Worked in Computer IT over the past 10 years and would like to do my part training people in online safety.
Marcia MangoldInformation Security Control Assurance Manager , ExperianMarcia has spent the past 17+ years using her abilities to be a business enabler for IT and IS, and has worked for several organizations, including IBM, GE, and Blue Cross Blue Shield of Michigan. Marcia focuses on Information Security awareness training, risk, and policy lifecycle management. Marcia is a Certified Information Systems Securit...
Scott GaltPartner, Armstrong TeasdaleAs a member of the firm’s International practice group and a Certified Information Privacy Professional/Europe (CIPP/E), Scott helps clients navigate overseas data protection waters in the wake of the Schrems decision, the advent of the EU General Data Protection Regulation (GDPR), and the ongoing Privacy Shield negotiations. Scott assists cl...
James BeesonCISO, CignaJames has over 28 years of experience in cyber security and technology. He has 17 years of direct experience as an information security leader and is currently the Chief Information Security Officer at Cigna, a global health insurance company. James previously worked 20 years for General Electric in various security and technology leadershi...
Demetrios 'Laz' LazarikosFormer CISO of vArmour, Sears, and Silver Trail Systems, Founder and IT Security Strategist, Blue Lava ConsultingDemetrios Lazarikos (Laz), a recognized visionary for building Information Security, fraud, and big data analytics solutions, is the Founder and IT Security Strategist for Blue Lava Consulting.
Laz has more than 30 years' experience in building and supporting some of the largest InfoSec programs for financial services, retail, hospital...
John DiMariaSTAR Program Director, Cloud Security AllianceJohn DiMaria has 30 years of successful experience in Standards and Management System Development, including Information Systems, Business Continuity, and Quality. John was one of the innovators and co-founders of the CSA STAR program for cloud providers, a contributing author of the American Bar Association’s Cybersecurity Handbook, and a wo...
Craig JacksonChief Policy Analyst, NSWC Crane DivisionCraig Jackson is Chief Policy Analyst at the Indiana University Center for Applied Cybersecurity Research and works with NSWC Crane Division and the NSF Cybersecurity Center of Excellence.
Lieutenant Colonel Ernest WongAsst. Professor of Systems Engineering, U.S. Military Academy, Research Scientist, Army Cyber InstituteErnest Wong is a Research Scientist at the Army Cyber Institute and a United States Military Academy Assistant Professor of Systems Engineering.
James FarwellCounsel, Elkins PLC; Associate Fellow, Kings College, University of LondonJames counsels clients in the areas of Cybersecurity and Privacy Protection. He has a CIPP/US certification from the International Association of Privacy Professionals. James advised the U.S. Department of Defense and U.S. Special Operations Command on cybersecurity and strategic communication. He served as consultant to the U.S. Department o...
Jeff StapletonVP Security Architect, Wells FargoJeff Stapleton is a security professional with 30 years’ experience in the financial services industry, focusing on cryptography and key management. He has been an ASC X9 standards participant during his career, developing dozens of informational security standards. Jeff has published a three-book series called Security Without Obscurity, wri...
Alex AkyuzIT Consultant, CyberTimesToday.comAlex A. Akyuz
BS - University of Detroit Mercy
MS - Technology Studies Concentration in Information Security Management/Cybersecurity
Professional Speaking Events
-2015: Southeast Michigan Chapter of Fraud Examiners - Cybersecurity
-2015: Keynote speaker for Secure World Detroit Conference - Cybersecurity: Past, ...Jacqueline ScarlettVP, Information Security, Financial InstitutionOver 20 years of experience within information technology management and information security applied within operations, cyber training and awareness and enterprise risk assessment and process auditing and partnering with financial services, automotive and legal industries. Proven track record developing, implementing strategies and systems ...
Michael Muha, PhD, CISSP, CISM, CIPM, Certified GDPR PractitionerChief Information Security & Privacy Officer, WorkForce SoftwareMike drove the global expansion of WorkForce Software’s cloud-based workforce management products from one data center to eight across the US, Europe, Canada, and Australia, and directed all compliance efforts (starting with SAS 70 and moving onto SOC 1, ISAE 3402, SOC 2, ISO 27001 certification, and EU-US Privacy Shield certification). Havin...
Michael Kearn, CISSP, NSA-IAMDirector, Threat Informed Defense, U.S. Bank Information Security ServicesAs Managing BISO for Community Banking and Consumer Banking lines of business, he regularly consults with technology, risk and business executives as an information security subject matter expert. Mr. Kearn also manages the relationship between Community and Consumer Banking technical leaders, their teams and ISS. Mr. Kearn brings more than n...
Andy WillinghamInformation Security Program Management, The Christ Hospital Health NetworkAndy has over 15 years' experience in information security. He has been in the trenches, building programs from the ground up, and helping the business understand risk and how to best manage it. He has been involved in both great and not-so-great audit engagements, and has learned from all of them. He currently serves as President of the Cinc...
Rebecca HeroldThe Privacy Professor; CEO, Privacy & Security BrainiacsRebecca Herold has more than 30 years of security, privacy, and compliance experience. She is founder of The Privacy Professor Consultancy (2004) and of Privacy & Security Brainiacs SaaS services (2021) and has helped hundreds of clients throughout the years. Rebecca has been a subject matter expert (SME) for the National Institute of Standar...
Mark TestoniPresident & CEO of SAP National Security Services (NS2), President of NS2 ServesTestoni is among the nation’s leading experts in the application of technology to solve problems in government and industry, in the U.S. national security space. With more than 15 years of tech industry experience, 20 years in the U.S. Air Force and 30 years of public-sector management experience, Testoni is a sought-after business strategist...
Jason WittyEVP & CISO, U.S. BankJason Witty is the EVP, CISO at U.S. Bancorp, providing singular accountability for information security controls in the company. An award winning CISO, Jason has 23 years of information security and risk management experience and was recently named the 2017 SecureWorld Ambassador of the Year in addition to a “CISO Superhero” at I.S.E. North...
Steven AielloInformation Security (Focusing on Payments), XMr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance.
J. Wolfgang GoerlichCISO, Oakland County, Michigan GovernmentJ. Wolfgang Goerlich is an active part of the Michigan security community. He hosts a YouTube video series and the Encode/Decode Security podcast. Wolfgang regularly advises on and presents on the topics of risk management, incident response, business continuity, secure development life cycles, and more.
Prior to his current role, Wolf...
James HabbenDigital Forensics Investigator , Verizon RISK TeamJames is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity,
responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures. Hayden WilliamsDigital Forensics Investigator , Verizon RISK TeamHayden Williams is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Hayden responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures. Prior to Verizon Hayden worked as a DOD Special Agent performing Cyber invest...
John TurnerSenior Director, Cloud Security, OptivJohn Turner is an accomplished IT executive with more than 20 years of leadership and operational IT experience. As the director of cloud security enablement at Optiv, Turner’s team of cloud architects are responsible for helping to ensure the successful integrated delivery of cloud security solutions. Turner plays a key part in bringing diff...
Moderator--Bill WhiteDevOps Revolutionary - Information Security, State FarmBill is an Information Security professional with 30 years’ experience in IT, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for Information Security architectural at a Fortune 50 company. He started as a bench technician while learning his way up to Information Security Manage...
Justin BaumanManager, IBM Cloud - Penetration Testing, IBMJJustin is currently a leader in Information Security for IBM Cloud and Watson Platform. With a background in red teaming and blue teaming over the past ten years, multiple degrees in his field, and SIEM and hacking certifications, he has affected positive change in securing some of the largest environments and cloud deployments in the world ...
Chad Childers, ModeratorAutomotive Solutions Director, Sec eDGEInternationally recognized security thought leader. Expert on Threat Modeling, IoT Security, Threat Analysis and Risk Assessment (TARA), Cryptography, Application Security, and Agile Development Security.
Chad is a voting member of SAE Vehicle Cybersecurity Committee TEVEES18A that shapes the future of automotive security and leading a...
Jason LancasterCloud Security Architect, CloudPassageJason Lancaster is a Cloud Security Architect at CloudPassage where he helps customers implement security automation solutions in DevOps and Cloud environments. Jason has over eighteen years of experience working in information security. Previously he lead a team of researchers with Hewlett Packard Enterprise Security Research publishing rese...
Nick SchilbeSr. Director of Security Solutions, SentinelOneAvid Video game player turned video game hacker turned professional hacker. Joined WhiteHat Security at a young age and quickly became the head of their Threat Research Center. While at WhiteHat, Nick performed penetration tests on thousands of websites while creating new attack techniques to evolve the WhiteHat Sentinel platform. In 2014 ...
Nathaniel GleicherHead of Cybersecurity Strategy, IllumioAs head of Cybersecurity Strategy, Nathaniel is responsible for thought leadership and Illumio’s cybersecurity technology strategy. Prior to Illumio, Nathaniel managed and secured networks, investigated and prosecuted cybercrime at the U.S. Department of Justice, and served as director for cybersecurity policy on the National Security Council...
Mark StanfordSE Manager, Cloud Security, CiscoMark Stanford is a 22-year vet of the security industry, running the gamut of positions: from crypto engineer to solutions architect to manager/director of SE’s. He’s had the opportunity to work with incredible teams and great technology with several companies, including F-Secure, Blue Coat, F5, FireEye, and currently Cisco Cloud Security. Ex...
John WaidFounder & CEO, American Club, U.S. Chamber of CommerceJohn Waid is the Founder & CEO of C3-Corporate Culture Consulting. C3 believes that in companies it's all about people and how they behave. Culture is the driving force behind this. Security is a systemic issue and needs an approach that focuses on people's daily behaviors to solve this.
Joshua HorneSecurity Analysis Manager II, Cyber Threat Analysis Center (CTAC) at SecureWorksNicole Keaton HartCxO - Deputy CIO , Nicke Consulting GroupNicole Keaton-Hart has served as a fractional CxO in Financial Services, Consumer Packaged Goods, Retail, Oil & Gas and Health IT industries as Chief Information Security Officer, Chief Information Officer and Chief Strategist. As a visionary and pragmatic leader with a keen focus on Business, IT and Information Security operating in harmony ...
Scott GordonSr. Cloud Security Specialist, SymantecScott Gordon is a Senior Cloud Security Specialist at Symantec and has several years of experience with the industry leading CASB solution. Scott’s experience in International managed services product engineering and operations has given him fantastic insight into securing cloud-based applications and platforms.
David BartonManaging Director, UHY ConsultingDavid Barton is a Managing Director with UHY Consulting and practice leader of the Technology, Risk, and Compliance practice, which provides cybersecurity consulting and compliance services focused around information technology. He has over 30 years of practical experience in information systems and technology risk and controls.
David i...Tamika BassCybersecurity Director, Gannett FlemingTamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys ...
Clay CarterDirector of Security Architecture, GE DigitalClay Carter is the Director of Security Architecture at GE Digital and promotes secure, practical design throughout the company. In his five years at GE he has built secure enclave environments, consulted on multiple acquisitions and divestitures, and designed an agile policy & controls program. His current focus is rebuilding an agile sec...
Paul YatesAssistant Director, Information Security, ISC2, SANSPaul Yates currently serves as the Assistant Director for Information Security at the University of Chicago Medical Center. He is responsible for building and executing the strategy for the Security Operations and Risk Management teams within UCM’s Information Security Office. Mr. Yates has worked in the Healthcare, Consulting and DoD industr...
David KeatingPartner, Alston & Bird LLPDavid Keating is one of the co-leaders of the Privacy and Security Practice at Alston & Bird. David’s practice is focused on advising clients on privacy and security issues arising along the entire data lifecycle. He assists clients with compliance strategies, policy development and implementation, data monetization and data use analyses, new...
Brett WilliamsMajor General, U.S. Air Force (Retired)Major General (Ret) Brett Williams co-founded IronNet Cybersecurity and is the President of the Operations, Training and Security Division. Providing strategic vision and the foundational security platform solutions for IronNet, General Williams also serves as the Chief Security Officer responsible for product, enterprise and physical securit...
Kurt WescoeChief Architect, Wombat Security, a division of ProofpointAs Chief Architect at Wombat Security, Kurt is responsible for ensuring Wombat's software and systems are built on a sound foundation. He brings over 10 years of experience in engineering, across multiple industries. He also serves as a faculty member in the School of Computer Science’s master’s program in e-Business at Carnegie Mellon Univer...
Christian FontaineSenior Security Engineer, Trend MicroChristian Fontaine serves as a Senior Security Engineer for the Southeast region. He sits on several security committees at Trend Micro that evaluate and architect solutions that meet current demands for virtual and cloud environments. He has served as CISO at Humber College / University of Guelph at Humber in Canada. He has also served as a ...
Hien NguyenSenior Security Architect, Booz Allen Hamilton, IncHien Nguyen brings more than 16 years of IT & OT experience in the public and commercial sectors which includes information security programs, network/system security architecture, and regulatory compliance.
Hien has also developed a growing professional service business inside a multinational management consulting firm with more than 5...Michael Holcomb, ModeratorFellow and Director of Cybersecurity, FluorMichael Holcomb is the Fellow and Director of Information Security for Fluor, one of the world's largest construction, engineering, and project services companies with 60,000 employees around the world. In his role at Fluor, Michael is responsible for vulnerability management, incident detection/response, penetration testing and industrial co...
Kim JacksonDirector, Business Resiliency, Automatic Data ProcessingKim Jackson is a certified business resiliency professional with over 20 years of experience in incident management, disaster recovery, and business continuity, with a specialization in program development. Kim has successfully created programs for several major banking entity's, as well as large insurance and financial firms to ensure the v...
Gregg BrauntonBanking, Insider Threat OperationsA strategic security partner blended with deep operational, architecture, and compliance expertise. Innovative, strategic, and tactical security leadership utilizing "business aligned" and "data-driven" cybersecurity models and frameworks. Gregg has 20+ years extensive cyber expertise leading and delivering cybersecurity operations, architect...
Matteo VallesStrategic Partnership Coordinator, FBIMatteo Valles has been a Special Agent with the FBI for 30 years. His office of assignments have included Anchorage, AK; Boston, MA; Washington D.C.; Gulfport, MS; Vienna, Austria; Nairobi, Kenya; and now Atlanta, GA.
While based in Nairobi, Kenya for 3 years, SA Valles was in-charge of all FBI operations in East Africa, to includ...Cameron MichelisSr. Director, Business Security Office, Automatic Data ProcessingCameron currently serves as Senior Director of the ADP Business Security Office, has over 20 years of experience in Information Security, Data Science and Incident Management. Cameron holds a BS in Mathematics from the University of Florida, multiple professional certifications and is a member of the SANS Institute GIAC Advisory Board.
Wes ConnellThreat Researcher, BluVectorAs the Threat Researcher for BluVector, Wes Connell is especially motivated and passionate for dramatically improving data hunting tradecraft within the cyber security domain. Wes has a broad range of technical interests – particularly in the security dimension of hardware, software, systems, and networks.
Nathan ChuCyber Security Systems Engineer, CiscoNathan Chu is a Systems Engineer who stands at the forefront of the Cyber Security Realm to help organizations prepare for inevitable intrusions. Prior to joining Cisco’s Cyber Security team, Nathan spent 4 years as a Generalist Systems Engineer, consulting design strategies with clients to construct best practice networks.
Jaeson SchultzTechnical Leader, Cisco TalosJaeson Schultz is a Technical Leader for Cisco Talos Security Intelligence & Research Group. Cisco's
Talos Group is dedicated to advancing the state-of-the-art of threat defense and enhancing the value of
Cisco's security products. Jaeson has over 20 years’ experience in Information Security.Aaron WeissenfluhCISO, Cboe Global MarketsAaron Weissenfluh currently serves as the Chief Information Security Officer of one of the largest stock exchanges in the world. He has presented internationally and leads the charge to forever end the metrics based approach to security.
Earl CarterSenior Threat Researcher, Cisco TalosEarl Carter is a Senior Threat Researcher in Cisco’s Talos Group. Talos is a team of researchers that constantly examines the threat landscape to drive updated threat intelligence into Cisco security products as well as providing tools and information to the general security community through blogs, whitepapers and security tools.
Jason CraditCIO / CTO, Summit Carbon SolutionsJason Cradit is a highly-skilled technology executive with a passion for creating innovative solutions in the energy and utilities industry. For two decades, Jason has helped companies use technology to streamline their processes, reduce costs, and increase efficiencies by challenging the status quo and leading teams to set higher bars with m...
Alex ChiuThreat Researcher, Cisco Systems, Inc.Alex is a Threat Researcher for the Talos Group at Cisco Systems, a group that specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. Much of his time is spent hunting for new and evolving threats and making sure customers are protected from them.
Phillip MahanDirector, Privacy Program, GoTo FoodsA standard biography for Phillip would mention his years of experience in Privacy, Security, Governance, and Audit. It would tell of the business sectors he has worked with, and perhaps even the companies and professional organizations he’s been affiliated with for the last 25+ years. This is not the standard bio.
Telling stories and ...
Ricardo LafosseCISO, The Kraft Heinz CompanyRicardo Lafosse is responsible for IT risk governance, software and product security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security topics at global conferences, including Defcon, MirCon, and ISACA CACS. Lafosse has more than 15 years ...
Chris BatesPrincipal Architect, SentinelOneChis Bates has over 22 years of experience in the Cyber Security and Information Technology field. As the Principle Architect for SentinelOne, he leverages his years of experience in Incident Response, Cyber Security Operations, Security Architecture, and Cyber Security Strategy to continually improve and transform how SentinelOne approaches ...
M.J. VaidyaPrincipal, Advisory Services, Ernst & Young LLPM.J. Vaidya is a Partner/Principal in the Advisory Services
practice of Ernst & Young (EY) LLP. He has over 20 years of
experience including holding CISO positions at Fortune 10 and
Fortune 200 companies. He also previously held leadership
positions at PwC, Deloitte, and Accenture. M.J. has provided
security and ...Meenaxi DaveInformation Security Instructor/Consultant, Gwinnett Technical CollegeMeenaxi Dave is an experienced Information Security educator with proven success developing, delivering and evaluating IT security training programs. She holds her Masters in Computer Science from the University of Memphis and a Diploma in Cybersecurity from GTC. She also holds professional certifications in CISSP, CEH, COMPTIA Security+, Net...
Anita BatemanIT ExecutiveAnita is a 19-year technology veteran with experience at Fortune 500 and premier energy/utility firms. She has a demonstrated track record in management, delivery, architecture and cybersecurity. She holds a Master of Sciences in Computer Science from the University of Texas at Austin.
Bill LappSr. Director, Sales Engineering, ZscalerAs the Leader for Solution Engineering and Architecture at Zscaler Bill Lapp is responsible for all pre-sales engineering efforts in North and South America. His primary focus is assisting large enterprises to rethink how they approach network and business transformation through the use of security and policy.
Damien SuggsSr. Application Security Architect , Metro Atlanta Chapter of ISSAMr. Suggs is a leader in the IT Security area and is the current president of the Metro-Atlanta ISSA chapter. He served as president for seven years; however, during his eleven-year relationship with the Metro-Atlanta ISSA chapter he assisted the chapter grow in roles such as Director of Membership, Director of Training, Conference Chair and ...
Aaron RileyNetwork Security Analyst CIT III, Office of Cyber Security, State of MissouriBorn and raised in Kansas City, I'm a proud Missourian. I have received two degrees from Moberly Area Community College in computer science and working on a third. I have been with the state for 3 years and am currently with the SOC team in the Office of Cyber Security.
Chris ShullvCISO, Salem Medical CenterChris Shull (CISSP, CIPP/E, CIPP/US, CIPM, FIP) is the vCISO for Salem Medical Center, vCISO and vDPO for several other organizations, and an Information Security and Privacy consultant and advisor.
With over 35 years in IT, information security, and privacy, Chris specializes in Keeping Information Security Simple so businesses can un...
Rob Arnold, ModeratorDirector of Information Security & Privacy Officer, Children InternationalRob Arnold is Director of Information Security at Children International, where his job is protecting the data and systems we use to fight to end global poverty. Twenty-eight years of working in Information Technology in the public and private sector has given Rob the conviction that successful outcomes happen when you don’t let the technolog...
Tony MeholicDirector of Cybersecurity / CISO, The Bancorp BankAnthony is currently Director of Cybersecurity, Chief Security Officer at The Bancorp Inc. in Wilmington, Delaware. He has worked extensively with application development including creation of simulation software for emergency medical providers, work with local government agencies on EMS trending and metrics and customized user interfaces for...
Robert DewhirstInformation Security and Infrastructure Manager, Educational Testing ServiceMr. Dewhirst is a senior information security professional with 24 years of experience in software development and IT systems management. He currently manages information security, infrastructure and system administration for the K-12 testing systems of the world's largest private nonprofit educational testing and assessment organization.
Edward MarchewkaDirector, Information and Technology Services, Gift of Hope Organ and Tissue Donor NetworkEdward Marchewka is the Director of Information Technology for Gift of Hope Organ & Tissue Donor Network. He is also the creator of CHICAGO Metrics™, a platform to help manage your company's key IT and Information Security risks. Edward has completed, from Northern Illinois University, an MBA and an MS in Mathematics and, from Thomas Edison S...
Jack Richard DoughertyAsst. Commandant, Texas A&M Maritime AcademyJack Dougherty has a B.S. in Maritime Administration from Texas A&M and is obtaining a Masters of security management in Cyber Security. He is a USN veteran, Maritime Security contractor and holds certifications with the DOS as a Maritime Anti-terrorism instructor as well as with the USCG.
Lance HowardDeputy Cyber Security Director, Portland General ElectricLance Howard has been in the Utility industry for 15 years, beginning in a security operation center and most recently the Manager of Security Assurance of a local Utility company. He has also held positions that have included risk assessments, security architecture and design.
David MissouriSenior Agency Information Security Officer, SAISO, GA Department of Juvenile JusticeDavid Missouri is a former federal Information System Security Officer for the Department of Labor, Wage & Hour, currently a State of Georgia Senior Agency Information Security Officer. David is the Vice President of Governance for the ISACA Atlanta chapter. He holds a Master of Science in Information Systems degree.
Mark GelhardtCIO, Georgia State Defense Force, Former CIO, The White HouseColonel Gelhardt, at the pinnacle of his military career was selection to work at The White House as the CIO, supporting President Clinton, the VP, the White House Staff, and the U.S. Secret Service managing all the classified automation and telecommunications. Colonel Gelhardt is a combat veteran. Colonel Gelhardt is a well-known speaker and...
Karen WorstellMember, Board of Directors, Colorado Technology AssociationKaren Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.
She has provided cybersecurity support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, develope...
Dr. Paul BerrymanCyber Risk Strategy Manager, DeloittePaul Berryman, EdD, CISSP, CISA, is a Cyber Risk Strategy Manager. He’s worked in IT security for almost 2 decades protecting against the usual suspects of hackers, criminals, and bored teenagers. After 6 years of swashbuckling adventures with the US Navy, he’s led several security operation teams. He’s a big fan of colleges, having attended ...
Quincy JacksonRed Team Lead, Oil & Gas CompanyQuincy Jackson (CISSP, C|EH, GCIA, GWAPT, GREM) currently works as a Red Team Lead with over 20 years experience. His primary responsibilities include programs to evaluate and measure the actual effectiveness of the Security Operations Center. His Cyber Readiness and Defense Capability Testing Programs were created to reduce uncertainty and ...
Herbert MattordAssociate Professor, Kennesaw State UniversityHerbert Mattord, Ph.D., CISM, CISSP completed 26 years of IT industry experience before joining the faculty at Kennesaw State University in 2002. He was formerly with Georgia-Pacific Corporation. He is on the Faculty at Kennesaw State University with the rank of Associate Professor, teaching Information Security, Cybersecurity, and Informatio...
Ben SmithField CTO (US) & Principal Sales Engineer, RSABen Smith is Field CTO (US East) with RSA, and a technically-focused risk management executive with over 25 years’ experience. He holds the CISSP and CRISC certifications and has presented on RSA's behalf at cybersecurity events sponsored by Gartner, FS-ISAC, ISSA, BSides, ICI, (ISC)2, ISACA, InfraGard, HTCIA and other organizations.
Steve NaphyCIO, Morgan, Lewis & Bockius LLPSteve Naphy serves as Morgan Lewis's Chief Information Officer. In his role, Steve concentrates on leveraging data analytics and process to drive efficiency and effectiveness in both business operations and the delivery of legal services. He has over 20 years of experience working in information technology (IT), including previously running i...
Chris HoffField Product Manager, CiscoChris Hoff is a Field Product Manager with over 20 years in network and information security operations, sales and marketing. During this time Chris has helped numerous organizations build and manage their IT operations. In his current role, he helps educate organizations on the current threat landscape and understand how they can pro-activel...
Amy MushahwarData Privacy, Security, and Management AttorneyAmy Mushahwar is a data privacy, security, and management attorney with over 15 years of experience in the technology industry in legal and engineering capacities. Amy defends companies in privacy-related matters as well as assists clients in the development of integrated digital platforms, such as cloud computing and database APIs.
Brian HowellSr. Manager, Internal Audit, Spirit AeroSystemsBrian is a business and technology risk advisor with nearly 25 years of experience in various risk management, audit and business process functions. In his current role at Spirit, he serves as a Senior Manager within the Internal Audit group focused on operational and IT audits.
He is a member of both the IIA and ISACA and is a Certifi...
Robert BlockSVP, Identity Strategy, SecureAuthAs a Senior Vice President of Identity Strategy at SecureAuth, Robert Block is responsible for helping execute on SecureAuth’s strategic vision. Considered a thought leader in IAM, Robert interacts with customers, vendors, and leading industry analysts on the state of Identity and Access Management on a regular basis. Robert has over 19 years...
Jeff KorteDirector Community Institutions & Associations, Financial Services - Information Sharing & Analysis CenterJeffrey is a former banking security practitioner possessing over 24-years’ experience in the financial services sector and ten security domains. As a BSO and ISO, he specialized in developing cybersecurity and fraud programs. He currently manages a council with FS-ISAC assisting over 3,800 members achieve cyber-security maturity.
Aaron WeaverDirector of Cloud Security, Financial ServicesAaron Weaver has over 20 years' experience specializing in application and cloud security and providing training sessions at various international industry events. His work includes security consulting, penetration testing, threat modeling, and code reviews. Aaron also enjoys honey bees and recently has been experimenting with hive designs.
Thomas HandlonChief Information Security Officer, Kennedy Health SystemThomas Handlon - Chief Information Security Officer at Kennedy Health System, NJ. Thomas (Tom) Handlon is the chief information security officer at Kennedy Health System in NJ. Prior to Kennedy, he was director of information security at American Realty Capital, a financial investment firm. Tom has almost 20 years’ experience in informat...
Jared CheneySenior Vice President of Client Operations, AtmoseraJared Cheney excels at delivering a consistent and outstanding customer experience. He oversees networking, computing, storage, application services, monitoring, and a 24x7x365 Technical Assistance Command Center (TACC).
Ray EspinozaVice President of Information Security, AtmoseraRay Espinoza is an expert delivering complex InfoSec capabilities and strategies. He is responsible for all security and compliance initiatives and customer solutions.
Jeff MoncriefSystems Engineering Manager, CiscoJeff Moncrief is a Systems Engineering Manager at Cisco. Jeff has over 17 years of Information Security Industry experience, holding leadership roles in Support, Sales Engineering and Pre/Post-Sales Technical Account Management. Jeff’s specializations include compliance, vulnerability management, incident response and security architecture....
Tanya ZlatevaDean, Boston University Metropolitan CollegeTanya Zlateva is the Dean of Boston University’s Metropolitan College and founding director of the Center for Reliable Information Systems and Cyber Security. She spearheaded the development of cybersecurity programs both face-to-face and online. She holds a Ph.D. in computer science and pursues research in cybersecurity, educational technolo...
Peter BeardmoreSr. Consultant, Solutions Marketing, RSAPeter Beardmore has nearly two decades of IT, security, and software marketing and business development experience. He began his career as a Signal Corps Officer in the U.S. Army. Prior to joining RSA to help lead messaging and solutions development, Peter led product marketing at Kaspersky Lab.
Robertson PimentelProduct Manager, CentrifyRobertson Pimentel is a product manager and evangelist at Centrify Corporation. He has held security-related positions at Ford Motor Company and Intel Corporation. His focus is primarily in Centrify Server Suite and Privilege Service and his goal is to balance product capability and operational efficiency.
Matthew PerryExperienced Manager, Grant Thornton’s Risk Advisory ServicesMatt has over 25 years Information Technology (IT) experience; 12 years in Information and Cyber Security. Prior to joining Grant Thornton, Matt served 8 years as the Director of Information and Cyber Security for a global manufacturing and energy production company. While there he was responsible for the design, application and oversight of ...
Ed MetcalfSenior Director of Product Marketing, CylanceEd brings more than 20 years of security and technology industry experience to his role at Cylance, where he’s leading the endpoint security product marketing strategy, while championing the voice of the customer. His mission is to provide the glue that links together the market needs, what to build and how to go-to-market.
Prior to ...
Michael DalgleishDirector, Sales Engineering, LogRhythmMichael Dalgleish is a Director of Sales Engineering at LogRhythm, where he has built a team of security professionals who are growing strategic relationships with the partner community. Michael is an industry veteran, spending the last 15 years deeply entrenched in the network and security world. When not on the road evangelizing security in...
Pete RyanDirector of ClearPass Sales East, HPE ArubaPete Ryan is a sales professional with over 25 years of experience in building and leading motivated sales teams in the networking and networking security industry. He accepted his current position as ClearPass Sales Director for the East for Aruba HPE in 2013. In this role, he is responsible for strategy, promotion and sales execution on the...
Wayne MachucaDoctor & Professor, Information Systems and Technology Management, Mt. Hood Community CollegeDr. Machuca is the PI and lead instructor for the AAS / CyberSecurity & Networking degree at Mt. Hood Community College in Gresham, OR. MHCC has the only cyber security Associates degree in Oregon. It was awarded CAE-2Y by DHS and NSA. MHCC will award Cyber 40 graduates in 2017.
Tom StumpekCISO, Lahey HealthTom Stumpek currently serves as the CISO at Lahey Health. Prior to Lahey Tom spent over 20 years with the General Electric Company in various IT C-level positions (CISO, CTO, CIO) in the financial services, insurance, manufacturing and corporate sectors. Recently Tom has presented at several executive IT events on technology strategy, enterpr...
Jason GarbisCo-Chair for the Cloud Security AllianceJason Garbis, CISSP, is a leader of the Software-Defined Perimeter working group at the Cloud Security Alliance. He’s Vice President of Products for Cryptzone, responsible for product strategy and product management. He has over 25 years of experience at technology vendors, including roles in engineering, professional services, and product ma...
David BresslerManaging Security Consultant - Application Security, GuidePoint SecurityDavid is a Managing Consultant at GuidePoint Security within the Application Security Team. David has broad-based experience managing and conducting application penetration testing, source code review, application architecture review, network penetration testing, digital and physical social-engineering assessments, dating back to 2008. Davi...
John GrimHead of Research, Development, Innovation, Verizon Threat Research Advisory CenterJohn has over 17 years of experience investigating, and leading teams investigating, data breaches and cybersecurity incidents within the government and civilian security sectors. Currently, John heads the Verizon Threat Research Advisory Center (VTRAC) research, development, and innovation effort. In this role, he focuses on researching cybe...
John DuMontDigital Forensics Investigator, Verizon RISK TeamJohn DuMont is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, John responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures. Prior to Verizon, John worked as a defense contractor performing computer network de...
Joel BrennerLegal and Consulting Services, Former Senior Counsel at the National Security AgencyJoel F. Brenner specializes in cyber and physical security, data protection and privacy, intelligence law, the administration of classified information and facilities, and the regulation of sensitive cross-border transactions. He has represented companies and individuals in a wide variety of transactions and proceedings including sensitive fo...
Caleb ChristopherDirector of Technical Operations - Cino Ltd | Director of IT, Challenger SportsCaleb Christopher is the Director of Technical Operations at Cino Ltd - a national cybersecurity and risk
management firm; and the Director of IT at Challenger Sports - a global soccer camp organization. He has 9+ years experience in security.Andrew WildCISO, QTS DatacentersAndrew Wild is the chief information security officer at QTS Data Centers, the only fully integrated data center, managed hosting and cloud services provider. Wild has spent more than 25 years developing effective, customer-driven information security, incident response, compliance and secure networking programs for technology and telecommuni...
Phil CurranCISO & CPO, Cooper University Health CarePhil Curran has more than 25 years of experience in information security and privacy in the military, government and private sectors. As the Chief Information Assurance Officer and Chief Privacy Officer at Cooper University Health Care in Camden NJ, he is responsible for managing governance and regulatory compliance, risk assessment and manag...
Gerardo CruzElectrical Engineer, Security ConsultantGerardo is an Electrical Engineer and security consultant.
Stephanie J. DeFrangescoCEO, DataTechStephanie is the CEO of DataTech, a cybersecurity company providing security analysis
Ralph DeFrangescoProfessor, Drexel UniversityRalph is a professor at Drexel University and a cybersecurity consultant.
Joshua CostaDigital Forensics Investigator, Verizon RISK TeamJoshua is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Joshua responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures. Prior to Verizon, Josh worked in various consulting roles where he performed digital fo...
Eric SunSolutions Mgr., Incident Detection & Response, Rapid7As a solutions manager for Rapid7’s Incident Detection & Response offerings, Eric works closely with Metasploit, their penetration testers, and managed SOC to help security teams model their programs after the intruder attack chain. Eric brings a layer of behavior analytics and risk management from his many years in Asia as a professional pok...
Ariel SiegelmanPresident, DRACO GROUPCertified by GA POST as a firearms and Defensive Tactics instructor and by the Israeli government as an instructor of Counter Terrorism, Tactical Firearms, and Krav Maga. Operated in a Special Operations Unit in the Israeli military and is regarded as an international expert in the mitigation and response to violent confrontation, especially ...
Bill KwakChief Security Architect, VaxientBill Kwak has almost 20 years of combined IT and Information Security experience in the healthcare, banking & financial, government, and consulting sectors.
Mark ArnoldSenior Research Principal, OptivMark Arnold brings more than 20 years of technical and leadership experience to his role as a senior
research principal for solutions research and development at Optiv. Arnold develops strategy deliverables
and frameworks to help industry verticals mature and grow efficient security programs.Prior to joining Optiv, Arnold...
Thomas PaceVP, Global Enterprise Solutions, BlackBerryThomas Pace has an extensive background in building incident response programs, policies, procedures and playbooks at multiple top-tier organizations. Thomas has 11 years of security experience in various fields including physical security, intelligence gathering and analysis, sensitive site exploitation, incident response, intrusion analysis...
Jeff SchultzPartner and Co-Chair of the Data Security and Privacy Practice, Armstrong TeasdaleJeff Schultz is an experienced business litigator with extensive knowledge about the field of data security and privacy. He is co-chair of Armstrong Teasdale’s Data Security and Privacy practice group and a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals.
Ed CabreraChief Cybersecurity Officer, Trend MicroEduardo E. Cabrera is a trusted advisor and a proven cybersecurity leader. He is responsible for analyzing emerging cybersecurity threats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran of the United States Secret Ser...
Carlos GonzalesGlobal VP, Hybrid Cloud Security, Trend MicroCarlos has over 20 years of expertise in enterprise software and infrastructure. Prior to joining Trend Micro, Mr. Gonzalez was a Sr. Sales Director at Oracle, responsible for sales and services of Oracle’s Cloud Computing and security initiatives for Latin America.
Ken PylePartner, Information Security, DFDR ConsultingKen Pyle is a partner of DFDR Consulting specializing in Information Security, Computer Forensics, Enterprise Virtualization, and Network Engineering. Ken has an extensive background in Network Penetration and Remediation, Compliance, and exploit development. Ken has published exploit research and vulnerabilities for a large number of compani...
Brad AntoniewiczSr. Security Researcher, Cisco Cloud SecurityBrad Antoniewicz works in Cisco Umbrella’s security research group. He is an Adjunct Professor teaching Vulnerability Analysis and Exploitation and a Hacker in Residence at NYU’s Tandon School of Engineering. Antoniewicz is also a Contributing Author to both the Hacking Exposed and Hacking Exposed: Wireless series of books.
Sheri DonahueCyber Security Strategic Partnerships Director, HumanaSheri Donahue spent 20 years as a civilian Navy engineer, most recently as Program Manager for Security & Intelligence (Indian Head Division). She is President-Emeritus of InfraGard National where she served on the national board for 11 years. Currently, she is the Cyber Security Strategic Partnerships Director for Humana.
Michael LipinskiCISO and Chief Security Strategist, SecuronixMichael J. Lipinski is CISO and chief security strategist at Securonix. He has over 28 years of experience in risk and information security, digital forensic investigations including HR interrogation, legal process support and testimony. Lipinski has helped organizations of all sizes design, build and run risk, IT governance and information s...
Shreyas KumarCISO, DeserveChief Information Security Officer Shreyas Kumar has spent more than 18 years in cybersecurity related roles. He most recently built the security program at Fintech startup Deserve, from the ground up. This follows previous roles which included securing Uber's global payments and the operational security and compliance of the Adobe Doc Cloud ...
Alex VillegasSecurity Engineer, AmazonAlejandro Villegas is a seasoned security engineer with 16 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001
Bill WilderCTO, FinomialBill Wilder is a cloud computing veteran and CTO at Finomial, providing SaaS solutions to the global hedge fund industry from the public cloud. Bill is recognized by Microsoft as a 7-time Azure MVP awardee for his cloud expertise and community leadership. Bill is the author of Cloud Architecture Patterns (O’Reilly Media, 2012).
Tom CooperPrincipal Geek, BrightHill GroupTom Cooper, PMP is the founder of BrightHill Group, where he believes that "Because People Matter, We Must Lead Them Well.” Because of his deep experience in software development and enterprise IT implementation, Tom specializes in working with highly technical experts.
Deidre DiamondFounder and CEO, CyberSN and Secure DiversityDeidre Diamond is the founder and CEO of CyberSN, the largest cybersecurity talent acquisition technology and services firm in the U.S., transforming job searching and hiring for the cybersecurity industry. Standardizing all cybersecurity job functions into a common taxonomy of 45 roles, the CyberSN platform allows professionals to make anony...
Scott SchoberPresident / CEO of BVS, Cybersecurity Expert, Author, BVSScott Schober is the president and CEO of Berkeley Varitronics Systems, an experienced provider of wireless test and security solutions. He is considered one of the foremost wireless technology and cybersecurity experts in the world, and is regularly interviewed for leading national publications, as well as appearing on major network televisi...
Steven WeberDirector - Isaac L. Auerbach Cybersecurity Institute, Drexel UniversitySteven Weber is professor in the Department of Electrical and Computer Engineering, founding director of the Isaac L. Auerbach Cybersecurity Institute, and founding director of the Modeling and Analysis of Networks Laboratory (MAN Lab) at Drexel University.
Claire LaVelleEvent Director, ISSAClaire LaVelle is a Security Consultant for the North America PCI team at Verizon with over 15 years of Information Technology experience, including a decade dedicated to all facets of Information Security (compliance, architecture, operational, privacy and forensics).
Claire has two Masters Degrees in Computer Science. She earned her ...
Dave KeenePenetration Tester, Wells Fargo, Charlotte ISSA Board MemberDave enjoys the outdoors as much as he can get away from his computer. He is active in the security community in Charlotte as well as international endeavors.
Mark BloomDirector of Product Marketing, Security & Compliance, Sumo LogicMark Bloom has more than 15 years of experience in sales, marketing and business development across financial services and high tech industries. His previous roles include Cisco, Compuware, SonicWall/Dell, Trend Micro and more.
Danielle L Fritzler, CBCPGlobal Business Continuity Program Manager, VanguardAs part of Vanguard's corporate business continuity management team, Danielle has responsibility for the International business continuity program. Her areas of focus include workspace resilience, workforce resilience, supplier/business partner resilience, technology resilience, crisis management, and communication. She is a member of SecureW...
Scott MargolisCISO, Massachusetts Bay Transportation Authority (MBTA)Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business cont...
Jared S. HosidSenior Counsel, U.S. Dep't of Justice, Criminal Division, Computer Crime and Intellectual Property SectionJared Hosid is Senior Counsel in the U.S. Department of Justice’s Computer Crime and Intellectual Property Section, where he focuses on cybersecurity, electronic surveillance, and the growing challenge in obtaining lawful access to electronic evidence in criminal investigations. Jared also investigates cases involving various types of cyberc...
Dan WalshInfoSec Protagonist, Act 1 Security, (ISC)² , (ISC)² Eastern Chapter, HIMSSDan Walsh, MBA, CISSP
Act 1 Security founder & principal protagonist, consulting on the information security challenges facing the healthcare, public, and retail sectors.
• Commonwealth of Massachusetts’ Chief Security Officer (2006-2011)
• Information Security Officer - South Shore Hospital
• Information Systems Secur...Jason ElmerManaging Director, Global Cybersecurity Services, Duff & PhelpsJason Elmer is a Managing Director at Duff & Phelps, instrumental in launching the Cybersecurity practice. Jason brings 15 years of experience in financial services, with technology positions serving hedge fund, private equity and alternative investment markets. Jason holds a BS in Finance from Fordham University College of Business Administ...
Gene KingsleySpecial VP, Board of Directors, InfraGard National Members Alliance; Chairman, American Security and Resilience FoundationAs an experienced information security strategist and collaborative executive leader, Gene Kingsley builds and leads scalable, highly effective cybersecurity programs that enable organizations to protect their intellectual property and maintain critical operations while maximizing profitability. Gene is passionate about designing secure, comp...
Michael Horsch FizzPrincipal Advisor, NSA, ISSA, ISACA, FCIWith more than 20 years of experience, Michael brings an in-depth understanding of currently available solutions empowering clients to achieve operational excellence. Over his career, Michael has delivered over three thousand consultations to technology and financial organizations.
Esmond KaneCISO, AdvarraEsmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuab...
Terry Ziemniak, CISSPChapter Member, (ISC)2Terry has over 25 years' experience in the information security field with work ranging from hands on security penetration testing to the build out of complex, state of the art cyber protections. Additionally, he has spent over a decade in the role of Chief Information Security Officer for very large organizations (including Atrium Health her...
Joan AntokolPartner, Park Legal LLCJoan has experience as an in-house global privacy officer for a Fortune 500 company, and also served as a Partner and chair of the data privacy practice for a large international law firm. Since 2010, she has operated her own law firm, Park Legal, LLC, with offices in New Jersey and Indianapolis. Since 2003, Joan has been invited to be a memb...
Cheri SigmonvCISO, ConfidentialLeveraging 21 years of experience in leadership, information security and workforce development, as a Chief Information Security Officer (CISO), Office of the Secretary of Defense (OSD), Cheri secured sensitive military networks/communications/technology. The Joint Staff; USSTRATCOM Joint Task Force-Global Network Operations; Headquarters Air...
Jonathan LangeExecutive Manager, baramundi software USA, Inc.Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.
Colleen MossSpecial Agent, Federal Bureau of InvestigationSpecial Agent Colleen Moss joined the FBI in November 1996. Eight days into her new assignment in the Baltimore Division, Agent Moss chased down a bank robber and made her first arrest. Agent Moss served on the ground breaking Innocent Images National Initiative Squad in Baltimore for four years. She worked as an undercover Agent online lu...
Greg YorkCISO, Follett LearningGreg enjoys inspiring, innovating, and collaborating to drive business value; time with family; backpacking adventures; and craft beer.
Diane McCarthySenior Associate, PwCDiane holds a Bachelor’s in Telecommunications\Network Management, CISSP, CISA, and CRISC. She has 15 years of technical knowledge including 13 years in IT risk and cybersecurity. She is currently collaborating on multiple projects to automate security assessments including compliance to policy and controls, issue management and exception pro...
Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Com...
Sandy BacikDirector, Audit and Compliance, CipherTechs, Inc.Sandy Bacik, CISSP, ISSMP, CGEIT, CISA, CDPSE, PCI QSA, is CipherTechs’ Director Audit & Compliance, has over 20 years’ direct information security and operational experience in the areas of IT Audit and Compliance, BCP/DR, Incident Response, Physical security, Privacy, Regulatory Compliance and Audit, Policies/Procedures, Operations, and Man...
Michael CorbyExecutive Consultant, CGIMr. Corby has more than 40 years in IT strategy, operations, development and security. He is the founder of (ISC)², Inc. the organization that established the CISSP security professional credential. A frequent Secureworld speaker and author, he was CIO for a division of Ashland Oil and for Bain & Company.
Christopher HadnagyCEO, Social-Engineer, Inc.Christopher Hadnagy, is the founder and CEO of Social-Engineer, LLC. Chris possesses over 16 years experience as a practitioner and researcher in the security field. His efforts in training, education, and awareness have helped to expose social engineering as the top threat to the security of organizations today.
Chris established the ...
Dr. Peter StephensonTechnology Editor and author of "Threat Hunter" blog, SC MagazineDr. Peter Stephenson is the Technology Editor and author of the “Threat Hunter” blog in SC Magazine, a leading industry publication for which he has written for over 20 years. He is a cyber criminologist, digital investigator and digital forensic research scientist, as well as being a writer, researcher and lecturer on cyber threat analysis, ...
Nick Multari, PhDProgram Manager, Pacific Northwest National LabNick Multari provides programmatic and technical guidance to cybersecurity research programs at the Pacific Northwest National Lab (PNNL). Prior to joining PNNL, he led the trusted cyber technology group at Boeing Research and Technology. He received his PhD in Computer Science from the University of Texas at Austin
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial ...
Chuck CraftSenior Sales Engineer, TavveChuck's role at Tavve is making customers successful in moving network protocols such as SNMP, Syslog and Netflow into and out of the DMZ. He draws on over 30 years of IT/computer experience; 24 years (NNM 3.31) of that in network and systems management working for HP resellers and vendors.
Barbara Endicott-PopovskyExecutive Director, Center for Information Assurance and Cybersecurity, University of WashingtonBarbara Endicott-Popovsky, Ph.D., is Executive Director of the Center for Information Assurance and Cybersecurity at the University of Washington, recently re-designated by NSA/DHS as a Center of Academic Excellence in Cyber Defense Education, headquartered at UW Bothell, and a Center of Academic Excellence in Research, headquartered at the A...
Alejandro VillegasSecurity Engineer, AmazonSeasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001
Mary GardnerVP & CISO, F5 NetworksMary Gardner’s background provides a wealth of security, compliance, and risk management expertise from a variety of industries, including healthcare, finance, and transportation/logistics. She joined F5 as chief information security officer (CIS)) from Seattle Children’s, where she served as CISO. She has also held security leadership positi...
Mark MillerDirector Customer Support, VenafiMark Miller has been working with security software products for over 16 years. Before that and without realizing it he was preparing for his computer software career by playing games in DOS and Windows. He grew up as a middle child in a large family teaching him how to work with all personality types. His main focus over his career so far ha...
Craig SchippersPrincipal Engineer, Trend Micro, Inc.Craig Schippers is a CISSP Certified Principal Sales Engineer at Trend Micro. He has worked in the Security Industry for approximately 17 years assisting customers with their Infrastructure Security needs. He lives in the Kettle Falls, WA.
Omar ChaudhryChief Engineer of Information Security, Mitre CorpOmar Chaudhry is currently pursuing a Doctor of Philosophy (Ph.D.) in Systems Engineering at The George Washington University. He is also the Chief Engineer of Information Security at The MITRE Corporation. Omar is a cybersecurity practitioner with almost 15 years of experience in operational security and compliance.
Jake Bernstein, Esq.Partner - Data Protection, Privacy & Security Group, K&L GatesJake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense cou...
Kathryn HaunU.S. Dept. of Justice, Stanford UniversityPlease note: Kathryn will be speaking in her personal, not official capacity.
Based in San Francisco, Kathryn Haun is a federal prosecutor with the U.S. Department of Justice and is its first-ever coordinator for emerging financial technologies. Since 2006, she has served as an Assistant U.S. Attorney, first in the Washington D.C. area ...Jeremy HeffnerSenior Cloud Security Engineer, NetflixMr. Heffner is a software and security professional who has worked on numerous commercial and government projects. His passion is for securing and building scalable, survivable, and fault-tolerant distributed systems. His focus includes cyber attack and defense, information gathering and analysis, and scaling systems globally through automati...
Sue HornAudit Senior Manager - IT Assurance, Crowe Horwath LLPSue is a Senior Manager in the IT Assurance Group within the Audit practice of Crowe Horwath, LLP with over 12 years of experience. Sue specializes in IT Assurance services such as support for all areas of computer based controls evaluated as part of Crowe’s financial audits, Service Organization Controls (SOC) attestation reports, and HITRU...
Jack GreinerPartner, Graydon HeadJack Greiner is a commercial litigator who has is heavily involved in the areas of data privacy, Information Law, and social media. His peers selected him for inclusion in The Best Lawyers in America for his work in Commercial Litigation, Litigation-Banking and Finance, Litigation-First Amendment, and Litigation-Intellectual Property from 200...
JD RogersCISO, American Financial GroupJD Rogers is the Chief Information Security Officer for American Financial Group, where he leads the IT security vision, strategy and function for the insurance holding company. JD has more than 20 years of information security experience working in the energy, manufacturing, finance and insurance industries. He joined American Financial Gr...
Kevin DyeResident Agent in Charge, United States Secret Service/DaytonKevin is the new manager of the Southern District of Ohio Financial and Electronic Crimes Task Force. The task force is responsible for criminal investigations of electronic crimes from Columbus, Ohio to Northern Kentucky and partners with hundreds of task force members from numerous federal, state and local law enforcement agencies. He retur...
Emma SutcliffeSenior Director, Data Security Standards, PCI Security Standards CouncilEmma Sutcliffe oversees a number of PCI Security Standards, including the PCI DSS and PA-DSS. She chairs the PCI SSC’s Technical Working Group (TWG) and the Tokenization Working Group, where she works closely with the Payment Brands and Affiliate members to develop standards, supporting documentation and guidance papers. Sutcliffe has over 15...
Jon LitchfieldGlobal Product Security Manager, Johnson & JohnsonJon Litchfield is the Global Product Security Manager at Johnson & Johnson. Jon has 15 years of information technology experience and 8 years of information security experience. Jon holds several industry and security certifications including CISA, PMP, and has recently applied for his CISM certification. Jon started his career in information...
Mike RockInformation Technology Chief Security Officer, Western & Southern Financial GroupMichael Rock is the information technology chief security officer for Western & Southern Financial Group (Western & Southern) based in Cincinnati. In this role, Rock oversees security efforts across the enterprise and identifies security initiatives and standards. He leads three functions: information technology risk, information security ris...
Dr. Christopher PiersonFounder & CEO, BlackCloakDr. Chris Pierson is the Founder & CEO of BlackCloak, a pioneer of personal digital protection for corporate executives, high-profile and high-net-worth individuals and their families. Chris has been on the front lines of cybersecurity, privacy protection, and fighting cybercrime in both the public and private sectors over 20 years. At the De...
Ted SwailesChief Digital Forensic Investigator, Swailes Computer ForensicsAs a digital forensic expert and licensed private investigator in the state of Texas, Ted Swailes has over twenty-four (24) years of investigative and technical security experience working with major corporations and law firms. He has brought expertise and support services to engagements in intellectual property theft investigations, non com...
Pierre GrosdidierAttorney, Haynes and Boone, LLPPierre Grosdidier’s litigation practice focuses on complex commercial litigation, especially lawsuits and arbitrations with strong technical elements. He has litigated cases involving unauthorized computer access, trade secret theft, construction, oil and gas, and software copyright claims. Pierre also advises on data security, data breach an...
Jae ShinHead of Strategic Partnerships, Mobile, Check Point Software TechnologiesJae Shin is the current Global Head of Mobile Strategic Partnership for Check Point Software Technologies based in San Carlos, California. Jae is responsible for creating and managing all mobile security ISV partners, carriers, and device OEM relationships. Jae is focused on integrating Check Point’s Mobile Threat Prevention into the enterpri...
John E. OdeSr. Information Security ConsultantJohn Ode has been involved in forensic computer analysis for over ten years. Well-versed in data recovery and analysis, Ode's broad experience includes computer forensics analysis, advanced data recovery and analysis, networking and telecommunications, computer security, client/server applications and implementations, and Internet Information...
Siobhan GormanDirector, Brunswick Group, Former Wall Street Journal ReporterSiobhan Gorman is a Director in Brunswick’s Washington, DC, office, where she co-leads the Cybersecurity & Privacy practice. Prior to joining Brunswick, Siobhan had a successful 17-year career as a reporter, most recently at The Wall Street Journal. There she covered hot and critical topics including cybersecurity, data and privacy issues, an...
Manoj TripathiVP, Global Information & Product Security, PindropManoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C...
Carlos KrystofCISSP, Sr. Sales Engineer, CylanceCarlos has over 15 years of experience in IT security, with extensive knowledge in network, server, and endpoint security. He advises clients on malware prevention, endpoint visibility, host and network intrusion prevention, vulnerability and configuration management, firewalls\perimeter protection, and SIEM. He is an authority on Cylance, a ...
Andy BennettDirector, Center of Excellence in Digital ForensicsAndy is a native Texan with nearly 20 years of experience in IT, DF, and Cyber Security Issues. He is passionate about security works every day as the Director of the Center of Excellence in Digital Forensics to share that passion with others.
Colleen RiccintoPartner, Cyber Talent SearchDon’t think of Colleen Riccinto as one of “those recruiters.” She shoots from the hip, speaks from the heart, and brings 15 years of experience in sales, security training, and leadership to her role. Colleen is the founder of Cyber Talent Search in Ann Arbor, Michigan.
Daniel ShoemakerProfessor and Director, Graduate Program, University of Detroit MercyDaniel P. Shoemaker, PhD, is a Full Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy, where he has worked for over 35 years. He has retired from his administrative position as Department Chair, PI for the NSA Center and Subject Matter Expert for DHS and NIST. He is enjoying more time with his ...
Clark R. CrainGRC Consultant, Comp-West, LLCI have been a CISSP for more that 19 years, CISM for more that 14, and a CRISC for more that 7. I have worked as a compliance consultant for PCI, HIPAA-HITECH, NERC, NRC and others.
Jen FoxTreasurer, Motor City ISSA ChapterJen Fox is an active member of the Michigan Information Security community and is an ISSA Motor City chapter board member. Her 20+ years of experience in IT and Information Security span the insurance, utility, finance, manufacturing and IT sectors. Her speaking engagements include GrrCON, Security BSides Detroit and CircleCityCon.
Alex KayayianInternal Audit, Risk & ComplianceAlex has professional experience in conducting SSAE-16 audits, attestations, PCI audits, HIPAA audits, policy and procedure writing, IT controls frameworks such as: ISO 27001, SANS critical controls, gap analysis testing, and general controls testing. A combination of academia, private and public sector experience has provided him with unders...
Michael A. StoneATAG-Installations, DMVA Deputy Director, Commander 46th Military Police Command, Michigan Army National Guard and DMVAMajor General Michael A. Stone is the Commander, 46th Military Police Command, Michigan Army National Guard. In this capacity he provides leadership, mission command and strategic priorities in order to ensure effective and efficient accomplishment of the Command’s missions. General Stone is also an Assistant Adjutant General and responsibl...
Shad GundersonSystem Engineer, CentrifyShad Gunderson has been working with identity management since 2001. In addition to working as a practitioner and consultant in the field, he has worked at CA and Hewlett Packard Enterprise Security Services. Shad joined Centrify three years ago as the System Engineer for the Midwest region.
Patrick CorbettAssistant U.S. Attorney, U.S. Attorney's Office, Eastern District of MichiganA 1987 graduate of Notre Dame Law School, Corbett commenced employment as a lawyer working as a law clerk for U.S. District Court Judge Horace Gilmore. From 1989-1999, he prosecuted a variety of federal crimes for the U.S. Attorney’s Office in Detroit. Recruited by former Michigan Attorney General Jennifer Granholm, Corbett then served for 2 ...
Christopher MandelarisCISO, Elevations Credit UnionChris Mandelaris is the Chief Information Security Officer of Elevations Credit Union. He has over 16 combined years’ experience in IT and Information Security. He received his Bachelor of Science from Central Michigan University and Master’s Degree Information Technology - Walsh College of Business Chris has earned CCISO, CISM, CISA, CRISC, ...
Mark RaschSecurity Evangelist, VerizonMark Rasch is a Security Evangelist for Verizon Enterprise Solutions (VES) where he helps develop strategy and messaging for the Information Security team.
Rasch’s career spans more than 25 years of corporate and government cybersecurity, computer privacy, regulatory compliance, computer forensics and incident response. He is trained a...
Dr. Faith HeikkilaInformation Security Governance Specialist, Perrigo Company plcFaith Heikkila, Ph.D., CISM, FIP, CIPM, CIPP-US is an Information Security Architect - Governance at Perrigo Company plc. Dr. Heikkila has prior CISO practitioner experience in overall information security governance, compliance, vendor management, protection of personal and financial information, along with GDPR expertise in a global pharmac...
David DerigiotisCorporate Vice President, Burns & WilcoxCorporate Vice President with the largest independent wholesale insurance broker in the country, Burns & Wilcox. David has participated in cyber roundtable discussions with the US Treasury Department in Washington D.C. and has appeared on Fox Business and CNBC. Publications featuring David include Detroit Crain’s and The Wall Street Journal.<...
Jeff LauerVice President of Americas Business Development, VenafiA recognized speaker, authority and thought leader in security authentication and encryption field. As a key executive in successful, high-technology start-ups including Venafi, Jeff Lauer also brings over 28 years of experience in information technology and security. Mr. Lauer’s recent speaking engagements have included Secure World, CIO ...
Dawn-Marie HutchinsonCISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)Dawn-Marie Hutchinson brings more than 15 years of enterprise information technology experience to her role as CISO of GSK. She is an innovative business partner with extensive experience serving on Enterprise Risk Management teams. Hutchinson is an expert in providing data privacy and security solutions to manage information risk, improve IT...
Jon ClayDirector, Global Threat Communications, Trend MicroJon Clay has worked in the cybersecurity space for over 21 years. He is responsible for managing marketing messages and external publication of all the threat research and intelligence within Trend Micro as well as different core technologies. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses o...
Melissa MarkeyAttorney, Hall, Render, Killian, Heath & LymanMelissa Markey is a shareholder with Hall, Render, Killian, Heath & Lyman, and is licensed in Michigan, Utah, Colorado and Texas. Melissa's practice focuses on technology and life sciences, especially cybersecurity, data privacy, and legal issues at the developing edges of technology. Ms. Markey is a paramedic, and a nationally recognized au...
Zee AbdelnabiAdvisory Manager / Security Researcher, DeloitteZee is a security researcher and a manager experienced in managing large, complex global teams that focus on: advanced penetration testing, connected car security, SIEM, vulnerability management, threat modeling, and mobile security. Zee is an active security community member.
Steven F. FoxDirector of Information Security & Regulatory Compliance, ETSCreating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I ...
Christine WheatonCISO, MeritorChristy Wheaton currently serves as the Sr. Director & CISO for Meritor, overseeing the enterprise cybersecurity and GRC programs, globally. Wheaton previously served as global identity and access management lead for GE Capital, overseeing global IAM programs. Her role expanded to also oversee the information security intelligence program, in...
Charles Parker IICybersecurity Lab Engineer, Thomas Edison State UniversityCharles Parker, II has been in the computer science/InfoSec industry for over a decade in working with medical, sales, labor, OEM and Tier 1 manufacturers, and other industries. Presently, he is a Cybersecurity Lab Engineer at a Tier 1 manufacturer and professor. To further the knowledge base for others in various roles in other industries, h...
Kathy OssianFounder & CEO, Ossian Law P.C.Kathy Ossian is Founder and CEO of Ossian Law, P.C., a firm focused exclusively on Information Technology Law. Kathy has practiced for 35 years; over 22 in Information Technology law. She is a frequent author and speaker on timely IT law topics and the Managing Editor of “Social Media and the Law” published by PLI. Kathy is also an Adjunct Fa...
Barbara L. CiaramitaroChair, Undergraduate Information Technology, Capella UniversityDr. Barbara L. Ciaramitaro is the Chair of the Undergraduate Information Technology program at Capella University. She has taught graduate and undergraduate courses on a variety of topics including cybersecurity, emerging technology, complex systems dynamics, software engineering and project management. Dr. Ciaramitaro is a frequent speaker a...
Pedro Serrano, ModeratorSr. Security Architect, CDWPedro Serrano has over 35 years of experience managing and installing technical controls in networks around the world, 20 of those in military systems. Previously Pedro was a former CISO, Network Security for an integrated healthcare system as well as Security Architect for major Oil and Gas Exploration company, today he is CDW’s Senior Secur...
Amna SiddiquiDirector, Security Management, Financial Investment Management CompanyAmna Siddiqui is Director, Security Management, with a broad-based technology background and current experience in Cybersecurity and Technology Risk Management in the financial sector. She is knowledgeable in industry and regulatory frameworks and holds multiple certifications with most recent related to AWS.
Darren WindhamDigital Forensics Investigator , Verizon RISK TeamDarren is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Darren responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures.
Dr. Bryan S. ClineVP Standards & Analytics, HITRUSTAs the VP of Standards and Analytics at HITRUST, Dr. Bryan S. Cline provides thought leadership for the continuing development of the HITRUST CSF and related methodologies—healthcare’s de facto information protection standard and basis for NIST Cybersecurity Framework implementation in the industry—and the ‘Father’ of (ISC)2’s HCISPP credenti...
Chuck EasttomComputer Scientist, Northcentral UniversityDr. Easttom is the author of 26 computer science books and over 40 research papers, as well as an inventor with 14 patents. He is a frequent speaker at computer science and security conferences, and is a Distinguished Speaker of the ACM (Association of Computing Machinery). He holds a Doctor of Science in cyber security and three masters deg...
Michael R. SmithSr. Information Systems Auditor, Parkland HealthMichael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.
...
John B. Sapp Jr.VP, Information Security & CISO, Texas Mutual Insurance CompanyJohn is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations He is a frequent speaker at some of the largest technology and healthcare industry events.
John PircDirector - Security Solutions, Forsythe TechnologyJohn’s current role is that of Director- Security Solutions for the West area at Forsythe Technology. John brings over 19 years outstanding security industry accomplishments and credibility. John was most recently the Co-Founder and CSO of Bricata, LLC and prior to that was the CTO at NSS Labs. Previously, John had responsibility for all Sec...
Kyle WilhoitDirector of Threat Research, Unit 42 Threat Intelligence, Palo Alto NetworksKyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of worl...
Jing NghikSystems Engineer, RadwareJing is a systems engineer at Radware, a leader in application delivery and security solutions that assures the availability, performance, and resilience of business-critical applications for over 10,000 enterprises and carriers worldwide. Jing is a seasoned security professional with over a decade of networking/security experience covering a...
Shawn E. TumaCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPShawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small...
George FinneyCISO, The University of Texas SystemGeorge Finney is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges. He is the CEO and founder of Well Aware Security and the CISO for The University of Texas System in Dallas, Texas. George has worked in Cybersecurity for nearly 20 years and has helped startups, global telecommu...
Robert ScottManaging Partner, Scott & Scott, LLPRobert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s large...
Jamey CummingsSenior Client Partner, Korn FerryJamey Cummings co-leads Korn Ferry’s Global Cybersecurity Practice, where he advises organizations on the recruitment, assessment, development, and retention of security & risk management leaders. Prior to his career in executive search, he was a consultant with The Boston Consulting Group and served as a US Navy SEAL officer.
Mike KachlineDirector of Operations, PeakswareWith over fifteen years across large to small companies, Mike has written and maintained software using multiple languages. In addition to software development, Mike has managed both IT and customer service groups, as well as holding a key role in bringing multiple Point-of-Sale platforms to PA-DSS compliance.
Trevor HawthornCTO, Wombat Security TechnologiesTrevor joined the Wombat team in October 2015 with the acquisition of ThreatSim , where he was co-founder and CTO. Trevor has a technical and hands-on background, with over eighteen years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the F...
Julie ChickilloDirector of Information Security and Compliance, IQNavigatorJulie is an information security professional with over 15 years of experience in Information Security Governance, Risk and Compliance, IT Audit and Legal. Julie is currently responsible for developing and executing on the IQN information security strategy and compliance assurance program. IQNavigator is the leading independent technology pro...
Manjula UdeshiDirector, ISACA BoardManjula is a seasoned professional with more than 15 years of experience in Governance, Risk and compliance, information technology auditing and business administration. As Director within the Office of CISO at Optiv, she is responsible for designing, building, and executing a robust and business aligned security governance, risk, compliance ...
Jessica RaymondIT Security Manager, Department of Information Technology, Weld CountyJessica Raymond is the IT Security Manager for Weld County Government where she had the opportunity to build the security program from the ground up over the last 5 years. She is responsible for information security in a 360 degree fashion including designing, implementing, and maintaining security infrastructure, compliance and audits, gove...
Greg SternbergSecurity Architect, Sungard Availability ServicesGreg Sternberg is a Security Architect at Sungard Availability Services, CISO for ISSA, Denver and Affiliate Faculty at Regis University. He works at incorporating security into the SDLC and securing architectures. He has published and blogged on security and architecture topics and presented at SecureWorld, RMISC, ISC(2) and the Open Group S...
Florence LevySenior Vice President, Cyber / E&O PracticeFlorence focuses on creating cyber and E&O risk management programs for companies in a wide array of industries. She works with clients to understand their business goals, then assesses and develops programs or alternative risk transfer solutions that match their risk management objectives. Her expertise lies in identifying exposures, program...
Erica DavisSVP, Head of Specialty Products E&O, ZurichErica Davis is Senior Vice President of Specialty Errors & Omissions at Zurich. She has national oversight of the Professional Liability, Security & Privacy and Employed Lawyers lines of business with a specialization and industry thought leadership position in network security and privacy risk transfer solutions.
David ToniniComputer Hacking and Intellectual Property (CHIP) Coordinator, and Assistant United States Attorney, U.s. Attorney’s Office, District of ColoradoJudy SmithChief of Special Prosecutions Section and Assistant US Attorney, United States Attorney’s Office, District of ColoradoSusan BondConsultant, Advisory Services, Ernst & YoungAs a technical project leader for over 20 years, Susan Bond has delivered solutions across several industries including Energy, Technology, Logistics Real Estate, and Higher Education. Susan was the Technical Lead for the implementation of network, cybersecurity, visualization, SCADA, and analytics infrastructure during construction and trans...
Kelly FullerFounder & CEO, Cybersecurity Risk Management ConsultingFuller has broad-based experience as an information security and technology risk management executive, IT audit practice director, and management consultant spanning a variety of industries ranging from banking and insurance to healthcare, energy, and government. Her extensive work in technology risk management, regulatory compliance, IT gove...
Daniel M. LikarishDirector CIAS, Regis UniversityDaniel M Likarish is professor Regis University CC&IS and Director of the CIAS. His research interests are in personalized experiential learning. He supports Colorado Cyber Patriot and Cyber Girls. Dan is the academic advocate for ISSA and ISACA. He is on the CISE Board and regional coordinator for the RMCCDC.
David MonahanResearch Director, Security and Risk ManagementDavid has over 20 years of IT security experience and has organized and managed both physical and information security programs, including SOC’s and NOC’s for organizations ranging from Fortune 100 companies and local government to small public and private companies. He has diverse Audit, Compliance, Risk and Privacy experience.
Rhett SaundersExecutive Director of Cybersecurity & Infrastructure, Focus on the FamilyRhett served the Federal Reserve, and while there, led regular Enterprise Risk Management discussions between the Federal Reserve and U.S. Treasury with a focus on cybersecurity. He is a former NSA cryptoanalyst and a U.S. Army veteran, having served multiple joint intelligence communities, both foreign and domestic government agencies in int...
Tom BienkowskiDirector, Product Marketing, Arbor NetworksTom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he’s a Director o...
Dan LohrmannCSO, Security Mentor; Former CISO, State of MichiganDaniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and p...
David J. HarrierSr. Manager, Enterprise Holdings Inc.David has been a cybersecurity leader for 12+ years at various global Fortune 100 companies with responsibilities ranging from strategic and tactical planning, architecture, engineering, operational support, process improvements, automation to consulting. He enjoys decomposing complex problems into implementable and sustainable solutions.
Arabella HallawellSr. Director, Product Marketing, Arbor NetworksArabella is responsible for the go-to-market positioning and activation of the company’s Advanced Threat solutions at Arbor. Previously she was VP of Corporate Strategy where she led strategic planning and corporate development activities.
Arabella has over 20 years of experience in IT security and strategy. Prior to joining Arbor, Ara...
Randy RawCISO, Veterans United Home LoansRandy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventat...
Bob BrownCISO, Busey BankBob presents to executive clients on their security posture and recommended economical approaches for improvement. He consults on all organizational aspects of information security: project initiations, security assessments, vendor reviews, contract negotiations, audit and regulatory engagements. +15 years of experience in the Information Sys...
Paul KurtzField CTO, SplunkPaul Kurtz is an internationally recognized expert on cybersecurity and the Chief Cybersecurity Advisor/Field CTO at Splunk. Paul began working cybersecurity issues on the National Security Council at the White House in the late 1990s. He served in senior positions on the White House's National Security and Homeland Security Councils under Pr...
Andrew HrenakDetective/Forensic Examiner, Regional Computer Crimes Education and Enforcement Group (RCCEEG)The Regional Computer Crime Education and Enforcement Group (RCCEEG) is a non-profit, multi-jurisdictional computer crime task force serving the Eastern District of Missouri. The inception of RCCEEG began in 1999 and was fully implemented as a non-profit organization in January, 2003. It exists to meet the growing demand for forensic and inve...
Bhavesh ChauhanPrincipal Client Partner, Verizon Enterprise SolutionsBhavesh Chauhan is a Principal Client Partner - Security Evangelist within Verizon CTO organization. Previously a Principal in Financial Services and lead the Security Engineering and Professional services for the North East Region of Americas, which includes Enterprise, Government Accreditor, Security Principal, Consultant, Engineer and Arch...
David BartonCISO, ForcepointDavid Barton is the Chief Information Security Officer for Forcepoint, responsible for securing the company and sharing key learnings with customers. Barton brings to his role more than 20 years of experience in security leadership across a variety of sectors, including telecommunications, healthcare, software development, finance and governm...
John NewcomerSVP, Information Security, CitiBankJohn Newcomer is currently Senior Vice President of Information Security at CitiBank, a top-10 national mortgage lender. He has eight years of experience in the information security field, with 17 years prior in IT.
Dr. Maurice Dawson Jr.Director, Center for Cyber Security and Forensics Education and Assistant Professor, Illinois Institute of TechnologyMaurice Dawson is a faculty member in the School of Applied Technology to serve as Director of Illinois Institute of Technology's Center for Cyber Security and Forensics Education, which is accredited by the National Security Agency. Maurice has earned a Doctor of Computer Science from Colorado Technical University in 2009 and a Ph.D. in Cybe...
Vinny TroiaSecurity Researcher and Pentester, Author "Hunting Cyber Criminals"Founder and Principal Security Consultant of Night Lion Security, Vinny Troia brings 20+ years of IT security and development experience. He is also a featured speaker on ABC, CNBC, and Fox News.
"One afternoon, I drafted an email to the CEO and CISO of a major airline company. The title read – URGENT – Data breach in your network. Dur...
Peter RomanSenior Counsel, Computer Crime & Intellectual Property Section, Criminal Division, U.S. Justice DepartmentPeter Roman is a federal cybercrimes prosecutor and a former Oracle DBA and UNIX system administrator. After 14 years working in IT, and following the events of September 11, 2001, Mr. Roman went back to school and became a lawyer so that he could become a prosecutor. Now, he melds his cyber and legal experience working for the Department of ...
Jon StitzelCybersecurity Risk Management Lead, AmerenJon Stitzel is the Lead Analyst for Cybersecurity Risk Management at Ameren. He is responsible for driving cybersecurity and risk management strategy for business and industrial control system environments, in addition to leading IT and Cybersecurity controls compliance. Jon has over 30 years of experience in the IT industry, including more t...
Brian AllenInformation Security Manager, Washington University in St. LouisBrian Allen started in IT as a unix/security admin in 2000, and has been working in security at Washington University for 13 years. Before WashU, he was a Unix Admin at the University of Maryland for four years and then a Security Administrator at UMSL for two years.
Patrick CrowleyCTO/Founder Observable Networks & Professor of CSE, Washington University in St. LouisPatrick Crowley is founder and CTO of Observable Networks. He is also professor of Computer Science & Engineering at Washington University in St. Louis.
Shawn BradstreetAssistant to the Special Agent in Charge, United States Secret Service, San Francisco Field OfficeShawn M. Bradstreet is the Assistant to the Special Agent in Charge at the San Francisco Field Office. In this capacity, Mr. Bradstreet is the supervisor of the San Francisco Electronic Crimes Task Force and previously supervised the Bay Area Financial Crimes Task Force. Mr. Bradstreet is a 17-year veteran of the U.S. Secret Service.
M...
Gary SockriderPrincipal Security Technologist, NETSCOUT ArborGary is an industry veteran bringing over 25 years of broad technology experience ranging from network security to routing and switching, data center, mobility and collaboration. His previous roles include security SME, consultancy, customer support, IT and product management. He seeks to understand and convey the constantly evolving threat l...
Raj PatelChief Information Security Officer, City of Palo AltoAs CISO since early 2012, Raj has established an Information Security Steering Committee comprised of executive management, and developed an information security strategy and roadmap for future activities. In support of the strategy to ensure the confidentiality, integrity and availability of the information systems that support the operation...
Randy CheekVP, DarkTraceRandy Cheek has over 10 years experience in the enterprise software industry across a number of roles, both commercial and technical. From startups to Fortune 500 companies, he has led teams responsible for key strategic accounts and has consistently led business growth throughout his career. As one of the first members of Darktrace US, he of...
Santosh KandalaDirector, Security Monitoring & Analytics, MicrosoftSantosh Kandala is a passionate security leader with diverse experience in the areas of behavioral analytics, security monitoring, incident response, cloud scale detection, digital forensics, ethical hacking and investigations. When is he is not finding needles in the haystack, you will see him running half marathons in the trails around Puge...
JD SherryChief Strategy Officer, RemediantJD Sherry is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cybersecurity, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private, and hybrid clouds ...
Craig SpiezleFounder & President, AgeLight Advisory & Research GroupCraig Spiezle is the founder and managing partner of AgeLight Advisory Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mindset ...
Alex WoodCISO, Uplight; Co-Host, Colorado = Security podcastAlex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security...
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided...
Annie SearleAssociate Teaching Professor, The Information School, University of WashingtonAnnie teaches courses on risk management, cybersecurity, and information management at the University of Washington. She is founder and principal of ASA Risk Consultants, a Seattle-based advisory firm. She spent 10 years at Washington Mutual Bank, where for most of those years she chaired the crisis management team.
Annie is a member o...
Joan RossCybersecurity Technologist, CISO, and Threat Intelligence ProfessionalJoan Ross is a respected industry thought leader who develops advanced security strategies, publishes and speaks on implementing threat intelligence. Joan is a former Chief Security Officer for two technology companies, coming up the security ranks as an encryption engineer and cloud security architect. As an early CISSP holder from back in t...
Vanessa PeguerosBoard Member, Cybersecurity Leader, Angel InvestorVanessa is an accomplished technology executive with over 30 years of experience. Currently she serves as a Corporate Board Director of the public company Liveperson (NASDAQ: LPSN), Boeing Employee Credit Union, and Prisidio. Formerly she was on the board of Carbon Black (NASDAQ: CBLK) and was part of the transaction to sell Carbon Black to ...
Kevin MurphyBusiness Information Security Officer (BISO), T-Mobile USAKevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT sec...
Ron WinwardSecurity Evangelist, North America, RadwareAs a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity provi...Ben DesjardinsDirector of Security, RadwareBen Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.
Ben has extensive experience across a wide array of security technologi...
Kate WakefieldDirector of Information Security, Landmark HealthKate Wakefield has sixteen years of Infosec experience including retail, telecommunication, and over ten years in healthcare. Special interests include Privacy, Risk Assessment,IT audit, and Compliance. She has been using HiTRUST as a compliance framework since 2015. Kate holds CIPT and CISSP certifications and served on the local ISSA Board....
Andrew BazeMicrosoft, Director of Security Program ManagementAndrew Baze is a principal security analysis program coordinator in Microsoft's Cloud and Enterprise Security group, assessing and improving security capability across Microsoft's online services and infrastructure. He enjoys applying his 15+ years of engineering, risk management and security analysis experience to help organizations better u...
Troy LeachChief Technology Officer, PCI Security Standards Council: Troy Leach is the Chief Technology Officer for the PCI Security Standards Council. In his role, Mr. Leach partners with Council representatives, Participating Organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject matte...
John O'LearyPresident, CISSP, O'Leary Management EducationJohn O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands o...
Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson CyberLarry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security P...
Dr. Larry PonemonChairman and Founder, Ponemon InstituteDr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.
Ponemon Institute conducts independent research, educates leade...
Speaker Directory