Speaker Directory
  • speaker photo
    Or Katz
    Security Research, Principal Lead, Akamai
  • speaker photo
    Kim Albarella
    Interim Head of Global Security, TikTok
  • speaker photo
    Patterson Cake
    DFIR Principal Consultant, Avertium

    Patterson has worked in information-technology for more than two decades, focusing on information-security for the past several years, specializing in the development of incident-response teams, programs and processes. Before joining Avertium, he was a Senior Security Consultant for Haven Information Security, a Senior Security Engineer for A...

  • speaker photo
    Jason Miller
    Chief Security Officer, Paper Excellence
  • speaker photo
    Moderator: Kurtis Holland
    Sr. Principal, IT Security Architect, Sabre Corporation
  • speaker photo
    Mark Hickey
    Senior Regional Security Principal, Insight
  • speaker photo
    Thomas Stone
    Cyber Security Advisor, Check Point Security

    Tom Stone is a seasoned cyber security advisor with more than 20 years of experience across the industry with a specialized focus on email and collaboration. Currently, Tom leads business development for Avanan, a Check Point Company, the world’s leading provider of advanced cyber security solutions. In his role, Tom works closely with custom...

  • speaker photo
    Naomi Buckwalter
    Founder & Executive Director, Cybersecurity Gatebreakers Foundation
  • speaker photo
    Juman Doleh-Alomary
    Director of Cybersecurity, Little Caesars Enterprises

    Juman Doleh-Alomary is the Director of Cybersecurity GRC at Little Caesar's Enterprises and an active volunteer board member of the ISACA Detroit and the CSA-Detroit Boards.  With over 15 years of experience in audit, security, investigation, compliance, and privacy policy/standards, Juman most recently held the position of Director of IT Aud...

  • speaker photo
    Afzal Khan
    Global CISO, OPKO Health, Inc.
  • speaker photo
    Greg Yurchak
    Service Sales Manager, Blackberry
  • speaker photo
    Security, Cyral

    Solomon has over 20 years' experience as a security leader at such companies as Microsoft, IBM, VMware, and Facebook.

  • speaker photo
    Blake Penn
    CISO, Colgate University
  • speaker photo
    Wesley Drone
    Director, Threat Research & Intelligence, Proofpoint
  • speaker photo
    Diego Maldonado
    Sr. Principal Cybersecurity Engineer, CISSP, Leonardo DRS
  • speaker photo
    Chris LaFleur
    Manager-Threat IR & Forensic, Trend Micro

    Chris LaFleur has spent the last three years working to prevent and eradicate threat actors such as Ryuk, Conti, and Lockbit. Chris began his career at Trend Micro in Threat Support, and is now running the Incident Response team. He was a key part of the making a method on how to predict customer attacks with the Smart Protection Early warnin...

  • speaker photo
    Andrew Wilder
    VP & CISO, Hillenbrand
  • speaker photo
    Shawn Heckmaster
    CISO, Forrest T. Jones & Company

    Shawn Heckmaster, Chief Information Security Officer for Forrest T. Jones & Company in Kansas City, MO has over 30 years of progressive information technology and security experience. He has worked across multiple private and government sectors, from the Department of the Army, Department of Defense, Black & Veatch and the Jones family of co...

  • speaker photo
    Moderator: Tami Spellman
    Director, IT Security, Caleres, Inc.

    Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.

  • speaker photo
    Chad Alvarado
    Special Agent, FBI
  • speaker photo
    Marc Rogers
    Sr. Director, Cybersecurity Strategy, Okta

    Marc Rogers is Senior Director of Cybersecurity Strategy at Okta. With a career that spans more than twenty years, he has been hacking since the 80’s and is now a white-hat hacker renowned for hacking technology like Apple's TouchID and the Tesla Model S. Prior to Okta, Marc served as the Head of Security for Cloudflare and spent a decade man...

  • speaker photo
    Severin Simko
    Engineer, Google Cloud Security

    Severin worked at Siemplify for nearly 3 years, 2.5 years of which were spent at TIP where he was team led for a team that was responsible for all integrations that Siemplify had. Nowadays he is focusing his work on Sales Engineering at Google Cloud Security and has been doing so for nearly half a year. Prior to that, Severin was working for ...

  • speaker photo
    Moderator: Karly Tarsia
    Content Strategist, SecureWorld

    Karly Tarsia is a Content Strategist at SecureWorld. Her focus is on bringing smart minds together to discuss challenges and insights the InfoSec community finds helpful and informative. Karly’s career began after she graduated from the University of Oregon in public relations where she worked with clients in technology, financial and consume...

  • speaker photo
    Mark Majewski
    Information Security Team Leader, Rocket Central
  • speaker photo
    Robert "Teall" Rist
    Security Engineer, Cybereason

    With over 34 years of industry experience, Robert “Teall” Rist has been immersed in all things security since originally beginning his career in law enforcement. In the 27 years since, he has joined multiple start ups and enterprise companies such as Verizon, CA Technologies, NetIQ, and IBM. While at IBM, Robert was a black-belt level subject...

  • speaker photo
    Faye Francy
    Executive Director, The Automotive Information Sharing and Analysis Center (Auto-ISAC)
  • speaker photo
    Tamara Shoemaker
    Cybersecurity Training Leader, The Automotive Information Sharing and Analysis Center (Auto-ISAC)

    Tamara Shoemaker is a diligent and self-motivated Cyber Security Specialist offering 25 years of combined experience in Cyber Security and Administrative Management for large and small corporations aiming to amplify the use and knowledge of security. Relentless dedication to leading teams to balance meticulous attention to quality with a sens...

  • speaker photo
    Tammi Lopez
    Sr. Director, Information Protection Assurance, Cigna
  • speaker photo
    Felicia Hedgebeth
    CISO, Georgia Department of Banking and Finance
  • speaker photo
    Scott Matsumoto
    CISO, Robinhood Crypto
  • speaker photo
    Michael Roytman
    Chief Data Scientist, Kenna Security (a Cisco company)

    Michael Roytman is a recognized expert in cybersecurity data science. At Kenna Security, Michael is responsible for building the company's core analytics functionality focusing on security metrics, risk measurement, and vulnerability measurement.

    Named one of Forbes' 30 Under 30, Michael's strong entrepreneurship skills include foundin...

  • speaker photo
    Roger Brassard
    Sr. Product Manger, OpenText

    Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he ...

  • speaker photo
    Mike Wilkinson
    Director, Digital Forensics & Incident Response, Avertium

    Michael leads the Digital Forensics and Incident Response team at Avertium. The team is dedicated to helping clients investigate and recover from IT security incidents on a daily basis.

    Michael has over 20 years’ experience in the IT industry and has been conducting digital investigations since joining the NSW Police State Electronic E...

  • speaker photo
    Ray Yepes
    CISO, State of Colorado

    Yepes is the Chief Information Security Officer for the State of Colorado. Before joining the Governor’s Office for the State of Colorado, Ray served as the Chief Information Security Officer for the Texas Department of Family and Protective Services, the third largest agency in the Lone Star State. Ray holds a Master of Science in criminal j...

  • speaker photo
    Jaimin Shah
    CISO, American First Finance

    Jaimin Shah is an experienced security and technology leader in developing global information security and privacy program with diverse experience in various industries including Real Estate, Airline, Retail, Banking and Hospitality. Jaimin has over 25 years of extensive, strategic leadership experience in being a trusted advisor in the field...

  • speaker photo
    Sonja Hammond
    VP & CISO, National Veterinary Associates

    Sonja Hammond is the Vice President, Chief Information Security Officer at National Veterinary Associates. As an information and cyber security leader, Sonja brings experience from the financial, healthcare, manufacturing, and computing industries. An additional benefit that Sonja possesses is an information technology (IT) background with ha...

  • speaker photo
    Moderator: David Belanger
    CSO, Bestow

    Dave Belanger has over 25 years of experience in Security and Technology Leadership roles. Dave is the Chief Security Officer for Bestow. In his prior roles, he served as Information Security Officer for a Technology Company operating in the corrections and public safety industry and as CISO for Maxor National Pharmacy Services. He was also t...

  • speaker photo
    Chad Rienerth
    Special Agent, Chicago Field Office, U.S. Secret Service

    SA Rienerth serves on the Cyber Fraud Task Force (CFTF).

  • speaker photo
    Joe Dabrowski
    Director, Strategy & GTM, Rubrik

    Joe leads America's Sales Strategy at Rubrik, working with enterprise customers and federal agencies on leveraging the Rubrik Data Security platform to drive cyber resiliency. Joe is an accomplished technology executive with 20 years’ experience. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Joe resides ...

  • speaker photo
    Paul Hammons
    Principal Sales Engineer, Imperva

    Paul has been working at Imperva for 10 years and he has seen it all. He started in IT Security roles in the mid-90s helping customers visualize, protect, and secure their environments. Having previously worked at companies like e-Security, Novell, Varonis, and various other startups, Paul has personally implemented security solutions on five...

  • speaker photo
    David Creed
    VP, Business Development, MSSP & GSI, Armis
  • speaker photo
    Mike Martin
    Sales Engineer Manager, Imperva
  • speaker photo
    Bryant Schuck
    Sr. Product Manager, Checkmarx

    Bryant Schuck is a Senior Product Manager for Checkmarx, where he is responsible for both the API Security and IAST products. Bryant has several years of experience in product management, software engineering, and agile ranging from being a co-founder of a startup to running teams for Fortune 500 companies. In his free time, Bryant enjoys tin...

  • speaker photo
    Derek J. Mayer
    Assistant Special Agent in Charge, Chicago Field Office, U.S. Secret Service

    Assistant Special Agent in Charge

  • speaker photo
    Ryan Leirvik
    Cybersecurity Author

    CEO of Neuvik and author of the book “Understand, Manage, and Measure Cyber Risk”. Past adventures include growing a cyber research and development company, serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, and sparking a fondness for technology problem-solving at IBM.

  • speaker photo
    Katherine Mowen-Matz
    VP, Information Security, Guaranteed Rate
  • speaker photo
    Nathan Zimmerman
    Cyber Security Engineer, Feeding America
  • speaker photo
    Alex Berger
    Sr. Director, Product Marketing, Open Systems

    With nearly a decade of experience in the cybersecurity industry, Alex Berger joined Open Systems to lead Product Marketing in 2021. Throughout his career, he has worked on a wide range of solutions spanning identity and access management, network security, cloud workload protection, data access governance and more. In his spare time, he enjo...

  • speaker photo
    Moderator: Rebecca Rakoski
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski, Esq., is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the ...

  • speaker photo
    Moderator: Glenn Kapetansky
    CTO, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...

  • speaker photo
    Dr. Srini Vadlamani
    CTO & Co-Founder, Cyral

    Dr. Srinivas Vadlamani is a hands-on expert in designing databases, big data management systems, and security solutions. He is the cofounder and CTO of Cyral, a venture-backed data security startup. He was most recently the founder and chief architect at Imanis Data, a big data protection pioneer that was acquired by Cohesity. He was previous...

  • speaker photo
    Peter Doggart
    Chief Strategy Officer, Armis
  • speaker photo
    Bob Skinner
    Security Principal, Insight

    Bob Skinner has worked for over 30 years in Information Technology and Security in highly complex and regulated industries such Financial Services & Banking, Defense, Telecommunications, and Airline Transportation. His technical experience includes Systems Administration, Database Design, Application Development, and IT Auditing. As a consu...

  • speaker photo
    Dan Clark
    Sales Engineer, Abnormal Security
  • speaker photo
    Ben Nicholson
    Global Practice Leader, Prisma Cloud, Palo Alto Networks
  • speaker photo
    Chad Maskill
    Cyber Hero, ThreatLocker

    Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infi...

  • speaker photo
    Dan Janiczek
    Solutions Director, Deepwatch

    Dan Janiczek is a seasoned Solutions Architect who takes a unique approach to engaging with customers on complex security problems. Coming from a background in Psychology he brings a fresh perspective to the unique challenges faced by organizations today, understanding the people and technology components of a successful security program. As ...

  • speaker photo
    Dr. Nate Brady
    Executive Board Member, Chicago Chapter, (ISC)2
  • speaker photo
    Brian Myers, Esq.
    Litigation Attorney, Octillo Law

    Brian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throu...

  • speaker photo
    Michael Stone
    Senior Solutions Engineer, Automox

    Michael Stone is a Senior Solutions Engineer and joined Automox in 2021. His passion is helping organizations reduce their potential attack surfaces beginning with a simple philosophy: Start by Locking the Front Door! Michael has focused on the field of cybersecurity with a focus on endpoint management for over 15 years with a number of indus...

  • speaker photo
    Christopher Fielder
    Field CTO, Arctic Wolf

    Christopher Fielder has been in the cybersecurity world for over 20 years with experience from a range of military, government, and corporate environments. Christopher holds 18 industry certifications including the CISSP, GPEN, GISP, GCFE, GSEC, GCIH, CEH, and more; along with a Master’s Degree in Information Security. Today he is the Field C...

  • speaker photo
    Rodrique Boutros
    Global Telco/SI Architects, Americas Sales, Check Point

    Rodrique has been with Check Point Software for nine years. He has more than 18 years of industry experience in IT networking and network security. The past four years, he has been focused on cloud security, supporting the Check Point field as a Data Center Virtualization and Cloud Security Solution Architect within the Americas.

  • speaker photo
    Mark Scrano
    Information Security Manager, Cobalt

    Mark Scrano is an information security manager at Cobalt, the leading pentest as a service company, where he focuses on maintaining network security, threat management and mitigation, vulnerability assessments, amongst other responsibilities. With over 15 years of experience he’s worked at notable companies including Vimeo, Paxos, and General...

  • speaker photo
    Laura D. Pfister
    Assistant U.S. Attorney, Northern District of Georgia, United States Attorneys' Offices

    As a federal prosecutor in the United States Attorney’s Office for the Northern District of Georgia, Laura is a member of the Cyber and Intellectual Property Section. She has investigated and prosecuted a variety of cyber-enabled crimes, including ransomware attacks, corporate sabotage, and computer hacking, as well as cyber fraud schemes, su...

  • speaker photo
    Terry McGraw
    Executive Consultant CTU/IR, Secureworks

    Terrence "Terry" McGraw is a retired Lieutenant Colonel from the United States Army and now serves as a senior executive Incident Response Consultant. He has more than 20 years of experience providing expertise in cybersecurity architectural design and operations in both commercial and government sectors.

    Terry previously served as pre...

  • speaker photo
    Moderator: Antonio Andrews
    Chief Information Security & Privacy Officer, Bed Bath & Beyond
  • speaker photo
    Ivan Righi
    Senior Cyber Threat Intelligence Analyst, Digital Shadows

    Ivan Righi is a Senior Cyber Threat Intelligence Analyst at Digital Shadows, where he conducts research on cyber-threats affecting Digital Shadows' customers. Ivan earned his Master of Science degree in Cybersecurity from the University of Dallas, and holds a Bachelor of Science degree from Abilene Christian University. He also has a graduate...

  • speaker photo
    Zach Bulliner
    Sr. Special Agent, Digital Evidence Forensic Laboratory, United States Secret Service

    Zach Bulliner has been a Special Agent with the Secret Service since 2002, when he started in the Nashville Field Office. In 2008, he was transferred to Washington D.C., where he spent three years in the Cyber Intelligence Section (CIS) at Secret Service Headquarters before spending six years on Presidential Protection. He served on President...

  • speaker photo
    Dana K. Motley
    Founder & Owner, Motley Matrix LLC

    Motley Matrix is a unique digital marketing, social media and cyber intelligence small business. Current contracts support defense community collaborations, organizations within the CVE space, law enforcement and homeland security directives. Presentations and products leverage social media intelligence, cyber-social threat investigation, ope...

  • speaker photo
    Peter Clark
    Director, Solutions Engineering, Authomize
  • speaker photo
    Sam McHugh
    Sr. Sales Executive, Open Systems
  • speaker photo
    Jim Doggett
    Chief Security Officer, Semperis

    Jim Doggett is high energy leader focused on embedding risk management, security, and compliance into the business fabric to efficiently manage risks. Retired partner from EY where he spent 27 years helping clients through financial audits and building and sustaining security, risk and controls. Served as global leader of Information Risk and...

  • speaker photo
    Bob Reny
    Sales CTO & Principal Engineer, Exabeam

    Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network...

  • speaker photo
    Tim Davis
    Head of Solutions Consulting, DoControl
  • speaker photo
    Jonathan Knudsen
    Technical Evangelist, Synopsys
  • speaker photo
    Joshua Reed
    Network Intrusion Forensic Analyst, United States Secret Service

    Josh Reed has over 15 years law enforcement experience and began working with the USSS in 2013. He is a certified computer, mobile device, skimming device examiner, and holds several professional certifications. He is an instructor at the National Computer Forensic Institute (NCFI) and has testified multiple times in state, local, and federal...

  • speaker photo
    Husnain Bajwa
    VP, Global Sales Engineering, Beyond Identity
  • speaker photo
    Lynn Dohm
    Executive Director, Women in CyberSecurity - WiCyS

    Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. ...

  • speaker photo
    Moderator: Jordan Fischer
    Cyber Attorney, Global Leader of Privacy Practice Group, Octillo Law

    Jordan Fischer leads Octillo Law's Global Privacy Team, where she represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout ...

  • speaker photo
    Matthew Eddins
    Special Agent, Charlotte Field Office, U.S. Secret Service; North Carolina Cyber Fraud Task Force (CFTF)
  • speaker photo
    Moderator: Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Com...

  • speaker photo
    MJ Knudsen
    Global Director, Sales Engineering, Digital Shadows
  • speaker photo
    Sean Deuby
    Director of Services, Semperis
  • speaker photo
    Ran Barth
    Director of Security Engineering, Salt Security

    Ran is an Enterprise Security Expert with many years of experience helping Fortune 500 companies secure their data and applications. Ran has detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets with focus ...

  • speaker photo
    Chad Barr
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group

    Chad Barr is the Director of Governance & Compliance for the Risk Advisory Services practice at AccessIT Group (AITG) AITG). Chad is an experienced information security leader with an extensive background in security
    engineering, project management, network administration and compliance. Through his many years of experience, Chad has es...

  • speaker photo
    Moderator: Mike Hillhouse
    CIO / CISO, Cadrillion Capital
  • speaker photo
    Moderator: Frank DePaola
    VP, CISO, Enpro

    Frank is the CISO at EnPro Industries (NPO). He is passionate about striking balance between the responsible use of technology and effective risk management. In his role, Frank is responsible for defining, championing, and executing the cybersecurity and regulatory compliance strategies, programs, and initiatives globally, in deep collaborati...

  • speaker photo
    Vitaliy Shtym
    Manager, Cloud Architect, Trend Micro

    Vitaliy Shtym is a Cybersecurity Practitioner with over 10 years of experience, 5 of which have been at Trend Micro. Vitaliy has been in multiple customer facing roles to address cybersecurity challenges in organization of all sizes. He focuses on architecting optimal security solutions for customers leveraging Public and Hybrid Cloud. With p...

  • speaker photo
    Jovonni Pharr
    Engineer, Scientist, Founder of GACWR, Georgia Cyber Warfare Range (GACWR)

    Jovonni Pharr is a software/hardware engineer with a focus on Research & Development (R&D) in emerging technologies. He enjoys building solutions in Electronics, Materials Science, and Intelligent Systems. Some of his research focuses on areas in Computer Science, Human Behavioral Psychology, and Artificial Intelligence. He Graduated from Gor...

  • speaker photo
    Aaron Rose
    Security Architect, US Public Sector, Office of the CTO, Check Point Software Technologies

    Aaron Rose is a Cyber Security Evangelist, Security Architect & Member of the Office of the CTO at Check Point Software Technologies. A subject matter expert in Cloud, Internet of Things, and Application security; Aaron has focused his career on securing organizations & their resources beyond the perimeter of the traditional network firewall...

  • speaker photo
    Jeff Hardee
    Security Solutions Architect, Qualys
  • speaker photo
    Rob Vanderberry
    Regional Sales Manager, Thales

    Rob Vanderberry is celebrating his 26th year of technology sales and consultation, experienced in selling solutions to businesses and public sector organizations as manufacturer rep, distributor and reseller. Rob has a passion for helping organizations achieve successful business outcomes through optimized blends of technology, knowledge and...

  • speaker photo
    Leo Howell
    CISO, Georgia Institute of Technology

    Leo Howell is a visionary information security leader who is passionate about the "I" in IT as he believes that data leveraged as a strategic asset is a major competitive benefit to any organization. Leo has over 24 years of service in IT and currently serves as the chief information security officer for Georgia Institute of Technology where ...

  • speaker photo
    Brett Price
    CISSP | CISM, Sr. Cybersecurity Consultant, Risk Advisory Services , AccessIT Group

    Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. Brett’s skills range ...

  • speaker photo
    David Ortega
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security

    David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expe...

  • speaker photo
    Iván Hernández
    Sales Engineering Manager, CISSP, C|EH, Proofpoint
  • speaker photo
    Amber Cole
    Sr. Special Agent, Cyber Crime Unit, United States Secret Service
  • speaker photo
    Moderator: Shawn Knaebel
    Director of Information Security | CISO, Uniti Group Inc.
  • speaker photo
    Simon Hill
    Head of Legal & Compliance, Certes Networks

    As VP of Legal and Compliance for Certes Networks, Simon assists with Regulatory and Compliance matters, Intellectual Property and interpretation of Security and Compliance Framework requirements. Simon has extensive international experience as a technology lawyer, working in multiple jurisdictions including the European Union, Japan, India ...

  • speaker photo
    Justin Harris
    Director of Product Management, Delinea

    Justin Harris is a 20+ year technology veteran with a wide range of vertical industry exposure that has a knack for understanding how market trends introduce market needs. In his role as Director of Product at Delinea he leads the Vault portfolio of products such as Secret Server and DevOps Secure Vault. Justin’s area of expertise includes br...

  • speaker photo
    Scott Deluke
    Enterprise Sr. SE Manager, Abnormal Security
  • speaker photo
    Eric Walters
    Director, Cybersecurity & IT Infrastructure, Burns & McDonnell

    A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience inclu...

  • speaker photo
    Rodney Pattison
    Sr. Security Architect, Capgemini

    Executive with multi-industry and multi-national IT service delivery experience. Global consulting background with expert level understanding and experience in IT strategy & governance, directing large, complex change initiatives. Business advisor developing lasting relationships by taking responsibility for customer satisfaction and conveyin...

  • speaker photo
    Moderator: Jennifer Harmon
    Information Security Analyst, Ascend Learning

    Superior problem-solving skills and experience securing complex systems. A skilled Incident Manager of hosted systems with an emphasis on supporting both Linux and Windows Operating Systems secure availability.

  • speaker photo
    Moderator: Maria Singh
    Women in Security KC, President

    With more than 10 years of experience in the telecommunications industry & specifically 6 years in the Cybersecurity space. Experienced, thought leader, cybersecurity professional with operational experience in building successful processes and leading projects in vulnerability scanning, vulnerability management, access management, privacy an...

  • speaker photo
    Moderator: Neil Watkins
    CISO, Therapy Brands
  • speaker photo
    Moderator: Cory Kennedy
    Threat Researcher
  • speaker photo
    Stan Shollenbarger
    Sr. Information Security Analyst, Veterans United Home Loans
  • speaker photo
    Josh Bryant
    Network Intrusion Forensic Analyst, United States Secret Service
  • speaker photo
    John Seubert
    Supervisory Agent, Kansas City Field Office, United States Secret Service
  • speaker photo
    Wally Bitout
    VP Global Business Development, Seclore

    Wally Bitaut has worked in the content and collaboration industry for over 30 years, starting with FileNet Corporation (now an IBM Company) in Executive Leadership roles across Marketing, Sales, Product Management, Professional Services, and as a Board member. Today, Wally is the Global VP of Business Development at Seclore. His focus is to c...

  • speaker photo
    McClellan 'Mac' Plihcik
    Sr. Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
  • speaker photo
    Rueben Rodriguez
    Sr. Director, Product Marketing , Recorded Future
  • speaker photo
    Jose Ferreira
    Sr. Director, Security Solutions, East, Sirius, a CDW Company

    Ferreira helps enterprises develop and maintain proactive security programs. He has over two decades of IT security experience and works with organizations to understand their assets, identify security gaps, and define the people, processes and technology that can facilitate mitigation and support business goals. He focuses on the development...

  • speaker photo
    Christopher Martin
    Sr. Security Specialist, Google Cloud
  • speaker photo
    Jaron Shaul
    Sales Engineer, Major Accounts, Netskope
  • speaker photo
    Jonathan Brito
    Manager, Third-Party Risk Management, Synctera

    Jonathan Brito oversees Third-Party Risk Management at Synctera. Synctera connects community banks with FinTechs, allowing the bank to grow and the FinTech to launch quickly. Our processes streamline day-to-day processes like reconciliation, operations, and regulatory compliance for FinTech Banking. Jonathan Brito possesses over a decade of e...

  • speaker photo
    Carraig Stanwyck
    VP / Global CISO, Avnet
  • speaker photo
    Isaac Hannagan
    Sr. Solutions Architect, ReliaQuest

    Isaac Hannagan is a security professional with nearly a decade of experience spanning SIEM and the security industry supporting, architecting, and scaling solutions and services. Isaac has spent several years working in the SIEM vendor space supporting LogRhythm’s strategic enterprise environments as a Technical Account Manager before helping...

  • speaker photo
    Nick Wormser
    Managing Director, Palatin Group SK

    Mr. Wormser has over 20 years of military and international security experience. He spent a decade in the French military where he was deployed to a host of foreign countries, serving as a team leader of a long-range reconnaissance and patrol unit (LRRP), conducting counter-narcotics and anti-terrorism operations, and training of host-country...

  • speaker photo
    Christopher Sanders
    President, The Palatin Group LTD

    Mr. Sanders is currently the President of The Palatin Group LTD, an intelligence and corporate security advisory headquartered in Arlington, VA with offices in Bratislava, Slovakia and Zurich, Switzerland with partner offices around the globe. A seasoned security management consultant and executive with over 25 years of domestic and internati...

  • speaker photo
    Daniel Reardon
    Sr. Solutions Architect, Securonix
  • speaker photo
    Moderator: Avishai Avivi
    CISO, SafeBreach
  • speaker photo
    Scott Sweren
    Security Principal, Insight
  • speaker photo
    Moderator: Tracey Brand-Sanders
    CISO, UGI Corporation
  • speaker photo
    Allen Sautter
    Principal Security Advisor, AWS; Former CISO, Federal Reserve Bank of Atlanta
  • speaker photo
    David Barrish
    Senior Solutions Engineer, Okta

    David is an Information Technology professional with over 20 years of experience in pre-sales engineering and software deployment in the Identity Access Management space. He has worked for many of the top IAM companies over his career and enjoys sharing his deep knowledge and experience to make customers successful.

  • speaker photo
    Moderator: Phread Cichowski
    Sr. Security Architect, SecureWorks

    Phread Cichowski has over 35 years of experience ranging from software development to data center management. Having worked for some of the leading technology companies in the world, his broad range of experience allows him to provide a well-balanced perspective leveraging bleeding-edge technology in critical high-availability IT environments...

  • speaker photo
    Kara L. Hilburger, Esq.
    Privacy Compliance & Digital Accessibility Team Leader, Beckage Law

    Kara advises and counsels clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state and international privacy laws, including the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), Virginia Consumer Dat...

  • speaker photo
    Winston Lalgee
    Security Engineering Manager, Check Point

    Winston has almost 20 years of experience in the ICT industry; designing and implementing network security solutions for large enterprise environments. Today, he is a Security Engineering Manager with Check Point Software and is currently supporting a unique set of strategic accounts. He provides thought leadership; helping his customers unde...

  • speaker photo
    Mike Roman
    Sr. Sales Engineer, Orca Security

    Mike is a Senior Sales Engineer at Orca Security who is responsible for helping organizations identify risks in their cloud environments and enhance their cloud security posture. Prior to joining Orca, Mike spent five years at Splunk where he partnered with organizations on their cloud journey in areas that included Security and Observability...

  • speaker photo
    Jon Poon
    VP of Security Services, Novacoast

    Jon's background is in Computer Science and was a software developer building web and mobile applications before moving into the security industry. He has been working with SIEM technologies for over a decade and has worked with hundreds of customers over that time building out SOC and SOC teams.

  • speaker photo
    Steve Boone
    Head of Product, Checkmarx

    Over the last decade, Steve Boone has helped hundreds of global clients with their strategic adoption of secure DevOps best practices. A frequent speaker at DevOps Enterprise Summit, and DevOps World, Steve has shared his expertise on Secure Continuous Delivery, Value Stream Management, and Agile best practices. Today, Steve is the Head of Pr...

  • speaker photo
    Jake Munroe
    Senior Product Marketing Manager, Recorded Future

    Jake is a Senior Product Marketing Manager at Recorded Future and has held various roles across the security space in consulting, marketing, and sales. Prior to joining the private sector, he served as a Navy Intelligence Analyst with an extensive background in counterterrorism, cyber threat intelligence, and open-source intelligence investig...

  • speaker photo
    Tony Allegrati
    Cloud Systems Engineer, Fortinet

    Tony Allegrati is an experienced Sales Engineer with over 15 years of sales in both medium and enterprise accounts. Specialties: Presales demonstrations, evaluation, installations, training and support of IT security technology. 3+ years of work experience with Cloud Technologies and security for Cloud.

  • speaker photo
    Dave Klein
    Director, Cyber Evangelist, Cymulate

    21+ year veteran high tech leader with a proven track record of revenue generation in sales and demand generation in marketing. Successful in creating and conveying solution messaging for business and technical decision makers, analysts and channel partners. Energized teacher for field enablement.

  • speaker photo
    Carlton Jones
    Regional Vice President, Qualys

    Carlton Jones is Vice President of Northeast Enterprise Field Team. Over 20 years of Security leadership experience, in Fusion Centers, Incident Response, Insider Threat, and Attack Surface Management. Carlton designs solutions at scale for the largest brands and technology providers in the world. His background as a practitioner and consulta...

  • speaker photo
    Mick Leach
    Head of Security Operations, Abnormal Security

    Mick Leach is the Head of Security Operations at Abnormal Security. Prior to joining Abnormal, he held several security positions with Fortune 500 organizations, including Alliance Data and Nationwide Insurance and served in the United States Army for over 8 years.

    Mick is a seasoned IT security leader with an extensive background in...

  • speaker photo
    Vijaya Rao
    Certified CISO, Chair of the Board of Directors, DeliveryCircle
  • speaker photo
    Nick Dulavitz
    Global Director, Channel Solutions Engineering, CyberArk

    Nick Dulavitz, Global Director of Channel Solutions Engineering, has been with CyberArk for the past 8 years. Nick has worked with some of the largest global organizations helping them to achieve their identity security goals. In his current role, he is responsible for leading a global team that focuses on technical go to market enablement f...

  • speaker photo
    Mike McKeown
    National Sales Executive, BTB Security, LLC

    A 1980 graduate of St. Joseph's University, Mike has a 30+ year career of marketing and selling technology goods and services to SMB and Fortune 500 clients. While resident in the Great Philadelphia area, Mike has sold services nationwide. After owning his own business for 18+ year in technology services, Mike has been selling incident respon...

  • speaker photo
    Elizabeth Sylves
    Sr. Consultant, North America, CSC

    Elizabeth Sylve is Senior Business Consultant for Enterprise Businesses at CSC where she helps and advises Senior IT and Cyber Security Professionals mitigate risk in front of the firewall. She is also a speaker for Global Antifraud and Phishing Solutions, former 8-year VP of IT Technology consultant at FuturTech Consulting, LLC, and has 24 y...

  • speaker photo
    Krista Arndt
    Director, Security Risk & Compliance, Voyager Digital

    Krista Arndt is the Director of Security GRC at Voyager Digital. Krista enjoys helping organizations manage the challenge of maintaining an effective Cybersecurity program while enabling business initiatives within the confines of heavily regulated and emerging industries. Krista has over 13 years of Cybersecurity experience within regulated ...

  • speaker photo
    Valentina Flores
    CEO, Red Sentry

    Valentina Flores is CEO of Red Sentry, a vulnerability scanning and penetration testing company that keeps organizations secure 24/7/365 by actually mimicking hackers. Formerly a cybercrime detective on a federal task force, Valentina fought against these criminals her whole career, and has unique insight into the minds and tactics of attacke...

  • speaker photo
    James Bearce
    VP, Professional Services, AccessIT Group

    James Bearce is Vice President of Professional Services at AccessIT Group, bringing more than 20 years of information technology and cybersecurity development, operations and leadership experience in the financial services industry and in cybersecurity advisory and managed services. Prior to joining AccessIT Group, Jim was responsible for lea...

  • speaker photo
    Jim Chrisos
    Principal Engineer, Exabeam

    Jim officially started working in security as an analyst at a large MSSP. This experience enabled him to gain employment at large global organizations as an analyst before becoming an incident handler. It was in his capacity as an incident handler where he witnessed, first hand, nation state attacks. This left such a profound impact on Jim th...

  • speaker photo
    Sean Boulter
    Principal Security Engineer, Salt Security

    Sean Boulter is a technical leader with Salt Security where he helps his customers protect their APIs from abuse and keep their customers’ data secure. His career in IT and consulting spans three decades and covers a wide variety of infrastructure platforms and several industries including fintech, finserv, insurance, healthcare, medtech, and...

  • speaker photo
    Krishna Vishnubhotla
    VP, Product Strategy, Zimperium
  • speaker photo
    Matt Barnett

    Matt is the Chief Executive Officer at SEVN-X. As a certified forensic analyst, former Law Enforcement Officer, and expert field operator, Matt lead's SEVN-X's Incident Response, Forensics, and Physical Security practices.

  • speaker photo
    Nick Rago
    Principal Security Engineer, Salt Security

    Nick is a startup veteran and Internet technology entrepreneur with over 25 years of application development, testing, and cyber security experience. He is recognized as an industry expert in API development, API management, and API security. At Salt, Nick is helping guide and positively influence how organizations protect themselves from tod...

  • speaker photo
    Moderator: Gus Chiarello
    Director, Security Architecture, AccessIT Group

    Gus Chiarello is the Director of Security Architecture and part of the technology consulting leadership team at AccessIT Group (AITG). Gus has over 10 years of experience in risk management and 16 years in IT professional services leading the development of AppSec MDR, MSP, and MSSP service practices. Through leveraging his background in both...

  • speaker photo
    Luke Babarinde
    Principal Architect, Imperva
  • speaker photo
    Ray Canzanese
    Director of Netskope Threat Labs, Netskope

    Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.

  • speaker photo
    Stephen Fitzgerald
    Sr. Sales Engineer, Orca Security

    From writing detection rules and automations for SOC teams to assisting with compliance initiatives, cloud security has always been the focus of Stephen's career. Currently Stephen serves as a Senior Solutions Engineer at Orca helping customers architect and operationalize the Orca platform, as well as providing risk assessment reviews and gu...

  • speaker photo
    Trenton Ivey
    Counter Threat Unit Researcher, Secureworks

    Trenton has had the privilege of working with teams of skilled hackers to legally compromise some of the largest organizations in the world. Trenton has also worked on several high-profile incident-response engagements to help provide the adversarial mindset as organizations respond and recover. While his focus is currently offensive research...

  • speaker photo
    Moderator: Brian Haugli
    Managing Partner, SideChannel
  • speaker photo
    Eric Gauthier
    VP, Infrastructure & Security, Emsi Burning Glass

    Eric Gauthier, CISSP, is a technology leader with 20 years’ experience working at the intersection of Information Security, IT, and DevOps. Eric is both a technical architecture and security leader having held positions in various settings including the corporate, academic, and service provider spaces building security programs, leading secur...

  • speaker photo
    Selva Vinothe Mahimaidas
    CISO, Houghton Mifflin Harcourt

    Selva Vinothe Mahimaidas is an Information Security Leader with more than 20 years of experience in all phases of information security. Selva currently serves as Chief Information Security Officer (CISO) at Houghton Mifflin Harcourt, an American publisher of textbooks, instructional technology materials, assessments, reference works, and fict...

  • speaker photo
    Moderator: Andrew Smeaton
    CISO, DataRobot

    Andrew holds over 22 years of experience in the banking, financial services, and healthcare industries. He is experienced in all facets of IT/IS Security & Risk Management including acquisitions and disaffiliations, and has a track record of developing and implementing security strategies from inception through execution. In addition to his c...

  • speaker photo
    Stan Fromhold
    Senior Security Solutions Architect, Securonix
  • speaker photo
    Sandra Cavazos
    VP, Product Security and Privacy, Comcast

    Sandra Cavazos serves as VP, Product Security and Privacy at Comcast. She leads Secure Development Lifecycle (SDL), including threat modeling, pen testing, SDL coaching, DevSecOps tooling, security developer training, and executive reporting. Sandra began her career as an engineer at Intel’s largest wafer manufacturing facility, improving qua...

  • speaker photo
    Tal Kollender
    Co-Founder & CEO, CISO, Gytpol

    Tal is the CEO and co-founder of Gytpol. In her teenage years, she was a professional hacker, always on the hunt to crack open what seemed impossible, always on the lookout for IT challenges. As part of her army service, she was recruited to the Israel Air-Force having her sights set on becoming a fighter pilot. Later, the IDF re-assigned her...

  • speaker photo
    Michael Howden
    Director of Security Services, Novacost

    Michael Howden brings broad and deep experience in technology, strategy, and security with almost 30 years of experience focusing on global upgrades, migrations, and consolidations for several hundred large enterprises. He is a transformational change agent, leading teams of top tier consultants, building world-class cybersecurity programs fo...

  • speaker photo
    Moderator: Peter Kurek
    Cybersecurity Threat Hunter and Incident Responder, Eversource Energy
  • speaker photo
    Moderator: Terry Olaes
    Director, North America Systems Engineering, Skybox Security

    Terry Olaes is director of North America systems engineering at Skybox Security. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security t...

  • speaker photo
    Sean Raffetto
    Strategic Business Manager, WithSecure

    Sean works with organizations across the globe partnering with them to provide tailored Consulting security services enabling security teams to keep up with the rapid pace of change in the cyber threat landscape. With over a decade of experience working with enterprise level solutions, Sean specializes in implementing proactive and defense cy...

  • speaker photo
    Trevor Welsh
    Global Security Strategist, Google Cloud Security

    Trevor is a Global Security Strategist with Google Cloud Security. Trevor leverages extensive experience in public sector, financials, retail / logistics, manufacturing, healthcare, and high tech to solve complex security analytics challenges. A former leader with Anomali, and companies like Splunk, ArcSight, and Fortinet, Trevor brings insig...

  • speaker photo
    Stephen Clark
    Director of Cloud Security Sales, Fortinet

    Stephen Clark has over 25 years experience in the information security space having spent time at Check Point, Cisco, and Palo Alto Networks. Stephen also spent time working in the security consulting field working primarily with the Fortune 1000.

    He is presently the Director of Cloud Security Sales for Fortinet. Today he helps manag...

  • speaker photo
    Jeffrey Morissette
    Technical Staff Assistant (Special Agent), Boston Field Office, United States Secret Service

    Prior Federal Employment
    United States Border Patrol (USBP) – Casa Granda Station, AZ
    Employed as an agent of the U.S. Border Patrol, July 1997 – January 2000
    Training: US Border Patrol Academy (6 months), Charlestown, SC

    Current Federal Employment
    United States Secret Service (USSS) – Boston Field Office

  • speaker photo
    Monsurat Ottun
    Chief Information Security, Data Privacy, and Risk Management Strategist, City of Providence, RI
  • speaker photo
    Jonathan Trull
    SVP, Customer Solutions Architecture and Engineering, Qualys

    Jonathan Trull is a longtime security practitioner and CISO with over 18 years of experience in the cybersecurity industry and is currently the Senior Vice President of Customer Solutions Architecture and Engineering at Qualys. His career has spanned operational CISO and infosec roles with the State of Colorado, Qualys, Optiv, and Microsoft....

  • speaker photo
    Kevin Burns
    CISO, Draper
  • speaker photo
    Michael Meltz
    Senior Sales Engineer, Open Systems

    Mike Meltz has worked in the IT Security and infrastructure space for over 25 years and he specializes in the design and implementation of enterprise-level Cybersecurity technologies and business process improvements. His goal is to remain focused on creating a secure and quality-driven user experience while helping the organization grow and ...

  • speaker photo
    Abel Morales
    Principal Security Engineer, Exabeam

    Abel Morales is a Senior Security Engineer based in Atlanta, GA. Prior to Exabeam, Abel has over ten years of experience in information security in companies such as Verizon, Syniverse, McKesson and InterContinental Exchange (NYSE). In his previous role, he was responsible for managing incidents, performing technical analysis, and communicati...

  • speaker photo
    Darren Carroll
    Managing Principal - Security Services, Insight

    Darren is a risk management and information security leader with diverse global experience in operational, technical, management, and presales roles. He has had the pleasure to build and lead multiple diverse, dynamic, high-performing teams. Throughout his career, he has provided consultative thought leadership, strategic direction, and tacti...

  • speaker photo
    Joseph Crehan
    Sr. Systems Engineer, Abnormal Security
  • speaker photo
    Eoin Hinchy
    Founder, Tines

    Before founding Tines in early-2018, Eoin worked in various enterprise security teams. He was a senior engineer in eBay Inc.’s Global Threat Management team, and most recently as DocuSign’s senior director of security operations, he led the company’s incident response, security tooling, threat intel/hunting, and forensics programs. Eoin has t...

  • speaker photo
    Ryan McGill
    Senior Solution Stragegist, ConnectWise
  • speaker photo
    Brian Black
    Director of Sales Engineering, Deep Instinct

    Brian is a Philadelphia based Distinguished Sales Engineer with 20+ years of experience in Cybersecurity and Intelligence. Brian leads Deep Instinct’s security engineering team, overseeing North and South American territories. He is a thought leader and technology evangelist with a wealth of knowledge on AI, Deep Learning, and Machine Learnin...

  • speaker photo
    Lokesh Aggarwal
    CEO & President, Apexa IQ

    Lokesh Aggarwal has over 20+ years of hands-on experience in developing technology plans, prioritizing IT initiatives and coordinating the evaluation, deployment, and management of current and future technologies. He has a track record of guiding large scale transformations and projects through the development of IT capability roadmaps, deplo...

  • speaker photo
    Rich Schofield
    Principal Security Architect, Sysdig

    Rich Schofield is a Principal Security Architect at Sysdig. Based in Boston. Rich has over 25 years experience in DevOps and Security at companies large and small, including HPE, Opsware and BBN. Over the past 4 years at Sysdig he has focused on security and visibility for Cloud and Kubernetes environments.

  • speaker photo
    Greg McCarthy
    CISO, City of Boston

    Greg McCarthy is the first Chief Information Security Officer for the City of Boston and career public servant. Since joining the City of Boston’s Cybersecurity Team in 2010, Greg has managed the implementation of numerous information security solutions, developed the City's first cybersecurity awareness program for employees and successfully...

  • speaker photo
    Franklin Edwards
    Director, Solutions Architect, Deepwatch
  • speaker photo
    Chris Gray
    Area Vice President, Security Strategy, Deepwatch
  • speaker photo
    April Boyd-Noronha
    Program Director, Cybersecurity, University of Saint Mary

    April, also known as The STEM Broker, is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe and inclusive realities. In her role, she continues to advise the CyberXR Coalition, launched by XRSI, where she helped lead the lau...

  • speaker photo
    Christine Gordon
    Director, Global Cyber Governance Center, Cboe Global Markets

    Christine is an Information Security leader with experience in the security, governance, and technology domains. Christine is currently the Director of the Global Cyber Governance Center at Cboe Global Markets, one of the world’s largest exchange holding companies. Christine holds a Master's in Management and Leadership from Webster Universit...

  • speaker photo
    Dr. Margery Sendze
    Technology Leader, I/O Psychologist

    Dr. Sendze is a technology leader with more than 20 years of delivering business value by enabling high-performing teams. Dr. Sendze currently serves as a technology manager and leverages organizational psychology to drive organizational change and talent engagement and retention strategies in the technology workforce. She holds a B.A and an ...

  • speaker photo
    Moderator: Kennetra Pulliams
    Communications Specialist, Big 12 Now / ESPN+

    Kennetra Pulliams has more than 20 years of experience as a broadcast journalist. She graduated from The University of Texas at Austin. Her career has taken her from Texas to Virginia to Kansas City. Kennetra spent more than a decade working at Spectrum Sports, a regional broadcast network. There, she had to opportunity to cover the Kansas Ci...

  • speaker photo
    Dr. Cheryl Cooper
    Business Information Security Officer (BISO), T-Mobile

    Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solu...

  • speaker photo
    Keith Daly
    Senior Principal Engineer, ForgeRock

    Keith Daly is currently a Senior Principal Sales Engineer for ForgeRock.

    Over the past 20 years, Keith has been on all sides of the Identity Management space in numerous industries, with roles ranging from systems architect within leading corporations, to developer and team lead at systems integrators, to technical sales and engineerin...

  • speaker photo
    David Monnier
    Cyber Fellow, Cymru

    David has been with Team Cymru since 2007. Prior, he served in the US Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team Cym...

  • speaker photo
    Rick Rutledge
    Sales Engineer, Armis

    Rick Rutledge is currently a Sales Engineer at Armis where he is helping customers monitor unmanageable devices for anomalous activity. Previously, Rick was an SE with Phantom Cyber for over six years, working to automate security responses for many of the largest companies around the United States. Rick has also been an SE with Tufin Technol...

  • speaker photo
    Jared Ablon
    President & Co-Founder, HackEDU

    Jared Ablon is the President and co-founder of HackEDU. His experience includes serving as a CISO, leading cybersecurity teams at the Department of Defense, and founding two companies. Jared has a CISSP, MBA and an MS in Applied and Computational Mathematics focusing on computer/cyber security, and was named CISO of the Year by the Los Angele...

  • speaker photo
    George Sandford
    Sr. Manager, Customer Success Security Team, Gigamon
  • speaker photo
    James Cusson
    Secretariat Security Liason, Massachusetts Executive Office of Health and Human Services
  • speaker photo
    Justin Quinn
    Enterprise Solutions Engineer, Wiz
  • speaker photo
    Mason Brayman
    Acting SAIC of the Boston Field Office, United States Secret Service
  • speaker photo
    Brendan "Casey" McGee
    Assistant to the Special Agent in Charge, United States Secret Service

    With over 21 years of federal law enforcement experience, ATSAIC McGee leads U.S. Secret Service (USSS) efforts to increase public and private partnership in the investigation of complex transnational criminal investigations involving the use of digital assets.

    In an executive developmental role, ATSAIC McGee served as the Advisor to t...

  • speaker photo
    Bob Adams
    Security Strategist, Mimecast

    Bob Adams is a Cyber Security Strategist at Mimecast. Originally joining Mimecast nearly 7 years ago as a Sales Engineer, Bob was recruited to Product Management after developing various unique ways of investigating cyber-attacks and highlighting Mimecast’s services. Bob now continues to use his time to help educate companies on protecting th...

  • speaker photo
    Delbert A. Roll
    Retired U.S. Army, former member of the Intelligence Community

    Del is a recently retired, senior leader with 20 years of Federal Government service having served in Washington, D.C. and internationally. Concurrently, he served 23 years as a commissioned Army officer in austere and hostile environments around the globe. Command assignments in both conventional and special operations forces. He is recogniz...

  • speaker photo
    Derek Melber
    Chief Technology & Security Strategist, Tenable

    Derek Melber is an accomplished Chief Technology and Security Strategist, Advisor, and Professional Speaker with more than 25 years of success across the computer & network security industries. As a 17X Microsoft MVP, leveraging extensive experience in unifying products, marketing, sales, and content, he is a valuable advisor for any organiza...

  • speaker photo
    Neal Humphrey
    Area VP - Security Strategist, Deepwatch

    Neal Humphrey has been active in the security industry for nearly 20 years. He has reviewed Security from the Application layer, to the Transport Layer, to Cyber Threat Intelligence, and finally to the Human. Over the last 20 years he has worked with customers from the Global 100 down to the SMB market to identify and solve Cyber Security O...

  • speaker photo
    Jarret Wright
    Director of Cybersecurity, Massachusetts Port Authority

    Prior to his role as Director of Cybersecurity at MassPort, Jarret has served as Deputy Director of Corporate Security for over 2 years where he focused on maintaining a
    safe and secure environment at all Massport facilities while working with departments, law enforcement partners, and stakeholders to strengthen our capabilities to prev...

  • speaker photo
    Dr. Caroline McGroary, PhD, FCA
    Fulbright Scholar, Boston College Cybersecurity Graduate Programs

    Dr. Caroline McGroary is a Chartered Accountant and an Assistant Professor of Accounting at Dublin City University (DCU), Ireland. She has a Ph.D. in Professional Accounting Education and was recently awarded a Fulbright Scholarship by the Fulbright Commission of Ireland. Caroline will spend the coming year at Boston College as a Fulbright Sc...

  • speaker photo
    Simon Taylor
    CEO & Founder, HYCU, Inc.

    Simon Taylor is the CEO of HYCU where he creates and executes on the vision and strategy for one of the world's leading multi-cloud backup and recovery SaaS businesses. Prior to HYCU, Simon held senior executive positions at Comtrade Software including President and CEO as well as Chief Strategy Officer of The Comtrade Group where he evaluate...

  • speaker photo
    Wesley Spencer
    VP, External CSO, ConnectWise
  • speaker photo
    Kwan Lin
    Principal Data Scientist, Rapid7

    Kwan is the Principal Data Scientist on the Rapid7 Labs Research and Advocacy team. He routinely monitors and analyzes large-scale honeypot and Internet-scan data using statistical and machine learning methods. Recently, Kwan helped Rapid7 launch Project Doppler, a platform tool that enables customers to assess their public internet exposure....

  • speaker photo
    Peter Steyaert
    Sr. Sales Engineer Manager, Gigamon
  • speaker photo
    Professor Kevin R. Powers, J.D.
    Founder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston College

    Kevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Program at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College’s Carroll School of Management’s Business Law and Society Department. Along with his teaching at Boston College, Kevin is a C...

  • speaker photo
    Chris A. Quintanilla
    Managing Director, Saperde; Chief of Staff, Philadelphia InfraGard

    Chris has over 25 years’ experience in the IT field and is a Certified Information Systems Security Professional (CISSP). He has served as a senior project manager and engineer for several federal and municipal governments’ IT projects, as a network and systems engineer for IBM's Education and Training Division, and as an adjunct faculty mem...

  • speaker photo
    Jon Fredrickson
    VP & Chief Risk Officer, Blue Cross & Blue Shield of Rhode Island

    Jon Fredrickson is Vice President & Chief Risk Officer for Blue Cross & Blue Shield of Rhode Island. He graduated from the University of Rhode Island with a B. A. in Economics. During the past 15 years of working in the IT security field, Jon has developed a pragmatic approach to implementing cyber security solutions and assisting his organiz...

  • speaker photo
    Danny Jenkins
    CEO & Co-Founder, ThreatLocker

    Danny Jenkins is the CEO and Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security. Danny is a leading expert in cybersecurity with over two decades of experience in building and securing corporate networks, including many roles on red teams and blue teams. He is dedicated to educating industry professionals ...

  • speaker photo
    Bill Bowman
    CISO, Emburse

    Bill Bowman has been the first CISO at five different organizations over the last 20 years. He has been in Educational Technology, Financial Technology, and B2B Growth companies. He was the founding President for the (ISC)2 Eastern Massachusetts organization 10 years ago. Bill lives in Framingham with his wife and five children.

  • speaker photo
    Katherine Chipdey
    Sr. Solutions Engineer, Automox

    Katherine Chipdey manages the Enterprise Solutions Engineer Team here at Automox, where she is working to simplify IT operations, increase security, and bridge that gap between security and IT for their prospects and customers alike. In this role, Katherine has most enjoyed using her background and experiences in the the field to speak with h...

  • speaker photo
    Stephen Frethem
    Senior Director of Sales Enablement, Varonis

    Stephen has worked in the IT Industry since 2000 and in the security industry for the previous eight. Based out of the Twin Cities, Stephen has spent time at some of the largest organizations including Target, US Bank, Honeywell, and United Health Group. In his current role at Varonis, Stephen works with organizations around the US helping or...

  • speaker photo
    Cerena Coughlin
    Special Agent, FBI
  • speaker photo
    Tim Hennessey
    Sr. Director of SOC Services, Novacoast

    10+ years of managed security expertise.

  • speaker photo
    Jamie Zajac
    Vice President, Product, Recorded Future

    Jamie Zajac has over 10 years of experience in security and data protection roles and is currently the Vice President of Product Management for Recorded Future, an advanced security intelligence company. Jamie holds a B.S. in Meteorology and Computer Science from Embry-Riddle Aeronautical University and a MBA from UMass.

  • speaker photo
    Michael Meis
    Associate CISO, The University of Kansas Health System

    Michael is an Army veteran with over 13 years' experience and has a passion for architecting security programs, leading people, and developing world-class security teams. During his career, Michael previously partnered with the USDA CISO to develop one of the largest consolidations of security services in the federal government. Michael also ...

  • speaker photo
    Ashley Bull
    Solutions Engineer, Tessian

    Ashley is a Solutions Engineer at Tessian, providing customers with solutions to address their email security objectives. She is responsible for leading technical product demonstrations and evaluations, and is an expert in email security, endpoint security, insider threats, and behavior analytics and Human Layer Security. Prior to joining Tes...

  • speaker photo
    Chris Griffith
    VP of Product, Balbix

    Chris Griffith leads product management for Balbix. Chris brings over 15 years as a product, business development and strategy leader in security and technology. Prior to Balbix, Chris led tech alliances for Hewlett Packard Enterprise’s (HPE) security portfolio. Chris also ran product management for HPE’s Data Security business and drove stra...

  • speaker photo
    Lisa Britt
    SVP & Chief Human Resources Officer, Thermo Fisher Scientific
  • speaker photo
    Ryan Snyder
    SVP & CIO, Thermo Fisher Scientific
  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is the Executive Director at the National Cybersecurity Alliance. Lisa is a trailblazer in security awareness and education and is a prominent security influencer with a proven track record of engaging and empowering businesses and their employees to protect themselves and their data. Lisa has held executive roles with the For...

  • speaker photo
    David Barker
    Head of Application Security, GoodLeap LLC

    David Barker is Head of Application Security for GoodLeap LLC, a Fintech company providing a point-of-sale platform for sustainable home solutions. GoodLeap marks David’s fourth creation of a Code-to-Cloud Application Security program. His pedigree includes companies like Dell EMC, Stanley Black & Decker, and PTC. David has both an MBA and an...

  • speaker photo
    Richard Berthao
    Cybersecurity Advisor, U.S. Cybersecurity & Infrastructure Security Agency (CISA)

    Richard Berthao is the CISA Cybersecurity Advisor (CSA) for Connecticut. He manages the major cyber engagements in Connecticut with additional support to Region 1, championing cyber resilience to public and private sector partners. His career began over 25 years ago as an IT specialist in the private sector. Additionally, he spent 19 years as...

  • speaker photo
    Christopher Zell
    VP, Cyber Operations and Analysis, Dell Technologies

    Chris is currently Vice President, Cyber Operations and Analysis, for Dell Technologies. In this role, Chris leads the strategy and optimization of Dell's Cyber Security Operations (CSIRT, eFI, Security Assurance and Vulnerability Management) globally. Prior to joining Dell, Chris served at the first CISO for the Wendy's company, where he spe...

  • speaker photo
    Margaret White
    SVP & BISO, Wells Fargo

    Margaret White is currently Senior Vice President, Business Information Security Officer (BISO) for Wells Fargo’s Enterprise Functions. In this role, Margaret leads execution of cybersecurity posture and strategy for enterprise-wide cybersecurity engagements and provides bi-directional transparency to Enterprise Functions CEOs and CIOs. Prior...

  • speaker photo
    Peter Liu
    Technical Account Manager, Qualys

    Peter Liu has been with Qualys in the Pre-Sales TAM role for over four years. He loves helping customers evaluate Qualys to make the decision to adopt Qualys as a security platform that allows you to tackle current security challenges such as vulnerability management or global IT asset management. Prior to Qualys, he spent six years in the di...

  • speaker photo
    Kevin Brennan
    Special Agent, FBI, Seattle Field Office

    FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.

  • speaker photo
    Loris Degioanni
    CTO & Founder, Sysdig

    Loris Degioanni is the Chief Technology Officer (CTO) and founder of Sysdig, the secure DevOps leader. He is also the creator of the popular open source troubleshooting tool, sysdig, and the open source container security tool, Falco. Prior to founding Sysdig, Loris co-created Wireshark, the open source network analyzer, which today has 20+ m...

  • speaker photo
    Evan Tegethoff
    VP of Solutions Consulting, BitSight

    Evan Tegethoff is Vice President of Solutions Consulting at BitSight. He previously held leadership roles in Risk and Compliance Practice Management at Optiv, Accuvant, and Forsythe Technologies. He has developed Third Party Risk approaches for numerous large organizations. Additionally, he led consulting teams focused on compliance, risk man...

  • speaker photo
    Justin Henkel
    Head of CISO Center of Excellence, OneTrust

    Justin Henkel is an information security thought leader, subject matter expert, and Head of OneTrust's Security Center of Excellence. Justin has a proven track record planning, developing, building, and monitoring portfolios of work to secure IT infrastructure to meet federal and state cybersecurity standards, guidelines, and best practices. ...

  • speaker photo
    Chuck Brooks
    Cybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty

    Named Top Tech Person To Follow by LinkedIn, Named Top 5 Cybersecurity Exec to Watch, Georgetown U Faculty, 2X Presidential Appointee, FORBES Contributor, Cybersecurity, Emerging Tech SME, Influencer

  • speaker photo
    Alexandra Heckler
    CISO / Executive Director, Cybersecurity, Collins Aerospace
  • speaker photo
    Nick Olmsted
    Sr. Systems Engineer, Arctic Wolf

    Nick Olmsted is a senior systems engineer with Arctic Wolf who brings 19 years of experience architecting, implementing, and developing secure technology solutions for enterprises. Nick started his career as a developer learning how to develop secure applications for clients around the globe. He then moved into a systems engineer role to help...

  • speaker photo
    Michael Johns
    Assistant Special Agent in Charge, United States Secret Service

    Michael brings over 24 years of experience with the Secret Service that includes leadership roles both in the protective arena and investigative front. Currently, he leads the Secret Service's Outreach Program, focusing on private and public sector partner growth. He is also the Executive Director for the Secret Service's Cyber Investigative ...

  • speaker photo
    Curtis Barker
    Field CTO; VP, Product and Solution Architecture, Rezilion

    Curtis has spent the past 10 years in technical sales and product management. Prior to Rezilion, Curtis spent 6 years at Symantec to manage their emerging mobile security products and went on to lead the Symantec product portfolio in their Asia Pacific region based in Singapore. Curtis transferred to Symantec HQ in Mountain View, California i...

  • speaker photo
    Michael Gorelik
    CTO, Morphisec

    Michael Gorelik is CTO of Morphisec, where he leads the malware research operation and sets technology strategy. He has extensive experience leading diverse cybersecurity software development projects and experience in the software industry in general. Prior to Morphisec, Michael was the VP R&D at MotionLogic GmbH and before that served in se...

  • speaker photo
    Tom Bowyer
    DevSecOps Engineer, Automox

    Tom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaki...

  • speaker photo
    Greg Maples
    Principal Security Architect, Gigamon

    Greg Maples, CISSP, is Principal Security Architect for Gigamon. He has been involved in computer networking since his involvement in the original ARPANet project that became the Internet. He has been specializing in security protocols and web/DDOS issues for many years, and has more recently been focusing on threat detection in a Zero-Trust ...

  • speaker photo
    Tim Williams
    Director, Information Security & Cyber Risk, ZOLL Medical Corporation
  • speaker photo
    Tung Nguyen
    Director of Cyber Security, Denver Water
  • speaker photo
    Sue Lapierre
    Vice President, Information Security Officer, Prologis
  • speaker photo
    Richard Bakos
    Director, Sales Engineering, LogRhythm
  • speaker photo
    Tim Keeler
    Founder & CEO, Remediant, Inc.

    Tim Keeler worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Tim moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences, and CardioDX. Tim is a GX-certified Secu...

  • speaker photo
    Troy Kitch
    VP of Product Management, Solutions, 1Password
  • speaker photo
    Tom Dixon
    Security Engineer, Corelight

    Tom has 15 years of experience in the security industry, beginning his career as an Analyst at what is now the U.K. MOD Joint Cyber Unit. After seven years in the military, he left to join Sourcefire as a Security Engineer. Cisco acquired Sourcefire in 2013, and he joined a small global team working with Cisco's top 28 accounts, ultimately le...

  • speaker photo
    Dan Kaplan
    Solutions Engineer, Okta

    Dan is a Solutions Engineer for Okta and aligns identity-related technical requirements to business outcomes for Okta US West commercial customers and prospects. He is an Okta-certified consultant and developer familiar with Zero Trust methods used by Okta's ecosystem of customers, partners, and prospects.

  • speaker photo
    Jim Johnson
    Director of Systems Engineering, Arctic Wolf

    Jim Johnson has been working to end cybercrime for the past two decades. His career started at Blue Coat, where he helped customers with their struggles to mitigate risk in the early days of web filtering. Since then, he has worked with customers of all sizes and verticals providing solutions from F5, Forescout, and now Arctic Wolf. As the Di...

  • speaker photo
    Bobby Mazzotti
    Sr. Solutions Engineer, Red Canary
  • speaker photo
    Jim Mandelbaum
    Field CTO, Gigamon
  • speaker photo
    Maggie MacAlpine
    Security Strategist, Cybereason

    Maggie MacAlpine is a security strategist at Cybereason and one of the co-founders of the DEF CON Voting Village. Over the course of 10 years spent in the field of cybersecurity, MacAlpine has been a contributing researcher on the "Security Analysis of the Estonian Internet Voting System" in partnership with the University of Michigan, co-aut...

  • speaker photo
    Steven Anderson
    Chief Underwriting Officer, Measured Analytics and Insurance
  • speaker photo
    Sean Scranton
    Cyber Liability National Practice Leader, RLI Insurance Company

    Cyber Liability National Practice Leader (current).
    IT Security / IT Auditor at RLI for 8 years.
    Network / security consulting / auditor for financial institutions, government for 9 years.
    Network / firewall administrator in healthcare for 7 years.


  • speaker photo
    Akshay Kumar
    Product Manager, Partners, PKWARE

    Akshay Kumar serves as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid de...

  • speaker photo
    Sonya Wickel
    Director, Cybersecurity & Risk Compliance, Triumph Group
  • speaker photo
    Steve Kinman
    Field CISO, Snyk

    Steve Kinman is a dedicated technology leader, with 20+ years of innovative, compliance-driven security strategy knowledge and the ability to deliver scalable, principle-based security and privacy programs focused on business requirements. Most recently, he led a security program transformation at Zalando SE in Berlin, Germany, joining as the...

  • speaker photo
    Keith Chapman
    Cybersecurity Specialist, Infoscitex Corporation

    Keith has been a team lead for a security operations center, where he was a mentor and an incident response and threat intelligence subject matter expert and facilitated tabletop exercises. He currently works in a GRC role. He has the CISSP and Certified Threat Intelligence Analyst certifications. He also serves as a Cyber Teen Education chai...

  • speaker photo
    Jasmine Noel
    Sr. Product Marketing Manager, ReversingLabs

    Jasmine Noel is Senior Product Marketing Manager at ReversingLabs. Her career began as an industry analyst covering IT technologies. She then founded Ptak, Noel & Associates to provide research and marketing services to Fortune500 and startup technology firms. Prior to ReversingLabs, Noel also held product marketing roles in growth companies,...

  • speaker photo
    Mike Davis
    CISO, ExactlyIT Inc.; former CISO, alliantgroup
  • speaker photo
    Travis Dye
    Principal Solutions Architect, Armis

    Travis Dye is a Principal Solutions Architect for Armis focusing on strategic customers with challenging security projects. His passion is to help organizations with large and complex network environments find effective, real-world approaches to improve their network security programs. Prior to his current role he worked with security teams t...

  • speaker photo
    Eve Maler
    CTO, ForgeRock

    Eve Maler is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and has also served as a Forr...

  • speaker photo
    Adam Meyers
    SVP, Intelligence, CrowdStrike
  • speaker photo
    Sean McKay
    CISO, Portland State University
  • speaker photo
    Krishna Ksheerabdhi
    VP, Product Marketing, Encryption, Thales Group

    Krishna has more than 25 years of experience leading Engineering and Business Strategy teams, including evaluating and integrating several key Thales acquisitions. Krishna has a Ph.D. in Computer Science and has worked on various topics, from compilers for supercomputers to operating systems for smart cards, leading skunkworks innovation proj...

  • speaker photo
    Matt Downing
    Director, Threat Hunting Operations, ReversingLabs

    Matt is Director of Threat Hunting Operations at ReversingLabs where he helps to operationalize the implementation of ReversingLabs tools and massive dataset to help make networks more secure. Matt is a dedicated blue teamer and threat hunter. Prior to his role at ReversingLabs, Matt held many roles supporting threat research and security ope...

  • speaker photo
    Nathan Faith
    Manager, Cyber Security Nuclear Fleet, Exelon Generation
  • speaker photo
    Michael R. Glennon
    Special Agent and Private Sector Coordinator, FBI
  • speaker photo
    Earl Duby
    VP & CISO, Lear Corporation; Board Member, Michigan InfraGard Members Alliance
  • speaker photo
    Toby Zimmerer
    Director, Cybersecurity Due Diligence, RSM US

    Toby Zimmerer is a Director of Cybersecurity Due Diligence in the Transaction Advisory Services Practice of RSM US, where he assists organizations with identifying and addressing the potential cybersecurity risks during mergers and acquisitions. He has over 22 years of professional experience developing information security strategies, design...

  • speaker photo
    John M. Wilke
    Sr. Product Marketing Manager, Okta

    John Wilke is a Senior Product Marketing Manager at Okta who is currently focused on aligning the impact of Okta's SaaS solutions with the core business goals of Okta's most strategic customers. He was previously responsible for the expansion of Okta's Business Value team for the West Coast and Asia Pacific regions.

  • speaker photo
    Cory Sutliff
    Technical Director, AttackIQ

    Practice Lead for Technical Account Management at AttackIQ. Cory has 20+ years' experience in IT focusing on security, seven+ years with the DoD. He has spent the last two years at AttackIQ delivering Security Optimization (BAS).

  • speaker photo
    John Prewett
    Sr. IT Security Engineer, UnitedHealth Group

    John Prewett is a security technologist with over 20 years’ experience helping private sector, government agencies, and educational institutions identify risk and improve their security postures. John's latest passion is code writing, software engineering best practice, and otherwise improving the overall relationship between security practit...

  • speaker photo
    Joey Peloquin
    Principal Cloud Architect, Sales Engineering, Gigamon

    Joey Peloquin is an information and cyber security veteran, evolving over the years to specialize in multiple domains, including network, application, mobile, and for the last seven years, cloud security and architecture. Joey has held a variety of leadership roles over his career including security product ownership, head of consulting servi...

  • speaker photo
    Matthew Alec Alvarado
    Solutions Architect, Digital Shadows

    Alec Alvarado has a unique blend of both private and public sector cyber threat intelligence (CTI) experience with 10 years serving in multiple all-source intelligence positions with the United States Army Reserve and 5 years in varying CTI positions with Digital Shadows. A career sparked by a discovered passion for intelligence analysis and ...

  • speaker photo
    Bridget Kravchenko
    CISO, Meritor

    Bridget Kravchenko is the Senior Director, Chief Information Security Officer for Meritor, responsible for information security, IT risk, and compliance globally. She has responsibility for developing a strategic security plan, security metrics, security programs, risk management, and incident response.

    Bridget has served in a CISO or...

  • speaker photo
    Adam Ford
    CISO, Illinois Department of Innovation & Technology (DoIT)
  • speaker photo
    Laura Clark
    CSO, State of Michigan - Department of Technology, Management and Budget

    Chief Security Officer for the Michigan Department of Technology, Management & Budget, Laura Clark brings a unique blend of strengths that include leadership, vision, and strategic and tactical planning, along with the ability to promote collaboration at all levels to support high-level, critical state-wide projects to successful completion.<...

  • speaker photo
    Karl Bernard
    IT Security Architect, University of Texas Health Science Center at Houston (UTHealth)

    Karl Bernard, CISSP, is an IT Security Architect at UTHealth with 30 years of IT experience, with 20 years in Information Security. His experience runs the full gamut of IT Security: he has implemented new technologies, such as network monitoring products and web application firewalls; performed risk assessments; coordinated large DR tests; l...

  • speaker photo
    Shafia Zubair
    Manager, Information Security, Morningstar

    Shafia is a Manager of Information Security at Morningstar, where she is responsible for the Information Security program management and governance. This requires working across security operations, threat intel, application security, compliance, and with the product teams to ensure secure, resilient, and recoverable applications. Prior to Mo...

  • speaker photo
    Tim Mackey
    Principal Security Strategist, Synopsys

    Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim appl...

  • speaker photo
    Sam Curry
    Chief Security Officer, Cybereason

    Sam Curry is CSO at Cybereason and has over 25 years of IT security industry experience. Curry served as CTO and CSO at Arbor Networks, where he was responsible for the development and implementation of Arbor’s technology, security, and innovation roadmap. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a v...

  • speaker photo
    Alex Jones
    Information Security Manager, Cobalt.io

    Alex Jones is an Information Security professional with eight plus years of direct security and compliance experience. He also has an extensive background in media, audio, and communications prior to working in the security field. He is currently the Information Security Manager for the leading Pentest as a Service Company, Cobalt.io. Prior t...

  • speaker photo
    Michael Boucher
    Americas CISO, JLL
  • speaker photo
    Jason Rivera
    Director, Strategic Threat Advisory Group, CrowdStrike

    Jason Rivera has over 15 years of experience innovating at the intersection of security operations and technology. He was a former Intelligence Officer/Captain in the U.S. Army, had assignments with the National Security Agency (NSA) and U.S. Cyber Command (USCYBERCOM), and served in combat tours overseas. He has experience in the private sec...

  • speaker photo
    Jeremy C. Sheridan
    Assistant Director, Office of Investigations, United States Secret Service

    Jeremy Sheridan is the Assistant Director of the Office of Investigations at the United States Secret Service. In this role, he leads more than 160 Secret Service field offices and directs the Secret Service's network of Cyber Fraud Task Forces (CFTFs) in their investigations of sophisticated computer and financial crimes. He also works to en...

  • speaker photo
    Pascal Geenens
    Global Director, Threat Intelligence, Radware

    Pascal Geenens helps execute Radware's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of IT. As part of the Radware Security Research team, he develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, perfor...

  • speaker photo
    Michael Schladt
    Principal Cybersecurity Researcher, General Electric Gas Power

    Mike Schladt, CISSP, GREM, is an information security researcher and engineer with over 12 years' experience performing malware analysis, reverse engineering, digital forensics, and incident response. Previous roles include leading malware analysis at the USAF National Air and Space Intelligence Center, as well as heading the development of e...

  • speaker photo
    Deepthi Menon
    Director of Information Security, Ambra Health

    Deepthi Menon serves as Director of Information Security at Ambra Health. Ambra Health is an innovative software company that provides solutions for medical image sharing of DICOM and non-DICOM data between patients, physicians, and hospitals. Deepthi has more than 12 years of experience in information security. She has her Masters in Informa...

  • speaker photo
    Rob Ellis
    Vice President, Reciprocity, Inc
  • speaker photo
    Scott McCormick
    CISO, Reciprocity, Inc
  • speaker photo
    Eric Botts
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cyber Security Program, and Assistant Professor of International Studies at the University of St. Thomas, teaching courses on Cyber Warfare, Cyber Ethics, Enterprise Cybersecurity, and Digital Governance. Adjunct Lecturer at the University of Houston Downtown, teaching a course on Organizational Resilience in th...

  • speaker photo
    Andrew Jarrett
    Program Manager, Cyber Readiness Center, Texas A&M Engineering Extension Service

    Andrew Jarrett of the TEEX Cyber Readiness Center is a former firefighter, current member of a Type II/Type III Incident Management Team (IMT) and has recently been deployed as a member of Texas Division of Emergency Management (TDEM) Incident Support Teams (ISTs) for COVID response. As the Cyber Enterprise Program Manager at the TEEX CRC, he...

  • speaker photo
    Russell Dowdell
    Director, Sales Engineering, SecureLink

    For nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations iden...

  • speaker photo
    Eric Monteith
    Director, US Public Sector Engineering, CrowdStrike
  • speaker photo
    Adam Hastings
    Sr. Sales Engineer, iboss
  • speaker photo
    Marcus Gwyn
    Sr. Federal Sales Engineer, SonicWall

    Marcus Gwyn has worked in cybersecurity sales for 10 years and in the Federal space for five of those years. He is the lead Sales Engineer on the SonicWall Federal team and has worked with Federal customers in Civilian, DOD, and Intel spaces. Marcus enjoys following trends in the threat landscape and learning more about cybersecurity. In his ...

  • speaker photo
    Wes Knight
    CISO, Needling Worldwide
  • speaker photo
    Ryan Witt
    Sr. Director, Industry Solutions Group, Proofpoint
  • speaker photo
    Marina Liang
    Sr. Security Engineer, Automox

    Marina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, tria...

  • speaker photo
    James McGril
    Security Solutions Architect, Radware

    James is a Security Solutions Architect and one of Radware’s thought leaders in Network and Application Security. He's been with Radware for nearly 10 years. James is a self-described geek and enjoys learning about application security and building web applications using the latest technologies. In his off time, James enjoys hiking, surfing, ...

  • speaker photo
    Kevin Wilson
    Sr. Product Manager, Area 1 Security

    Throughout his 14 years in cybersecurity, Kevin has been an Analyst and Engineer in various organizations, such as the U.S. Navy, First Data, and Lowe’s. Previously, he served as the Global Information Security Officer at Guess? Inc. and a Product Manager for McAfee.

  • speaker photo
    Baseer Balazadeh
    Sr. Technical Marketing Engineer, Gigamon

    Baseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor's degree in computer system networking engineering f...

  • speaker photo
    Nancy Rainosek
    CISO, State of Texas
  • speaker photo
    Ed Lopez
    Solutions Engineer, Bitglass
  • speaker photo
    Moderator: Joel Caminer
    Sr. Director of Cybersecurity Education, NYU Tandon

    Joel Caminer is the Director of Cybersecurity Education at NYU Tandon. Joel has 20+ years of experience in Financial Services, IT, and Consulting, and has led many strategic initiatives across the IT Risk and cybersecurity spectrum. He previously served as the Global Head of Technology Risk Management at TD Securities; VP of Information Risk ...

  • speaker photo
    Liat Krawczyk
    AVP, Emerging Tech, Cyber NYC, New York City Economic Development Corporation

    Liat Krawczyk is Assistant Vice President for Emerging Tech at the NYCEDC where she led the workforce arm of Cyber NYC, NYC's signature program to grow its cybersecurity ecosystem. She is also the founder and head of the women.nyc Childcare Innovation Lab. Prior to joining NYCEDC, Liat grew startups, social-enterprises, and innovation ecosyst...

  • speaker photo
    Jim Routh
    Private Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and Aetna

    Jim Routh serves as a security & risk advisor and Board member for several companies, and is the former CISO for MassMutual, CSO at Aetna, and Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and info...

  • speaker photo
    Geoff Brown
    CISO, City of New York; Head of NYC Cyber Command

    Geoff Brown was appointed Chief Information Security Officer for the City of New York in 2016, a position focused on cybersecurity and aggregate information risk across all 100+ NYC departments and agencies. In July 2017, Mayor de Blasio established New York City Cyber Command, led by Geoff and charged with setting Citywide cybersecurity poli...

  • speaker photo
    Nasir Memon
    Vice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of Engineering

    Nasir Memon is Vice Dean for Academics & Student Affairs, Head of Tandon Online, and a Professor of Computer Science at NYU Tandon. He introduced cybersecurity studies to NYU Tandon in 1999. He is co-founder of NYU's Center for Cyber Security (CCS) & the founder of the OSIRIS Lab, CSAW, and NYU Tandon Bridge & Cyber Fellows programs at NYU. H...

  • speaker photo
    Tom Roeh
    Director, Systems Engineering - Public Sector Technical Practice, ExtraHop

    Tom currently leads the ExtraHop Public Sector technical practice as Director of Systems Engineering. He has spent most of his 20-year career looking at networks, protocols, and packets in one way or another. Tom has a passion for utilizing data-driven techniques to solve the complex problems faced by modern IT practitioners. When he's not wo...

  • speaker photo
    Moderator - Tina Thorstenson
    Executive Public Sector Strategist, CrowdStrike

    Tina Thorstenson, Public Sector Strategist, sits on the Public Sector Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for Public Sector organizations across Federal, State and Local, Higher Education, and Healthcare. Just prior to joining CrowdStrike, she serv...

  • speaker photo
    Joel Burleson-Davis
    CTO, SecureLink
  • speaker photo
    Jonathan Ehret
    Vice President, Strategy & Risk, RiskRecon, a Mastercard company

    Jonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.

  • speaker photo
    Deborah Watson
    Resident CISO, Proofpoint

    Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah led cybersecurity strategy programs for public and private sector organizations across the Fortune 1000....

  • speaker photo
    Dave Lewis
    Global Advisory CISO, Cisco
  • speaker photo
    Moderator: Brian Wasko
    Director, Information Security & Compliance, RiskIQ
  • speaker photo
    Terrence Davis
    Solutions Architect, Armis
  • speaker photo
    Keval Shah
    Sr. Sales Engineer, Gigamon

    With over 12 years of technical consulting and solution engineering experience in the field of Enterprise Networking & Security, Keval has enjoyed architecting and transforming businesses. Prior to Gigamon, Keval spent a decade at Cisco. He holds a Masters in Science, Electrical Engineering, from University of Southern California and a Master...

  • speaker photo
    Maria Thompson
    Chief Risk Officer, State of North Carolina
  • speaker photo
    Deborah Blyth
    CISO, State of Colorado
  • speaker photo
    Vinod Brahmapuram
    CISO, State of Washington
  • speaker photo
    Sowmya Karmali
    Director, Product Management, CrowdStrike

    Sowmya Karmali is a Director of Product Management at CrowdStrike and is responsible for Falcon Horizon (CSPM) and Falcon Discover for Cloud. She has over 20 years of product development and management experience covering cloud, data, and IoT, and has worked in startups and large organizations. Prior to CrowdStrike, Sowmya held product leader...

  • speaker photo
    Spencer Parker
    Sr. Director, Product Management, CrowdStrike

    With over 20 years of product management experience at Cisco, Websense, and most recently Sophos before joining CrowdStrike in 2017, Spencer has been instrumental in leading the Intel/Falcon X and Mobile solutions. Spencer holds a B.S. in Molecular Biology from the University of Portsmouth.

  • speaker photo
    Naeem Babri
    President, ISSA KC Chapter; Security Risk Manager, T-Mobile
  • speaker photo
    Michael Rasmussen
    Director, ISSA International

    Michael Rasmussen is an internationally recognized pundit on governance, risk management, and compliance (GRC). With 27+ years of experience, he helps organizations improve risk and compliance processes, design and implement GRC architecture, and select technologies that are effective, efficient, and agile. As a sought-after keynote speaker, ...

  • speaker photo
    Justin Fier
    Director for Cyber Intelligence and Analysis, Darktrace
  • speaker photo
    Vito Ferrante
    Presales Engineer, Arctic Wolf
  • speaker photo
    Igor Sorkin
    Sr. Solutions Engineer, Okta

    Igor is a 25-year Kansas City IT professional with background across Telecom, Fin-Tech, and Security Technology companies focusing on Software Development, Enterprise Architecture, Security, and Identity and Access Management. A member of Okta's Enterprise Solutions team since 2019, Igor has been helping companies in the Central region to vis...

  • speaker photo
    Rich Guth
    CMO, CloudPassage

    Rich has built a 25-year career in Silicon Valley bringing new B2B software technologies to market including Big Data, Analytics, Business Intelligence, Java development tools, interactive development environments. and web application servers. He has held sales, product management, product marketing, solutions marketing, partner marketing, GM...

  • speaker photo
    Bob Gilbert
    Chief Evangelist, Netskope
  • speaker photo
    Mike Asaro
    Sr. Named Account Manager, Proofpoint

    Mike Asaro is an Insider Threat Management and DLP Specialist at Proofpoint. Before joining Proofpoint earlier this year, he spent almost 10 years with an industry leading traditional DLP vendor. Throughout his career in cybersecurity, he’s managed and supported many organizations in the Southwest region across multiple verticals. As a San Di...

  • speaker photo
    Damian Chung
    Business Information Security Officer, Netskope
  • speaker photo
    Prakash Nagpal
    VP of Marketing, Appaegis

    Prakash Nagpal is VP of Marketing at Appaegis, where he is responsible for bringing the next generation of Zero Trust Secure Application Access solutions to market. His mission is to help customers realize the vision of securing applications and data without compromising user experience, with a Zero Trust application centric approach to secur...

  • speaker photo
    Joel Hollenbeck
    Regional Director, Security Engineering, Check Point Evangelist, Check Point Software Technologies

    Joel Hollenbeck is a Cyber Security Visionary with the Office of the CTO at Check Point Software Technologies Inc., the worldwide leader in securing the internet. His background includes over 20 years of experience deploying application protection and network-based security. Joel has been securing networks and systems since 1994, including de...

  • speaker photo
    Steve Velazquez, CISSP, CISM
    Sr. Solutions Engineer, Okta

    Steve is a Sr. Solutions Engineer at Okta helping enterprise customers with their identity and access management needs. In his previous life, Steve has served as a CISO / VP of Information Security, Data Center Manager, and held various Security, Windows, and Network Engineering roles.

  • speaker photo
    Donovan Stevens
    Solutions Engineer, SpyCloud

    Donovan is a Solutions Engineer at SpyCloud and has been in the tech industry since the mid nineties. He has worked in various industries and for companies ranging from start-ups to those listed in the Fortune 50. His career has taken him all over the world, including a four-year stint in South-Africa where he worked for the South-African gov...

  • speaker photo
    Brian Linder
    Emerging Threats Cybersecurity Evangelist, Office of the CTO, Check Point Software Technologies

    Brian Linder is an Emerging Threats Expert and Evangelist in Check Point’s Office of the CTO, specializing in the Modern Secured Workforce. Brian has appeared multiple times on CNBC, FOX, ABC, NBC, CBS, and NPR Radio, and hosts Check Point’s CoffeeTalk Podcast and Weaponizers Underground, and has teamed on keynote CyberTalks at Check Point’s ...

  • speaker photo
    Michael McGinnis
    Sr. Sales Engineer, LogRhythm

    A Senior Sales Engineer for LogRhythm, Michael McGinnis has worked in IT Security for over 15 years, specializing in SIEM technology for the past 10. Michael’s experience began as a Security Architect for the largest hospital network in the Midwest where he developed and matured a security posture that is the framework used by many hospital s...

  • speaker photo
    Kristen Cooper
    Director of Product Marketing, Siemplify

    Product marketing specialist with over 15 years of experience at emerging and growing cybersecurity and SaaS companies. Currently heading up product marketing at Siemplify. SecOps solution specialist. Remote work advocate.

  • speaker photo
    Tim Chang
    VP, Global Sales Engineering, Imperva
  • speaker photo
    Brad Tompkins
    Sales Engineer, LogRhythm
  • speaker photo
    Matthew Norwood
    Solutions Engineer, Bitglass, Inc.
  • speaker photo
    Timothy Lee
    CISO, City of Los Angeles, Information Technology Agency
  • speaker photo
    Pedro Vazquez
    Director of Cybersecurity, Waddell & Reed

    As the Director of Cyber Security for Waddell & Reed, Pedro is tasked with leading IR, SECOPS, Vulnerability Management, Security Automation, and IAM. Pedro has previously provided security services for the DoD, IRS, DST, and SS&C.

  • speaker photo
    Jay Bivens
    Sr. Systems Engineer - GA, Gigamon

    Jay Bivens started his technology career working in IT stationed aboard the USS WASP (LHD-1) back in 1993. With a background expertise in email security and Advanced Threat Protection, his career spans several areas including Cloud Access Security Brokers, Web Application Firewalls, and Application Delivery Controllers. Jay has earned GIAC Ce...

  • speaker photo
    David Gold
    Sr. Director, Sales Engineering, SentinelOne
  • speaker photo
    John Weiler
    Chairman of the Board, CMMC Center of Excellence

    John Weiler is currently the CEO and CIO of a congressionally charted IT "do tank" called IT-AAC. He has forged partnerships with two dozen leading non-profits and federal agencies committed to the Digital Transformation of the federal IT sector.

    He has 40 years of IT Management, Solution Engineering, and Architecture experiences, cove...

  • speaker photo
    Vladimir Svidesskis
    Director, Head of Security, Compliance and Risk, Vaco
  • speaker photo
    Ray Griffin
    Director and Head of Information Security, Cox Media Group
  • speaker photo
    Michelle Stewart
    CISO, Safe-Guard Products
  • speaker photo
    Ryan Aleman
    Director, Solution Architect , Armis

    Ryan Aleman is a Director of Solutions Architect at Armis. In this role, Ryan is at the forefront of the developing landscape of unagentable devices. With an extensive background in security and technical environment management, Ryan has worked extensively to find passive, agentless security solutions in the medical, industrial, and IoT space...

  • speaker photo
    Kevin Santarina
    Sr. Presales Systems Engineer, Arctic Wolf Networks
  • speaker photo
    Tony Lee
    VP, Global Services Technical Operations, BlackBerry
  • speaker photo
    Jason LeDuc
    Director, Risk Management Services, AccessIT Group
  • speaker photo
    Paul Kitor
    Application Security Solution Architect, Contrast Security
  • speaker photo
    John Swensson
    Enterprise Customer Success Manager, CloudPassage

    John Swensson is the Customer Success Manager at CloudPassage and is responsible for all customer support initiatives. John’s information security career spans two decades and includes a broad number of business environments. John and the CloudPassage teams have worked together creating groundbreaking security solutions across a range of indu...

  • speaker photo
    Harrison Parker
    Solutions Architect, Siemplify

    Harrison holds a Bachelor's in Computer Science from Harvard University.

  • speaker photo
    Chris Pin
    VP, Security and Privacy, PKWARE

    Chris Pin serves as PKWARE’s VP, Security and Privacy. In this role, Chris drives value and awareness for all PKWARE customers regarding the various challenges that both privacy and security regulations bring to the data-driven world. He works closely with all customers and potential customers to help them better understand how PKWARE solutio...

  • speaker photo
    Jose Barajas
    Technical Director of NA, Sales Engineering, AttackIQ

    Jose Barajas is Technical Director, NA Sales Engineering AttackIQ. He has over a decade of experience as a security researcher reverse-engineering malware and developing security controls and analytics. At AttackIQ, he now focuses on improving security control efficacy through attacker behavior emulation and establishing continuous security v...

  • speaker photo
    Christopher A. Hart
    Former Chairman, National Transportation Safety Board; Founder, Hart Solutions LLP

    Christopher A. Hart is the founder of Hart Solutions LLP, which specializes in improving safety in a variety of contexts, including the safety of automation in motor vehicles, workplace safety, and process safety in potentially hazardous industries.

    Mr. Hart is also Chairman of the Washington Metrorail Safety Commission, a three-jurisd...

  • speaker photo
    Bruno Almeida
    Cloud Overlay Sales Engineer, Gigamon

    Bruno Almeida is a Sales Engineer at Gigamon, where he partners with customers to help them ensure continuous security and monitoring of cloud and data center services during their digital transformation journeys. He has over a decade of experience in the IT infrastructure space. Before joining Gigamon, Bruno worked for several firms in the m...

  • speaker photo
    Jay Venkatraj
    Sr. Solutions Engineer, Okta
  • speaker photo
    Crane Hassold
    Director of Threat Intelligence, Abnormal Security

    Crane Hassold is the Director of Threat Intelligence at Abnormal Security, where he leads a team responsible for researching enterprise-focused cyber threats. Prior to joining the private sector in 2015, Crane served as an Analyst at the Federal Bureau of Investigation for more than 11 years, providing strategic and tactical analytical suppor...

  • speaker photo
    Larry Chinski
    Vice President, Global IAM Strategy and Customer Advocacy, One Identity

    Larry Chinski has over 20 years in the Identity and Access Management industry and travels globally to help complex organizations understand emerging trends, the current threat landscape, and how to leverage technology platforms to resolve issues related to cybersecurity as well as operational efficiency.

  • speaker photo
    Todd Bearman
    VP & CISO, Global Infrastructure and Security Solutions, TE Connectivity

    Todd Bearman is the Chief Information Security Officer for TE Connectivity with responsibility for Information Security globally across nearly 150 countries with 75,000 employees.

    Todd is responsible for ensuring collaboration and risk management across the corporate functions and business units where he leverages his leadership, techn...

  • speaker photo
    Nick Falcone
    CISO, University of Pennsylvania
  • speaker photo
    Mariana Pereira
    Director, Email Security Products, Darktrace

    Mariana is the Director of Email Security Products at Darktrace, with a primary focus on the capabilities of AI cyber defenses against email-borne attacks. Mariana works closely with the development, analyst, and marketing teams to advise technical and non-technical audiences on how best to augment cyber resilience within the email domain, an...

  • speaker photo
    Chris Christensen
    Sr. Business Consultant, Cybersecurity, Honeywell Building Solutions

    Chris Christensen is the Cybersecurity Business Consultant for Honeywell Building Solutions (Americas) and specializes in securing Operational Technology (OT) and Industrial Control Systems (ICS) Chris passionately believes that cybersecurity is everyone's shared responsibility and through awareness, education, accountability and positive rei...

  • speaker photo
    Alex Kirk
    Global Principal Engineer, Corelight

    Alex Kirk is an open source security veteran, with a combined 17 years at Sourcefire, Cisco, Tenable, and now Corelight, where he serves as Global Principal for Suricata. Formerly a malware zookeeper and IDS signature writer, today he spends his time helping SOC analysts and advising on security policy for government agencies, universities, a...

  • speaker photo
    Prashanth Ram
    Solutions Architect, Okta
  • speaker photo
    Stephen Gates
    Security Evangelist & Sr. Solution Specialist, Checkmarx Inc.

    Stephen Gates brings more than 15 years of information security experience to his role as Security Evangelist and Senior Solution Specialist at Checkmarx. He is an SME with an extensive hands-on background in security and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and informa...

  • speaker photo
    Tommy Todd
    Vice President of Security, Code42

    Tommy Todd is Vice President of Security at Code42 with over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, Tommy served in security roles at Symantec, Ionic Security, and Optiv as well as many other firms. Throughout his career, he has acted as a leader, mentor, engine...

  • speaker photo
    C. Michael Tracy
    Sr. Solutions Engineer, SpyCloud

    An experienced security architect, specializing in Identity Governance, Access Management, and Multi-Factor Authentication, C. Michael Tracy has over 20 years of diverse technology experience with roles at Microsoft, Wells Fargo Bank, HID Global, and DigitalPersona. At SpyCloud, C. Michael helps clients safeguard the identities of their emplo...

  • speaker photo
    Scott Shackelford
    Cybersecurity Program Chair, Indiana University

    Professor Scott J. Shackelford serves on the faculty of Indiana University where he is Cybersecurity Program Chair along with being the Executive Director of the Ostrom Workshop. He is also an Affiliated Scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Soci...

  • speaker photo
    Tina Meeker
    Sr. Director, Information Security, Sleep Number

    Tina is currently the Sr. Director of Information Security at Sleep Number Corporation and has held executive cybersecurity leadership positions at Best Buy, Shutterfly, and Target Corporation. Tina holds a B.A. in Organizational Behavior from St. Scholastica and an MBA from Augsburg University. Tina also maintains active CISSP and CIPP/US ce...

  • speaker photo
    Theodore Peterson
    Director, Information Security, Datasite

    Theodore Peterson, CISSP, has over 30 years of IT and Information Security experience. He has a BA from the University of Minnesota and an MBA from Augsburg College. He currently is the Director Information Security for Datasite.

  • speaker photo
    Joseph Carson
    Chief Security Scientist & Advisory CISO, Delinea

    Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical i...

  • speaker photo
    Dave Armlin
    VP, Solution Architecture, ChaosSearch
  • speaker photo
    Piyali Das
    Sr. Director, Information Security Risk Management, The College Board

    Piyali Das has a proven 16-year track record of leading Information Security and Information Technology enterprise-wide initiatives. This includes success in risk-based prioritization of security initiatives and the resolution of complex issues cost effectively. She has also directed complex cross-functional projects across the enterprise res...

  • speaker photo
    Augusto Barros
    VP of Solutions, Securonix
  • speaker photo
    David Swift
    Sr. Cybersecurity Solutions Architect, Securonix
  • speaker photo
    Todd Maillet
    Sr. Presales Systems Engineer, Arctic Wolf Networks
  • speaker photo
    Brian Coulson
    Principal Threat Research Engineer, LogRhythm

    As Principal Threat Research Engineer in LogRhythm Labs, Brian works to keep abreast of current cyberthreats and news, develop threat detection and response content, and demonstrate how we detect and respond to threats. In this role, he regularly engages with the LogRhythm Community and offers advice and solutions to remediate common security...

  • speaker photo
    Lynne Fistori
    Field & Channel Marketing Manager, Palo Alto Networks
  • speaker photo
    Sajed Naseem
    CISO, New Jersey Courts

    Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters...

  • speaker photo
    Chandler Howell
    Director of Engineering Services, Nexum, Inc.
  • speaker photo
    Erich Kron
    Security Awareness Advocate, KnowBe4

    Erich Kron is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical i...

  • speaker photo
    Mike Stacy
    Sr. Director, Enterprise Security Strategy, Proofpoint

    Mike works with customers and oversees technical strategy for areas which include cloud security, advanced email defense, SOAR, browsing security, and SDP. Prior to joining Proofpoint, Mike held numerous technical leadership and product strategy roles across a variety of solutions.

  • speaker photo
    Chris Poulin
    Director, Technology & Strategy / Deputy CTO, BitSight

    Chris is Director of Technology & Strategy, as well as the Deputy CTO, at BitSight Technologies, guiding enterprises in assessing risk metrics and managing third-party relationships. He's been in cybersecurity for over 35 years, in both technical roles as a developer for the DoD intelligence community, and in executive positions, such as CSO ...

  • speaker photo
    Terry Ray
    SVP, Strategy and Imperva Fellow, Imperva

    Terry Ray is the SVP and Imperva Fellow for Imperva Inc. As a technology fellow, Terry supports all of Imperva’s business functions with his years of industry experience and expertise. Previously he served as Chief Technology Officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well ...

  • speaker photo
    Sudeep Venkatesh
    Chief Product Officer, Egress Software Technologies Ltd

    Sudeep Venkatesh is a noted expert on data protection, bringing two decades of industry and technology experience in this area. His expertise spans the protection of data in both structured and unstructured data ecosystems, with an emphasis on solving real-world business problems through encryption, authentication and key management. He has a...

  • speaker photo
    Allyn Crowe
    Sr. Security Engineer, Nexum, Inc
  • speaker photo
    Jayson Salazar
    Sr. Security Automation Engineer, GitLab Inc.

    Former software engineer and penetration tester, nowadays Sr. Security Automation Engineer at GitLab.

  • speaker photo
    George J. Smith
    Sr. Security Consultant, Gigamon

    George has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down ...

  • speaker photo
    Meera Rao
    Sr. Director, Product Management, Synopsys

    Ms. Meera Rao is a Senior Director of Product Management, focusing on DevOps solutions at Synopsys, Inc. Ms. Meera has over 20 years of experience in software development organizations in a variety of roles including Architect, Lead Developer, and Project Manager, and Security Architect. Ms. Meera has been working as a trusted adviser to Fort...

  • speaker photo
    Brendan Miles
    Sr. Sales Engineer - New England & Upstate NY, SentinelOne
  • speaker photo
    Brad Thompson
    Regional Sales Manager, SentinelOne
  • speaker photo
    Morgan Wright
    Chief Security Advisor, SentinelOne

    Morgan is an internationally recognized expert on cybersecurity strategy, cyberterrorism, national security and intelligence. He currently serves as Chief Security Advisor for SentinelOne, Senior Fellow at The Center for Digital Government, and is the chief technology analyst for Fox News and Fox Business. Morgan's landmark testimony before C...

  • speaker photo
    Gary Buonacorsi
    SLED CTO & Chief IT Architect, Tanium
  • speaker photo
    Belinda Enoma, CIPP/US
    Founder & Writer, istartandfinish.com

    Belinda Enoma is a privacy and cybersecurity consultant with a legal and technology background. She offers virtual privacy and cybersecurity services including risk mitigation solutions and building privacy programs from scratch. She is a writer, corporate trainer, lifestyle strategist, mentor, and coach to women in the cybersecurity and data...

  • speaker photo
    Roger Grimes
    Data-Driven Defense Evangelist, KnowBe4

    Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bach...

  • speaker photo
    Nimmy Reichenberg
    CMO, Siemplify

    Nimmy Reichenberg oversees strategy and marketing for Siemplify, the leading independent provider of Security Orchestration, Automation, and Response (SOAR). A cybersecurity industry veteran, Nimmy has more than 15 years of experience helping enterprises around the world tackle their security challenges. Nimmy started his careers as a securit...

  • speaker photo
    Riley Bruce
    Security Community Evangelist, Manager, Code42

    Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with...

  • speaker photo
    Justin Wynn
    Sr. Security Consultant, Coalfire

    As a Senior Security Consultant, Justin Wynn is responsible for actively compromising and reporting on virtual environments typically encountered at Fortune 500 companies. Justin performs wireless, physical, red team and social engineering engagements. Justin also conducts research to include the production of open-source models for printing/...

  • speaker photo
    Gary DeMercurio
    Directing, Center of Excellence for Red Team, Social Engineering, and Physical Penetration Testing, Coalfire

    Gary DeMercurio runs one of the largest groups in Coalfire Labs as a Director, where he leads Coalfire’s “Center of Excellence” for Red Teaming, Social Engineering and Physical Penetration. At Coalfire, Gary manages day-to-day business involved with FedRAMP, PCI, HIPPA, and penetration testing, while helping to spearhead the physical and soci...

  • speaker photo
    Matt Smith
    Director of Solutions Engineering, BeyondTrust
  • speaker photo
    Amber Vanderburg
    Founder, The Pathwayz Group

    Amber Vanderburg is a multi award winning international businessperson, keynote speaker, and founder of The Pathwayz Group. In 2016, she left her job in corporate HR to become the only female, only American, and only blonde Academy elite football coach for the Adidas Gameday Academy/Paris Saint Germain Academy in Bangalore, India. She worked ...

  • speaker photo
    Brian Vecci
    Field CTO, Varonis

    As Field CTO at Varonis, Brian supports a wide range of security and technology initiatives by helping Varonis’ customers and partner get the most out of the company’s products. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecuri...

  • speaker photo
    Dave Presuhn
    Sr. Security Engineer, Boston Scientific

    Dave has been working in IT since the last millennium. In his current role, he manages the device management system for medical devices. He has worked primarily in healthcare throughout his IT career.

  • speaker photo
    Anthony Baer
    Solution Architect, Sonatype
  • speaker photo
    Sam Gillespie
    Offering Manager, OneTrust DataGovernance, OneTrust
  • speaker photo
    Keith Buswell
    Sr. Sales Engineer, Exabeam
  • speaker photo
    Brian Anderson
    Director of Technology, Office of the CTO, Imperva

    Brian Anderson has over 16 years' experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactiona...

  • speaker photo
    VJ Viswanathan
    Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory & strategic consulting firm delivering solutions to public and private sectors. He also serves as...

  • speaker photo
    Mark Sangster
    Vice President and Industry Security Strategist, eSentire

    Mark Sangster is the author of "NO SAFE HARBOR: The Inside Truth About Cybercrime and How to Protect Your Business." He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference, and author on various subjects related to cybersecurity. His thought provoking work and per...

  • speaker photo
    Jason Georgi
    Global Field CTO, Prisma Access, Palo Alto Networks

    Jason is an accomplished technology executive with over 25 years of experience driving innovation and transformation initiatives across global organizations. Jason collaborates with CIOs, CTOs, and other technology leaders on strategies aimed at enabling business outcomes.

    Jason is currently the Global Field Chief Technology Officer fo...

  • speaker photo
    Eric Bodkin
    Director, Endpoint Recovery Services, CrowdStrike

    Eric Bodkin leads the delivery of Endpoint Recovery Services for CrowdStrike. Based out of the greater Denver area, Eric leads service engagements focused on the rapid recovery and remediation of endpoints in response to a cyber incident. Eric has more than 15 years of experience in incident response, forensic investigation, cybersecurity ope...

  • speaker photo
    Jonathan Echavarria
    Enterprise Architect, ReliaQuest

    Jonathan Echavarria is an Enterprise Architect at ReliaQuest that has spent his career building and breaking a variety of environments. In his current role, Echavarria leverages this experience to orchestrate business strategy alignment with technological enablement. During his time at ReliaQuest, Jonathan has held various positions with resp...

  • speaker photo
    Chris Pittman
    Senior Manager, Sales Engineering, BlackBerry

    Chris Pittman has worked in enterprise information technology since 1993 and has specialized in cyber security for the last 14 years. He worked in security and controls and incident response for the Ford Motor Company before moving to the security vendor space in 2008. As a sales engineer at BlackBerry Cylance, he provides technical and secur...

  • speaker photo
    Rori Perkins
    Senior Manager, InfoSec Awareness and Analytics, Columbia Sportswear

    Rori is an expert in organizational change management with a focus on security awareness and driving human behavior.

  • speaker photo
    Lonnie Benavides
    Head of Infrastructure and Application Security, OneLogin

    Lonnie Benavides is an accomplished cybersecurity leader with more than 20 years' industry experience, and is currently the Head of Infrastructure and Application Security at OneLogin. Lonnie began his career as a communications encryption specialist in the U.S. Air Force, and went on to conclude his military service as a Technical Lead of th...

  • speaker photo
    Alex Sorokunov
    Sr. Presales System Engineer, Arctic Wolf Networks
  • speaker photo
    Brennan O'Brien
    Director, Information Security, Risk & Compliance, Columbia Sportswear

    Brennan is the head of Information Security for Columbia Sportswear Company and a 20-year veteran of cybersecurity in verticals including apparel, logistics, healthcare, and financial services.

  • speaker photo
    Paul Rich
    Executive Director, Data Management & Protection, JPMorgan Chase

    Paul Rich joined JPMorgan Chase & Co. in 2019 as Executive Director, Data Management & Protection, with the mission of tackling the management of all unstructured data within the company. Paul is passionate about data security, privacy, principle-based design and goal-setting, and has over thirty years of technology experience. During the mor...

  • speaker photo
    Mike DeNapoli
    Sr. Solution Architect, Cymulate

    Mike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners k...

  • speaker photo
    Nigel Thompson
    Vice President, Solutions Marketing, BlackBerry

    Nigel Thompson is responsible for the product position and messaging of BlackBerry® Spark. He is a regular thought leadership speaker, experienced on topics impacting governments and businesses worldwide, including cybersecurity trends, workflow reformation and harnessing IoT to accelerate digital transformation.

    As BlackBerry has tr...

  • speaker photo
    Jeremiah Sahlberg
    Managing Director - Federal, Third Party Risk, Tevora

    Jeremiah Sahlberg has more than 20 years of security experience. Sahlberg is an executive security consultant and advises clients on establishing security programs and compliance management. He holds CISSP, CISM, PCI QSA and HITRUST certifications.

    Previously, Sahlberg held the Senior Director of Protect Operations at NBCUniversal a...

  • speaker photo
    David Hawkins
    Director, Consulting Engineer, BitSight

    David Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.

    On the Info...

  • speaker photo
    Bryan Magoffin
    Sr. Security Architect, Check Point Software Technologies
  • speaker photo
    Sherry Callahan
    CISO, Dairy Farmers of America
  • speaker photo
    Brian Robison
    Chief Evangelist & Sr. Director, Product Marketing, BlackBerry

    Brian Robison is the Senior Director, Product Marketing and Chief Evangelist at BlackBerry (formerly Cylance), where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after an attack. With over 20 years' of cybersecurity experience, Robison is a regular sp...

  • speaker photo
    Zuri Cortez
    Principal Solutions Engineer at Alert Logic, Alert Logic
  • speaker photo
    Israel Barak
    CISO, Cybereason
  • speaker photo
    Kevin Bocek
    VP, Security Strategy & Threat Intelligence, Venafi

    Kevin Bocek is a leading subject matter expert in machine identity protection. With more than 16 years in the IT security industry, Kevin has been featured in The Wall Street Journal, The New York Times and The Washington Post, among many others. Before joining Venafi in 2012, Kevin spent almost two decades working for several leading IT secu...

  • speaker photo
    Tom Watson
    Channel Chief Advisor, NinjaRMM
  • speaker photo
    Renee Tarun
    Deputy CISO, Fortinet
  • speaker photo
    Peter Klimek
    Director of Technology - Office of the CTO, Imperva
  • speaker photo
    Katrina Watts
    Cyber Security Threat Analyst, Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC)

    Katrina Watts works as a Threat Analyst with the ONG-ISAC and focuses on curating and sharing qualitative intelligence related to cyber threats to the oil and natural gas supply chain. Prior to joining the ONG-ISAC, Katrina worked as an Incident Response Analyst for a mid-size corporation and separately as a contractor. Additionally, Katrina ...

  • speaker photo
    Travis Herrmann
    Information Security Advisor, Devon Energy Corporation

    Travis has been with Devon Energy for 20 years, being a pioneering member of the Information Security team. Currently, Travis supports the Incident Response, Hunt, and Intelligence functions at Devon, serves on the ONG-ISAC Information Sharing committee, and holds multiple industry security certifications.

  • speaker photo
    Dr. Shaneé Dawkins
    Computer Scientist, Visualization and Usability Group, National Institute of Standards and Technology (NIST)

    Dr. Shaneé Dawkins is a Computer Scientist in the Visualization and Usability Group at the National Institute of Standards and Technology (NIST). She performs research focusing on human centered design and leads the NIST Phish Scale research effort. Shaneé received her M.S. and Ph.D. in Computer Science at Auburn University, and B.S. in Compu...

  • speaker photo
    Ansh Patnaik
    Head of Product Marketing, Google Cloud Security

    Ansh Patnaik, former Chief Product Officer for Chronicle, is now the head of product marketing for Google Cloud Security. Previously, he was VP of Product Management at Oracle where he defined and launched their Security Analytics Cloud service. Over the last 20 years, Ansh has held product management, marketing and sales engineering roles at...

  • speaker photo
    Svetla Yankova
    Head of Customer Experience Engineering, Chronicle
  • speaker photo
    Adam Gates
    Sr. Sales Engineer, Malwarebytes

    With over 20 years of experience in technology, Adam Gates serves as a senior technical member of Malwarebytes Field Sales Team providing support for customers in North America. Prior to Malwarebytes, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, and Mimecast. Adam lives in Dalla...

  • speaker photo
    Mitch Spaulding
    Solutions Engineer, Okta
  • speaker photo
    Lisa Wallace
    Sales Engineer, FireMon
  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Litigation Team Lead, Octillo Law

    Myriah Jaworski leads Octillo Law's Privacy Litigation Team, where she represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah a...

  • speaker photo
    Stuart Wagner
    Sr. Director, IT Security & Compliance at Enterprise Products, Chairman, ONG-ISAC

    Stuart served as a Board Member of ONG-ISAC for over five years and became Chairman in June 2018. He has attended the FBI CISO Academy, has served as President of the award-winning South Texas Chapter of the Information Systems Security Association (ISSA), and is a member of ISACA and InfraGard. Stuart has developed and led information securi...

  • speaker photo
    Angela Haun
    Executive Director, ONG-ISAC

    Angela Haun became the Executive Director of the Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC) in September 2018. Ms. Haun joined the ISAC after a 20-year career as a Special Agent with the FBI. She brought extensive experience in cybersecurity and protecting critical assets from her work at the FBI, along with her le...

  • speaker photo
    Brad Beutlich
    Vice President, Western and LATAM Sales, Entrust

    Brad Beutlich is an information security professional who has worked with numerous U.S. based companies over the past 20 years, providing security solutions ranging from end-point to data security. The last 13 years, he has worked for Entrust providing security solutions that protect customer data, financial transactions, and IoT device manuf...

  • speaker photo
    Matt Hubbard
    Sr. Technical Product Manager, Armis
  • speaker photo
    Karen Lancon
    Business Information Security Manager, Wood.
  • speaker photo
    Sivan Tehila
    Director of Solution Architecture, Perimeter 81

    Sivan Tehila is the Director of Solution Architecture at Perimeter 81, a leading Secure Access Service Edge (SASE) provider, and a cybersecurity expert with over 14 years of industry experience. Sivan served in the IDF as an Intelligence Officer and then in various field positions, including Information Security Officer, CISO of the Research ...

  • speaker photo
    Chase Massar
    Professional Sales Engineer, Alert Logic
  • speaker photo
    Ryan Archer
    Sr. Sales Engineer, Arctic Wolf Networks
  • speaker photo
    Christopher Hass
    Director of Information Security and Research, Automox

    Chris Hass is an extremely driven and proven information security professional with extensive experience in Malware Reverse Engineering, Threat Intelligence, and Offensive Security Operations. In his current role, Chris serves as Director of Information Security and Research at Automox. In addition to being a former cybersecurity analyst for ...

  • speaker photo
    Julia Voo
    Cyber Fellow, Harvard Kennedy School, Belfer Center for Science and International Affairs

    Julia Voo is a Cyber Fellow and leads the team behind Belfer's National Cyber Power Index. She was formerly the Research Director for the China Cyber Policy Initiative.

    Her areas of research concern geotech strategy including the Digital Silk Road, industrial policy, and technical standards for strategic technologies.

    Voo has re...

  • speaker photo
    Tony Anscombe
    Chief Security Evangelist, ESET

    Tony Anscombe is Global Security Evangelist and Industry Partnerships Ambassador for EST, where he serves to increase ESET’s public awareness initiatives and strengthen relationships with new and existing partners.

    Anscombe joined ESET from Avast (which acquired his former employer AVG) where he held the title of Senior Security Evange...

  • speaker photo
    Tom Utley
    Sr. Presales Systems Engineer, Arctic Wolf

    Tom Utley is a senior presales systems engineer with Arctic Wolf Networks based out of the Charlotte area. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer and solution archite...

  • speaker photo
    Allan Liska
    Sr. Security Architect, Recorded Future

    Allan Liska is a senior security architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security pos...

  • speaker photo
    Michael Doyle
    Principal Consultant, Secure Development Practice Lead, Synopsys
  • speaker photo
    Dwayne Dreakford
    Solutions Architect, Sonatype
  • speaker photo
    Richard Melick
    Sr. Technical Product Marketing Manager, Automox

    Richard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.

  • speaker photo
    Etay Maor
    Chief Security Officer, IntSights

    Etay Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in...

  • speaker photo
    Gina Scinta
    Sr. Solutions Architect, Thales

    Gina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the IT profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data usin...

  • speaker photo
    Rick Holland
    CISO and VP of Strategy, Digital Shadows

    Rick has more than 15 years' experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently co-chair ...

  • speaker photo
    Chris Goettl
    Sr. Director, Product Management, Ivanti

    Chris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events...

  • speaker photo
    Lee Psinakis
    Cloud Security Sales Specialist, Check Point Software Technologies

    Lee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.

    Before joining Check Point, Lee held Sales, Management and Business...

  • speaker photo
    Eric Skinner
    VP, Strategy, Trend Micro

    Eric Skinner is VP of Market Strategy at Trend Micro, helping shape Trend’s solution offerings, growth plans and go-to-market approach. Previously at Trend Micro, Eric has been responsible for global product marketing. Prior to Trend Micro, Eric held senior management positions in a health care mobile startup and at digital identity solutions...

  • speaker photo
    Tim O'Connor
    Manager of Knowledge Services, Cadre Information Security

    Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including PCI-QSA, CISA, CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written...

  • speaker photo
    James Ellis
    Detective First Lieutenant, Commander, Michigan Cyber Command Center (MC3), Michigan State Police

    Detective First Lieutenant Jim Ellis is the commander of the Michigan State Police Cyber Section within the Intelligence Operations Division. He leads a cyber team of 56 MSP members located at 7 offices throughout Michigan. He has oversight over the Michigan Cyber Command Center (MC3), Computer Crimes Unit (CCU), and the Michigan region of th...

  • speaker photo
    Edward Roberts
    Director of Product Marketing, Imperva

    Edward Roberts leads Product Marketing for Imperva Advanced Bot Protection. Prior to Imperva he led marketing at Distil Networks and has over twenty years of experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Softw...

  • speaker photo
    Ran Rosin
    Director, Product Management, Imperva

    Ran Rosin Joined Imperva two years ago and is currently leading the Cloud Data Security solution. Prior to joining Imperva, Ran founded and lead two start-ups in the area of mobile Application and IoT.

  • speaker photo
    Phillip Wylie
    Lead Curriculum Developer, Point3 Federal

    Phillip Wylie is the Lead Curriculum Developer for Point3 Federal, Adjunct Instructor at Dallas College, and The Pwn School Project founder. With over 22 years of experience, he has spent the last eight plus years as a pentester. His passion for mentoring and education inspired him to start teaching and to found The Pwn School Project, a bi-m...

  • speaker photo
    Tod Beardsley
    Director of Research, Rapid7

    Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, ...

  • speaker photo
    Glenn Kapetansky
    CSO, Trexin Consulting

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...

  • speaker photo
    Thomas Blade
    Presales System Engineer, Arctic Wolf
  • speaker photo
    Ryan Gritt
    Solutions Architect, ReliaQuest
  • speaker photo
    Myla Pilao
    Director, Technology Marketing, Trend Micro
  • speaker photo
    Moderator: Susan St. Clair
    Director, WhiteSource
  • speaker photo
    Eric Wolff
    Sr. Product Marketing Manager, Cloud and App-layer Data Protection, Thales Cloud Security

    Eric Wolff is a Senior Product Marketing Manager for Thales application-layer data protection and solutions for public cloud security. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications, a...

  • speaker photo
    Jonathan Nguyen-Duy
    VP, Global Field CISO Team, Fortinet
  • speaker photo
    Kevin Dillaway
    Cloud Security Architect, Optiv
  • speaker photo
    Sami Laine
    Director, Technology Strategy, Okta
  • speaker photo
    Kelsey Nelson
    Sr. Product Marketing Manager, Okta

    Kelsey Nelson is a Senior Product Marketing Manager at Okta, leading workforce IT and security solutions, including getting beyond the buzzword of "Zero Trust." Prior to joining Okta, she led product and business communications at tech startups varying from enterprise software to edtech to consumer music hardware, and prior to that taught sec...

  • speaker photo
    David Masson
    Director of Enterprise Security, Darktrace

    David Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various u...

  • speaker photo
    Susan Hanson
    Vice President, Human Resources, Provation Medical

    Susan has over 20 years of healthcare experience in Human Resources and Compliance. Susan joined the Provation team in 2017 and brings her experience of building and growing high-performing teams with a dynamic, results-oriented culture and strong leadership. Susan also has experience in healthcare compliance specifically in HIPAA and HITECH ...

  • speaker photo
    Paul Lanzi
    Co-Founder & COO, Remediant

    Paul Lanzi, is the co-founder and COO of Remediant. Remediant is a cybersecurity startup focused on delivering a new approach Privileged Access Management. Paul and his co-founder at Remediant, Tim Keeler, worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At eac...

  • speaker photo
    Mark Spencer
    Regional Sales Manager and Account Executive, AccessIT Group
  • speaker photo
    Adam Waltman
    Sr. Sales Engineer, Malwarebytes

    Adam has over 20 years of experience in technology and serves as a senior technical member of the Malwarebytes field sales organization, providing expertise to customers in the Eastern U.S. Prior to joining Malwarebytes almost 5 years ago, Adam’s travels took him from various operational roles to other pre-sales engineering roles with Symante...

  • speaker photo
    Eddie Doyle
    Global Security Strategist, Check Point Software Technologies

    Edwin Doyle communicates with international leaders in cybersecurity, cyber forensics, and cyber law enforcement, across the world. Taking best practices for threat mitigation from the industry’s finest CISOs and from police and military cyber command, Edwin’s responsibilities include sharing cyber defense tactics with media, government agenc...

  • speaker photo
    Moderator: Tom Brennan
    CIO/CTO, Mandelbaum Salsburg P.C.
  • speaker photo
    Andre Alves
    Cloud Security Architect, Trend Micro

    Andre Alves has been helping companies to achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a certified AWS Solutions Architect and Hybrid Cloud Security trainer.

  • speaker photo
    Nathan Wenzler
    Chief Security Strategist, Tenable, Inc.

    Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing, and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new ...

  • speaker photo
    Martyn Crew
    Director of Product Marketing Management, Gigamon
  • speaker photo
    Gurinder Bhatti
    Sr. Sales Engineer, Okta
  • speaker photo
    Somer Hernandez
    Solutions Architect, ReliaQuest
  • speaker photo
    John Davies
    Sr. Presales Systems Engineer, Arctic Wolf
  • speaker photo
    Dean Gross
    Identity and Security Architect, Insight
  • speaker photo
    Kazbek Khumush
    Trend Micro
  • speaker photo
    Brian Rossmeisl
    Sr. Security Architect, AccessIT Group
  • speaker photo
    Bob Pacheco
    Principal Risk Management Architect, Eurofins
  • speaker photo
    Joseph Acosta
    Director, Security Operations, Delta Risk
  • speaker photo
    Marc Keating
    Security Evangelist, Arctic Wolf
  • speaker photo
    Richard Schunk
    Major Accounts Systems Engineer, Palo Alto Networks
  • speaker photo
    Mike Lloyd
    CTO, RedSeal Networks

    Dr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-...

  • speaker photo
    James Sheldrake
    Enterprise Sales Engineer, Egress Software Technologies Ltd
  • speaker photo
    Kevin Romero
    Sales Engineer, ReliaQuest
  • speaker photo
    Kevin Kennedy
    Sr. Sales Engineer, Malwarebytes
  • speaker photo
    Nick DeLena
    Principal, IT Risk Assurance & Advisory, DGC (DiCicco, Gulman & Company)
  • speaker photo
    Mark Ostrowski
    Head of Engineering, East US, Check Point Software Technologies

    Mark Ostrowski is the Head of Engineering for the East region of US at Check Point Software Technologies. Mark has over 20 years' experience in IT security and has helped design and support some of the largest security environments in the country. As an evangelist at Check Point Software, Mark provides thought leadership for the IT security i...

  • speaker photo
    Davitt J. Potter
    Director, MSSP and Channels, Americas, Digital Shadows

    Born and raised in the Black Hills of South Dakota, Davitt has over 25 years of experience in the OEM, VAR & MSSP channels realm. From starting as a field services engineer fresh from school at the South Dakota School of Mines and Technology, and eventually defining and managing IT operations and strategy for numerous companies in a CTO capac...

  • speaker photo
    Michael Lopez
    Director of Cloud Services, AccessIT Group

    Mike Lopez, Director of Cloud Services at AccessIT Group, has a history of designing cloud architecture with a security focused approach for government and fortune 500 clients. He has worked with private and public cloud environments including AWS, Azure, Oracle, and Google Cloud. Mike leads AccessIT Group’s Cloud practice by helping its cust...

  • speaker photo
    Marc Ybarra
    Distinguished Solutions Engineer - North America, Alert Logic
  • speaker photo
    Erika Barber
    Director of Compliance and Privacy, Boston Medical
  • speaker photo
    Gillian Lockwood
    Enterprise Information Security Program Administration and Governance, Partners Healthcare
  • speaker photo
    Brian Carey
    Manager, Advisory Services, Rapid7

    Brian Carey is a Rapid7 Manager of Advisory Consulting, specializing in: Security Program Assessments, Security Program Development, Risk Management, Vulnerability Management Program Development, Security Awareness and Policy Development. Before joining Rapid7 Brian was Information Security Director and interim Security Officer at LafargeHolc...

  • speaker photo
    Adam Winn
    Product Manager, Cisco Umbrella, Cisco

    Adam Winn is the platform product management lead for Cisco Umbrella. He got into cloud security product management in 2013 and never looked back. In 2016, he joined OpenDNS shortly before it was rebranded as Cisco Umbrella. He is a life-long California resident and a fan of live music (and can't wait for it to come back).

  • speaker photo
    Yuk Fai Chan
    Co-Leader, OWASP Toronto Chapter

    Yuk Fai Chan is Co-Leader of the OWASP Toronto chapter, where he actively promotes software security within the Toronto community. Professionally, Yuk Fai is a Co-Founder at Proack Security Inc., a Toronto-based information security consulting firm. He specializes in application security, penetration testing, threat modelling, security incide...

  • speaker photo
    Bobby Modha
    Security Consultant, Security Compass

    Bobby Modha is a Security Consultant with Security Compass. He specializes in security assessments in the application security space including web application, APIs and mobile app penetration testing. In his spare time, Bobby enjoys working on personal projects such as developing scripts and participating in capture-the-flags.

  • speaker photo
    Keyaan Williams
    Founder and Managing Director, CLASS, LLC
  • speaker photo
    Melvin Crum
    Computer Scientist - Informatics, Centers for Disease Control & Prevention
  • speaker photo
    Jeremy Castleman
    Cloud Security Specialist, Check Point Software Technologies

    Jeremy Castleman is the Cloud Security Specialist supporting the Cloud Team for Check Point Software Technologies. Jeremy brings 15 years of experience in technology sales, marketing, business development and cloud migration services in the partner ecosystem. He has worked in multiple countries around the world, in various markets, and across...

  • speaker photo
    Achint Sehgal
    Global Head of Solutions Engineering, OneTrust

    Achint Sehgal, CIPP/E, CIPM, serves as a Global Head of Solutions Engineering for OneTrust Vendorpedia—a purpose-built software designed to operationalize third-party risk management. In his role, Sehgal advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, fra...

  • speaker photo
    Ernest Dunn
    Regional Partner – Mid Atlantic, GuidePoint Security
  • speaker photo
    Eric Mims
    Director, Enterprise IT Security & CISO, University of Houston
  • speaker photo
    Greg Thompson
    CISO & VP, Manulife
  • speaker photo
    Robert Wong
    Executive Vice-President, Chief Information Officer, Toronto Hydro

    Robert Wong is EVP & CIO at Toronto Hydro, responsible for information technology, operational technology, cyber security, and telecommunications. Robert was also Chief Risk Officer, responsible for corporate enterprise risk management, strategic planning, corporate governance, and business continuity.
    Robert is on the Board of Directo...

  • speaker photo
    Lois Tullo
    Executive in Residence, Global Risk Institute; CFRO/CCO, Novera Capital, Risk Management Faculty, Schulich School of Business, York University
  • speaker photo
    GuidePoint Security
  • speaker photo
    Nick Ritter
    CISO, First Financial Bank

    Nick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost...

  • speaker photo
    Kai Pfiester
    Founder & Chief Security Architect, Black Cipher Security
  • speaker photo
    James Goepel
    Treasurer and Member, Board of Directors, Cybersecurity Maturity Model Certification (CMMC) Accreditation Body

    James Goepel is Treasurer and Member, Board of Directors for the CMMC-AB. He is also an adjunct professor of Cybersecurity at Drexel University and CEO of Fathom Cyber, a trusted agent for senior management and developer of defensible cybersecurity strategies. Jim earned his BSECE from Drexel and his JD and LLM degrees from George Mason Unive...

  • speaker photo
    Edward Ettorre
    Operational Risk Consultant, Wells Fargo

    Ed is an Operational Risk Consultant working within the Technology Information Security group. He has been with Toastmasters International (TMI) since 1997 and has multiple certifications from TMI. Ed is a resourceful, creative, and solution-oriented person who was frequently able to come up with new and innovative approaches to his assigned ...

  • speaker photo
    Devon Campbell
    Digital Forensic Examiner, TransPerfect Legal Solutions

    Devon Campbell is a Digital Forensic Examiner at TransPerfect Legal Solutions in the Forensic Technology and Consulting division. Devon has experience conducting forensic examinations of mobile devices, computers, social media data, cloud-based data, and email data. Prior to joining TransPerfect Legal Solutions, Devon earned her Master's degr...

  • speaker photo
    Christina Griffin
    IT Security and Risk Manager, Chatham Financial

    Cybersecurity professional specializing in risk management and information security. She holds an MBA, a master’s in information technology leadership, and also has a CISSP certification. She has professional experience working in both higher education and finance industries and is currently employed as an IT Risk and Security Manager at Chat...

  • speaker photo
    Tedrick Housh
    Partner, Lathrop GPM LLP

    Tedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the ...

  • speaker photo
    Steve Hengeli
    Attorney at Law, Polsinelli

    With a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technolog...

  • speaker photo
    Nan L. Grube
    Consulting Attorney, PBL Consulting

    Owner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandabl...

  • speaker photo
    Scott Laliberte
    President, ISSA Delaware Valley Chapter

    Scott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Scott also leads Protiviti’s Emerging Technology practice where he enables clients to leve...

  • speaker photo
    Brice Taylor
    Special Agent, FBI
  • speaker photo
    Jason Patel
    Chief Technology Officer, Ensighten

    As Chief Technology Officer Jason leads the Product and Engineering teams at Ensighten. Being part of Ensighten’s development team over six years ago when the Tag Management Platform was first designed gives him a unique perspective and experience on all our solutions; he has hence been influential in designing and implementing the majority o...

  • speaker photo
    Sunny Notani
    Special Agent, United States Secret Service

    Sunny Notani has worked as a Special Agent for the United States Secret Service for 18 years. SA Notani was initially assigned to the New York Field Office (NYFO) for eight years. During his time in the NYFO, SA Notani specialized in Financial Institution Fraud, Electronic Crimes, Network Intrusions, and Social Engineering. SA Notani was assi...

  • speaker photo
    RJ Sudlow
    IT Advisory Manager, Dixon Hughes Goodman LLP
  • speaker photo
    Steve Magowan
    Director, Data Protection and Resiliency, Royal Bank of Canada

    Steve Magowan is Director of Data Protection with the Royal Bank of Canada. A Veteran of the Canadian Airforce, since retiring Steve has spent the past 20 years engaged in a wide assortment of Risk Focused, Data Protection, Security Architecture & Enterprise Risk Management initiatives.

    Including the remediation of active security...

  • speaker photo
    MJ Couldridge
    Director, Business Development, Canadian Cyber Threat Exchange

    MJ Couldridge is the Director of Business Development for the Canadian Cyber Threat Exchange. The CCTX is Canada’s threat sharing hub for all companies doing business in Canada. It provides analysis and enables collaboration of cyber security insights impacting Canada. Providing both a cross-industry and by-industry context, it serves small, ...

  • speaker photo
    Sabrina Stanich
    Cybersecurity Manager, Darktrace

    Sabrina Stanich is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from financial services to manufacturing, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting an...

  • speaker photo
    Will Mishra
    Cybersecurity Manager, Darktrace

    Will Mishra is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autono...

  • speaker photo
    Taylor Lehmann
    CISO, athenahealth

    Taylor Lehmann is the VP and Chief Information Security Officer at athenahealth, a healthcare information technology organization with headquarters in Watertown, MA and operations around the world. Taylor has been in information security and risk management for over 15 years. He was most recently the CISO at Wellforce, an eastern MA-based, Tu...

  • speaker photo
    Myles Kellerman
    Chief Cybersecurity Analyst, Alpine Security

    Myles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many ...

  • speaker photo
    Lauren Provost
    Professor, Computer Science, Western Governors University

    Dr. Lauren E. Provost is an ethical hacker, author and professor. She directs The Ethical Hackers Cybersecurity organization, a virtual community for educators and industry providing comprehensive planning and risk management updates, network and cloud security knowledge and information on other cybersecurity topics such as general penetratio...

  • speaker photo
    Sam Rastogi
    Product Marketing Director, Illumio

    Sam Rastogi is a veteran of the security industry with 18+ years experience marketing leading security products at Illumio, Palo Alto Networks, Cisco Systems, HP Enterprise, McAfee, Juniper Networks, and Oracle. Sam is a Product Marketing Director at Illumio, where he is responsible for leading go-to-market and marketing activities for zero t...

  • speaker photo
    Leland Dean
    VP, Global Corporate Security, Bank of New York Mellon

    Leland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).

    Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal ...

  • speaker photo
    Nathan Wilcox
    Sr. Security Architect, GuidePoint Security
  • speaker photo
    Patrick Keenan
    Principal Security Engineer, GuidePoint Security

    Splunk Master Flex

  • speaker photo
    Torry Crass
    Agency CISO, N.C. State Board of Elections

    Torry Crass currently serves as the Agency CISO at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.

    Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry was a CI...

  • speaker photo
    Brian Neesby
    CIO, N.C. State Board of Elections

    Brian Neesby is the CIO of the State Board of Elections. Prior to this role, he was the Chief Data Officer. Brian has served as a fact witness, been deposed several times, and executed declarations on behalf of the State Board concerning his knowledge of North Carolina’s Statewide Voter Registration Database. He investigated data discrepanc...

  • speaker photo
    Michael Dickerson
    Director, Mecklenburg County Board of Elections

    Michael Dickerson is currently the Director of Elections for Mecklenburg County and has held this position since 1998.
    Prior to coming to Charlotte, Mr. Dickerson was with the Federal Election Commission as a Deputy Assistant Staff Director. Mr. Dickerson spent 14 years at the Federal Election Commission.

    Currently he is a membe...

  • speaker photo
    Karen Brinson Bell
    Executive Director, N.C. State Board of Elections

    Karen Brinson Bell was appointed executive director of the State Board of Elections on May 13, 2019, and began her tenure on June 1. As the state’s chief elections official, she leads about 70 full-time employees at the state agency, which is charged with administering elections and overseeing the 100 county boards of elections, as well as ca...

  • speaker photo
    Patrick Gannon
    Public Information Officer, N.C. State Board of Elections

    Patrick Gannon has been the public information officer at the State Board of Elections since October 2016, just before the presidential election. He came to the State Board after a 17-year career in journalism, most recently as editor of The Insider State Government News Service and syndicated columnist covering state politics for the Capitol...

  • speaker photo
    Boris Vishnevsky
    Board Member and Technology Strategist, Cloud Security Alliance - Delaware Valley (CSA-DV)

    Boris Vishnevsky, MBA, CISSP, DIA is a board member and advisor of the Cloud Security Alliance- Delaware Valley Chapter, Distinguished IT Architect of the Open Group and is a frequent speaker and presenter, taking part in review panels and advising innovative Cyber Security Companies. Mr. Vishnevsky is a solutions principal advising companie...

  • speaker photo
    Marc Tabago
    Solutions Engineer, Trend Micro

    As a Solutions Engineer, Marc Tabago works with enterprises to solidify and strengthen their digital security policies against malicious threat actors. However, he believes that having a concrete digital security posture starts at the use case level, driven and experienced by its users and not simply read off a PowerPoint slide. Once the dust...

  • speaker photo
    Justin Bourgeois
    Sales Engineer, Mimecast

    Justin Bourgeois is a Solution Engineer at Mimecast. He has a background in implementation project management, IT consulting and has spent his off time programming as a hobby. Justin’s main responsibility is educating people about the ever-evolving threat landscape that not only threatens their infrastructure but also their partners and the g...

  • speaker photo
    Joe Zurba
    CISO, Harvard Medical School

    In his role as the leader of Information Security at Harvard Medical School, Joe Zurba has been responsible for defining and building capabilities to meet the requirements of an extraordinarily diverse community of clinical and research faculty, students, and staff. Joe develops strategy, improves capabilities, and manages risk for all inform...

  • speaker photo
    Michael Anaya
    Supervisory Special Agent, Cyber, FBI (Prior)

    Michael is the Head of Cyber Risk at Expanse (one of Forbes' 25 fastest-growing venture-backed startups likely to reach a $1 billion valuation). He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies' and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent...

  • speaker photo
    Tony Howlett
    CISO, SecureLink

    Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP and GNSA certifications, and a B.B.A in Management Information Systems. Tony is curre...

  • speaker photo
    Ian Woolley
    Chief Revenue Officer, Ensighten

    Ian’s impressive background and management expertise in digital marketing and advertising are fueling his success in driving adoption of Ensighten’s solutions worldwide. Ian started his career at Dun & Bradstreet Europe before working at Interpublic Group’s Draft Digital as Managing Director. After building his own premium publisher business,...

  • speaker photo
    Samara Williams
    Threat Intel Engineer, Cardinal Health

    Samara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about ...

  • speaker photo
    Melisa Ozcan
    Cybersecurity Account Executive, Darktrace

    Melisa Ozcan is a Cyber Security Account Executive at Darktrace, the world’s leading AI company for cyber defense. At Darktrace, Melisa works with leading organizations in a range of industries from private equity to media and entertainment to deploy and operationalize cutting edge technologies. During Melisa’s tenure at Darktrace, the compan...

  • speaker photo
    Kelley Misata
    CEO, Sightline Security

    Dr. Kelley Misata, CEO of Sightline Security, President and Executive Director of OISF (Suricata), and former Director of Communication of The Tor Project - a cyber and information security executive with 15+ years of experience in cyber and information security, marketing, and communications. Expert in bridging the gap between technical and ...

  • speaker photo
    Sergeant Michael Davis
    Cyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center Unit

    Sgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Ho...

  • speaker photo
    Michael Butterfield
    Regional Architect - Mid-Atlantic, Check Point Software Technologies

    Michael Butterfield is Security Architect at Check Point, where he supports 30+ engineering teams responsible for hundreds of customers across the Mid-Atlantic. He is primarily focused on helping enterprises design, consolidate, and integrate security controls into emerging technology platforms. Over an 18-year career in cybersecurity, Michae...

  • speaker photo
    Andrew Hoover
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Andrew Hoover is a Senior Engineer with the CERT Division of Carnegie Mellon University’s Software Engineering Institute. As a member of the Cybersecurity Assurance Team, he performs risk and resilience management work for a variety of organizations, mostly relating to critical infrastructure protection. Andrew has 16 years of experience in i...

  • speaker photo
    Katie Stewart
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Katie Stewart is a senior member of the technical staff within the CERT® Division at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. She has more than 15 years of experience advising clients in engineering, information technology, and telecommunications industries. Katie’s current research int...

  • speaker photo
    Juan Marin
    Sales Engineer Manager, IntSights

    A cybersecurity professional and avid technologist advocate with 10 years of experience in effective cyber-security practices, advanced threat prevention, malware and incident response; Juan has worked with the likes of McAfee/Intel Security and Trend Micro in the past, fulfilling technical sales, advisory and customer success roles, and toda...

  • speaker photo
    John Amaral
    Head of Product, Cloud Security, Cisco

    John Amaral is the Head of Product for Cisco Cloud Security. In this role, he is responsible for product management, planning and strategy for Cisco's leading cloud security offerings including Cisco Umbrella and Cisco Cloudlock. John joined Cisco through the acquisition of Cloudlock, where he was Head of Product; responsible for product deve...

  • speaker photo
    Stacy Harper
    Partner, Spencer Fane LLP

    Stacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and ...

  • speaker photo
    Benjamin Agner
    Sr. Manager, Global Security, Aflac Subsidiary Security
  • speaker photo
    Rick Doten
    CISO, Carolina Complete Health; VP, Information Security, Centene Corp.

    Rick is CISO of Carolina Complete Health, a state healthcare plan, for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industri...

  • speaker photo
    Dr. Atefeh (Atty) Mashatan
    Founder & Director, Cybersecurity Research Lab, Ryerson University

    Dr. Atefeh (Atty) Mashatan is the Founder and Director of the Cybersecurity Research Lab at Ryerson University. SC Magazine recognized her as one of top five Women of Influence in Security globally in 2019. She joined the School of Information Technology Management of Ryerson University in 2016 focusing on Information Systems Security, Crypto...

  • speaker photo
    Rob Dalzell
    BISO, Bank of America

    Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access management, Responsible Vulnerability Disclosure, email encryption and general security awar...

  • speaker photo
    Moderator: James Keegan
    VP, Information Security, Essent Guaranty, Inc.
  • speaker photo
    Tammy Klotz
    CISO, Covanta

    Prior to Covanta, Tammy was responsible for the cybersecurity program at Versum Materials, which included Information Risk Management, Plant Cybersecurity, as well as IT Security, Risk & Compliance activities. She was with Versum since their start-up in October 2016 and was responsible for standing up all security services required for the ne...

  • speaker photo
    ACP Local Chapter
  • speaker photo
    Pete Murphy
    IT Advisory Executive, CareSource

    Pete Murphy is a well-established leader, builder and collaborator with high standards for personal integrity and a bias for action. He has demonstrated senior level leadership experience building, growing, improving and operating business systems and processes as a CIO, CTO, CISO, Risk Leader and Data and Analytics executive.
    He speci...

  • speaker photo
    Joshua Cloud
    Director of Information Security, NFI

    Joshua Cloud is currently serving as the director of information security for NFI. He has over 20 years of infrastructure and security leadership experience spanning professional services, manufacturing, retail, and logistics industries in countries all over the world. Cloud is a transformational security leader with a business focus who evan...

  • speaker photo
    Paul Ihme
    Co-Founder & President of Consulting Services, Soteria

    Paul is an accomplished Security Professional with 14 years of experience in multiple information technology domains, specializing in computer network exploitation, computer network defense and security incident response. His expertise includes planning, coordinating and performing offensive computer operations.
    Paul leads the firm’s ma...

  • speaker photo
    Douglas Jambor
    Sr. Cybersecurity Manager - IT Advisory, Dixon Hughes Goodman LLP

    Douglas has 13 years of penetration testing experience in the information technology field, focusing on information systems security and information security risk management. He is DHG’s cybersecurity subject leader and manager over all of the firm’s technical cybersecurity services, which includes internal, external, wireless and web applica...

  • speaker photo
    Trend Micro
  • speaker photo
    Kevin Dreyer
    IT Director & CISO, Maple Reinders Group

    Kevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the...

  • speaker photo
    Jana White
    COO, Alpine Security

    Jana White is the Chief Operating Officer of Alpine Security. Jana has an extensive background in banking, compliance, and loss prevention and serves as one of the virtual CISOs for Alpine Security clients. Jana has degrees in criminal justice and cybersecurity and is certified as a crime scene evidence technician. She also holds many cyber...

  • speaker photo
    Olivera Zatezalo
    Chief Security Officer, Huawei Canada

    Olivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada’s operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Olivera is best known for creating value through collaborative leadership style, agi...

  • speaker photo
    Kenrick Bagnall
    Detective Constable, Coordinated Cyber Centre (C3), Toronto Police Service, Former VP of IT at Capital G Bank

    Kenrick has been a member of the Toronto Police Service since April of 2006 and currently serves as an investigator in the Coordinated Cyber Centre (C3) section of Intelligence Services. Before this Kenrick spent 20 years in the Information Technology industry primarily in the financial services sector, holding positions of Senior Network Ana...

  • speaker photo
    Tamika Puckett
    Risk Manager, Corporate Security, Zoom

    As the City of Chicago’s Chief Risk Officer, Ms. Puckett was responsible for implementing and managing the city’s enterprise risk management governance framework, including the implementation of policies and procedures to identify and manage organizational risks. A career risk manager, Ms. Puckett possesses over 15 years of experience managin...

  • speaker photo
    Tanya Tipper-Luster
    IT Audit/Advisory Professional, Wyndham Destinations

    Tanya Tipper-Luster has spoken at cyber conferences such as the (ISC)2 Security Congress and was featured as a cybersecurity expert in the Orlando Business Journal. She is a Cybersecurity Audit thought leader and visionary. She represents the alignment of emerging technology, critical business processes and key cybersecurity controls to infl...

  • speaker photo
    Robert Ryba
    Sr. IT Audit / Advisory, Wyndham Destinations

    Robert Ryba has spoken at cyber conferences such as the (ISC)2 Security Congress. He is a Certified Public Accountant and Certified Information Systems Auditor with an Internal Audit and Cybersecurity background. As a millennial who is deeply passionate about information technology, he is motivated to learn why millennials are so indifferent...

  • speaker photo
    Ethan Strayer
    Sr. IT Advisory Analyst, Wyndham Destinations

    Ethan Strayer has spoken at cyber conferences such as the (ISC)2 Security Congress. Ethan is a Certified Information Systems Auditor, Cybersecurity and Information Technology (IT) Governance Risk and Compliance professional. He supports the Company's risk tolerance while also improving the IT posture of the organization. Ethan specializes in...

  • speaker photo
    Chris Turley
    Leader, RISC Education & Awareness, FIS

    I lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previo...

  • speaker photo
    Brian Coleman
    Associate CIO, Information Security Officer , University of Massachusetts Medical School

    Brian is a seasoned leader, Chief Information Security Officer, and IT executive. His experience spans Insurance, Financial Services, Health Care, and Cloud Security. His specialty is optimizing Information Security and Risk Management / Compliance organizations, his passion is employee mentorship, continuous improvement and process developme...

  • speaker photo
    Donna Ross
    SVP & CISO, Radian Group

    Donna L. Ross was appointed to her current position as Senior Vice President, Chief Information Security Officer in July 2016. In this role she is responsible for Radian’s information security program and business compliance, as well as the enterprise project management and initiative governance programs.

    Donna is a senior security and...

  • speaker photo
    Moderator: Nancy Hunter
    VP & CISO, Federal Reserve Bank of Philadelphia

    Nancy Hunter is the VP, CISO and Data Privacy Security Officer at the Federal Reserve Bank of Philadelphia. With more than 25 years of experience in technology including 15 years in Information Security, Nancy joined the Federal Reserve Bank in 2017 where is accountable for Information Security Operations and Consulting, Information Risk Mana...

  • speaker photo
    Mark Eggleston, CISSP, GSEC, CHPS

    Mark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, ...

  • speaker photo
    Joshua Sorenson
    Sr. Director, Global Security, Equifax

    Joshua is a Global Information Security Leader with 14 years of professional experience. Joshua currently serves as Equifax's Senior Director of Global Mainframe Security where he has responsibility for transforming zSeries platform security around the world. Prior to joining Equifax, Joshua served in security leadership roles, leading transf...

  • speaker photo
    Ted Demopoulos
    Principal, Demopoulos Associates

    Ted Demopoulos’ professional background includes over 35 years of experience in Information Security and Business, including over 30 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent...

  • speaker photo
    Joel Lowe
    Director of Physical and Cyber Security, Red Ventures

    Joel Lowe has more than 14 years of experience in remediating threats, vulnerability management, risk management, data privacy, and information security programs. These programs focus on overseeing private data protection, corporate governance, risk management strategy, Certification & Accreditation, Incident Response, forensics and executive...

  • speaker photo
    Canadian Cyber Threat Exchange (CCTX)

    The Canadian Cyber Threat Exchange (CCTX) is a sharing hub and collaboration organization that provides insight into cyber events directly impacting Canadian business, along with mitigation options and tools to combat identified threats. Learn about the CCTX and enjoy a special, CCTX-hosted guest presentation. Details available soon.

  • speaker photo
    Ken E. Sigler
    Board of Advisors, University of Detroit Mercy, Center for Cybersecurity and Intelligence Studies

    Ken Sigler has served as a full-time faculty member of the Computer Information Systems program at the Auburn Hills Michigan campus of Oakland Community College since 2001, while his primary research is in the area of cybersecurity education, policy, and management; software management; and software assurance. Ken serves as the Liaison for th...

  • speaker photo
    Daniel Goldenberg
    Director, IT Infrastructure, Barton Associates

    Dan is a business results-focused information technology leader with a background in information security, infrastructure, and technical operations; experiences range from fledgling start-ups to enterprise corporate environments.

  • speaker photo
    Tammy Moskites
    Ponemon Institute Distinguished Fellow, Career CISO & Former CISO, Time Warner Cable; CEO & Founder, CyAlliance

    Tammy is the CEO and Founder of CyAlliance. She is a strategic advisor to companies, vendors and startups by leading, building and scaling security offerings while providing CISO as a Service and virtual CISO (vCISO) services for companies worldwide. With her 30 years of experience, she is noted by her peers to be a results-driven and passion...

  • speaker photo
    Bobby Singh
    CISO and CTO, Toronto Stock Exchange
  • speaker photo
    Adam Karcher
    Cyber Special Agent, FBI

    Special Agent Adam Karcher has been with the FBI for over 16 years running cyber investigations and operations across the full spectrum of criminal and national security programs. SA Karcher's experience spans local field investigations to national and international strategic engagement against the most sophisticated cyber threats. His curren...

  • speaker photo
    Matt Donato
    Co-Founder & Managing Partner, HuntSource

    Matt Donato is a Co-Founder & Managing Partner of HuntSource- the preeminent Executive Search and Talent Solutions firm with a niche focus in Cyber Security & Data Intelligence. Matt possesses fifteen years of experience in executive recruiting, talent solutions, workforce planning, and talent management. He is a thought leader and recruiting...

  • speaker photo
    Helen Oakley
    Leader in Cybersecurity

    Helen Oakley is a cybersecurity enthusiast, researcher and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s “Canadian Women in Cybersecurity” conference. Helen holds a lea...

  • speaker photo
    (ISC)2 Local Chapter

    The International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization."

  • speaker photo
    Joe Provost
    Information Security, Avidia Bank

    Joe's been in cyber since the internet was a piece of string tied between two soup cans! He's a former Army warrant officer (network warfare), MIT Lincoln Laboratory IAM, IBM (XForce Cyber Range) “The Cave” member, teaches professional ED at MIT with the Geospatial Cyber Security group, and has a Masters in Cyber from Utica College. His forme...

  • speaker photo
    Michael Meyer
    Chief Risk and Innovation Officer, MRS BPO, LLC

    Michael Meyer, MPSTM, CISSP, CIPP/US, CIPM, FIP, CISM, CRVPM II, CRISC, CISA, is the Chief Risk and Innovation Officer of MRS BPO. He is responsible for overseeing the company’s enterprise innovation, risk management and security initiatives for its Fortune clients. Michael has been with MRS for over 20 years and previously served in the Chie...

  • speaker photo
    Don McKeown
    Information Security Manager, Wolters Kluwer Health

    Don McKeown is currently an information security manager for a provider of healthcare solutions that facilitate effective clinical decisions. There he developed and teaches a threat modeling course, teaches code scanning, contributes to corporate application security advisory committees, and consults for technical and product teams. Previousl...

  • speaker photo
    Doug Graham
    Chief Security and Privacy Officer, Lionbridge

    Doug is the Chief Security and Privacy Officer at Lionbridge Technologies, a global leader in localization and data training. He has over 20 years of global experience in the enterprise security space and brings a balance of leadership, customer focus, and technical expertise to the table. He previously served as CSO of Nuance Communications ...

  • speaker photo
    Ben Schwering
    CISO, Premiere, Inc.
  • speaker photo
    Gabriel Doncel
    Director, Information Security, Drexel University

    Gabriel Doncel joined Drexel University in 2019 where is currently Director of Information Security. He is also part of the University of Delaware and Wilmington University Adjunct Faculty. As a member of the Information Security team at Drexel, and working closely with the campus community and outside parties, his focus is to protect the peo...

  • speaker photo
    Margarita Rivera
    VP, Information Security, Risk & Compliance, LMC (a Lennar Company)

    An Information Security Executive with over 15 years of experience, Margarita Rivera has thrived her entire career on solving complex problems. Margarita has dedicated her professional journey to building Information Security Risk, Compliance and Privacy Programs and continues to do so as the Head of Information Security at LMC, a Lennar Corp...

  • speaker photo
    Brendan Campbell
    AVP, Global Technology Governance & Control, Manulife

    Brendan Campbell is currently the leader for Manulife’s Global Technology Governance & Control function and has prior experience across audit, risk management, information security. He is a part of the Global Technology Executive team and is responsible for leading the execution of risk activities globally. In addition, he is responsible for ...

  • speaker photo
    Mike Ste Marie
    Election Security Partnership Program Manager, Office of the Secretary, Commonwealth of Massachusetts

    Mike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a...

  • speaker photo
    Adel Danesh
    CISO, Analytics 4 Life

    Adel Danesh has over 20 years of experience in IT and information security. Over the course of his professional career, he has been holding information security leadership roles in various organizations and spearheaded mission critical security and infrastructure projects. In his current job, Adel is a CISO at Analytics For Life, a medical re...

  • speaker photo
    Dominique West
    Sr. Cloud Security Consultant, EY, Instructor, Georgia Institute of Technology

    Dominique West is a senior consultant for Ernst & Young based in Atlanta, GA. She has eight years of experience in Information Technology, five of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries...

  • speaker photo
    Daniel Pepper
    Partner, BakerHostetler

    Dan Pepper is a partner on BakerHostetler's Privacy and Data Protection team. Utilizing 25 years of comprehensive experience in information technology, data privacy, and cybersecurity law, Dan advises clients on proactive data security practices, data breach incident response, and regulatory compliance. He frequently handles security incident...

  • speaker photo
    Michael Effiong
    Head of Cybersecurity, Tango Networks

    Michael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas,...

  • speaker photo
    Arif Hameed
    Sr. Director, Client Security, Equifax Canada

    Arif Hameed is Senior Director at Equifax, where he leads a team that handles client cybersecurity due diligence activities including questionnaires, audits, remediation support, security schedules, etc. Prior to his role at Equifax, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third Party Cyber Risk, and IT ...

  • speaker photo
    Imran Ahmad
    Partner/ Attorney, Blake, Cassels & Graydon LLP

    Imran has a business law practice with a specialization in technology, cybersecurity, and privacy law. As part of his cybersecurity practice, Imran works closely with clients to develop and implement practical strategies related to cyber threats and data breaches. He advises on legal risk assessments, compliance, due diligence and risk alloca...

  • speaker photo
    J. Zhanna Malekos Smith
    Reuben Everett Cyber Scholar and Researcher, Duke University Center on Law & Technology

    J. Zhanna Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of ...

  • speaker photo
    Larry Snyder
    Associate Professor, Bloomsburg University of Pennsylvania

    Professor Larry Snyder has nearly two decades of experience in law enforcement, fraud, and auditing in the US Army and a variety of industries, and 15 years in the field of cybersecurity education. Larry believes that cybersecurity strategists must have a broad understanding of the cyber issues facing organizations, as well as the skills need...

  • speaker photo
    Ryan Hausknecht
    Instructor, University of North Carolina at Charlotte

    Ryan Hausknecht specializes in red teaming as a Security Consultant at SpecterOps and is an instructor for cybersecurity at UNC Charlotte. He is a former Forensic Consultant, Information Security Analyst, and Penetration Tester who has dealt with clients ranging from local government to enterprise-sized businesses. Ryan graduated Summa Cum La...

  • speaker photo
    Stephen Purpura
    Founder, [Stealth Mode]

    Stephen Purpura is an American entrepreneur and an applied machine learning researcher. He has co-founded four companies that focus on evolving the future of work, including Context Relevant (renamed Versive and acquired by eSentire) and SkyEye LLC (also acquired). He holds degrees from Harvard University’s Kennedy School of Government and th...

  • speaker photo
    Karen Holmes
    VP and CISO, TrueBlue Inc.

    Karen Holmes is the Vice President and CISO at global staffing company TrueBlue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating...

  • speaker photo
    Tom Bechtold
    Digital Event Director, SecureWorld

    Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also worki...

  • speaker photo
    Garrett Whitney
    CIO, Delta Dental of Washington

    Garrett Whitney is the Chief Information Officer at Delta Dental of Washington, the largest dental benefits provider in Washington State. He developed a passion for technology at an early age by learning to program Pascal, C, and 8086 Assembly languages prior to graduating high school. Garrett is a veteran of the United States Navy, specializ...

  • speaker photo
    Kat Jungck
    Principal Enterprise Security Architect, F5 Networks

    Kat is an experienced cybersecurity practitioner with a background in both enterprise cybersecurity and secure product development with deep domain experience in cloud security, identity and access management, and secure product development. Kat enjoys working with local cybersecurity chapters and programs to recruit and develop the next gen...

  • speaker photo
    Brian Shea
    Director of Security - GRC, Microsoft

    Brian is an IT Executive with 25 years of experience from IT Operations and Support, Security, through Compliance, Risk Management, and Technology Innovation. As part of his tenure at Microsoft he has been supporting Supply Chain security and compliance for the last 7 years including hardware supply chain, software supply chain, and vendor /...

  • speaker photo
    Sean Ventura
    CISO, Atmosera

    Sean has over 30 years of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Chief Information Security Officer at Atmosera, implementing and maintaining the company’s security posture, while providing security and compliance expert advisory to Atmoser...

  • speaker photo
    Michael Ray
    Manager, IT Security & Risk, Puget Sound Energy
  • speaker photo
    Mukesh Dixit
    CTO, Washington State Department of Labor and Industries

    Chief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...

  • speaker photo
    Austin McBride
    Threat Data Scientist, Cisco Umbrella

    Austin McBride is a Threat Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. His current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets...

  • speaker photo
    Monica Dubeau
    Director, Privacy Program, IBM Security
  • speaker photo
    Jay Wilson
    CISO, Healthgrades
  • speaker photo
    Burak Serdar
    Co-Founder, ConsentGrid

    Burak is one of the co-founders and the technical lead at Cloud Privacy Labs. He has more than 25 years of experience as a software engineer and recently left his position at Red Hat as Principal Software Applications Engineer. His work includes large scale back-end applications for distributed environments and open-source tools for enterpris...

  • speaker photo
    Jaymin Desai
    Third-Party Risk Offering Manager, OneTrust

    Jaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficie...

  • speaker photo
    Clint Sowada
    Director of Product Security, Collibra

    As the Director of Product Security at Collibra, Clint Sowada is responsible for delivering secure applications and protecting customer’s data. He has been in the security industry for nearly a decade and has proven track record in building secure SDLC programs at companies that range from endpoint protection to large scale cloud service prov...

  • speaker photo
    Ashish Popli
    Director of Product Security, Privacy & Compliance, UiPath

    Ashish thrives on pragmatism, innovation and building teams that deliver a promise. He started his career over 20 years ago, as a computer scientist in upstate NY, and since then has been learning the 'art of impossible', by wearing multiple hats, including writing code, conducting pen tests, finding and fixing security bugs, building and shi...

  • speaker photo
    Dr. Ben Edwards
    Sr. Data Scientist, Cyentia Insitute

    Dr. Benjamin Edwards joined Cyentia at the beginning of 2019 as hire #1. He was formerly with IBM Research, where he worked in applying advanced machine learning techniques to solve real world security problems and shaped the next generation of analytical security models. Before that he received his Ph.D. from the University of New Mexico wit...

  • speaker photo
    Jeff Raymond
    Sales Engineer, Avanan

    Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakesurfing (depending on the se...

  • speaker photo
    Justin Schluessler
    Data Protection Officer, Compassion International

    Justin Schluessler has served with Compassion International, a global child development non-profit, for 21 years. Starting in IT and then transitioning to Risk Management, Justin was the organization’s very first information security employee—building a comprehensive security and compliance program from the ground up. In his current role as ...

  • speaker photo
    Christopher Grillo
    VP & CISO, Formerly Deluxe Corporation
  • speaker photo
    Jerry Vergeront
    Attorney, Vergeront Law, PLLC

    Jerry Vergeront is the founder and attorney at Vergeront Law, PLLC. With over 25 years in Information Security before becoming an attorney, he brings an industry understanding to data security, privacy, and compliance law.

  • speaker photo
    Tim Danks
    VP, Risk Management & Partner Relations, Huawei Technologies (USA)

    As VP Risk Management & Partner Relations Mr. Danks is responsible for understanding and managing business risks in the context of cybersecurity and privacy across Huawei USA businesses and toward external stakeholders. Further, he is responsible for developing and enhancing partner relationships towards key external stakeholders across acade...

  • speaker photo
    Bruce Potter
    CISO, Expel

    Bruce Potter is the CISO at Expel. Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company. He also served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security, and co-founded the Shmoo Group in 1996.

  • speaker photo
    Gaurav Kapil
    Sr. Director, Information Security, Blue Cross and Blue Shield
  • speaker photo
    Anand Singh
    CISO, Alkami Technology

    Dr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currentl...

  • speaker photo
    Drew Simonis
    VP & Deputy CISO, Hewlett Packard Enterprise

    Drew Simonis is a Vice President and serves as the Deputy CISO at Hewlett Packard Enterprise (HPE). He has worked in some of the largest and most complex environments in the public sector and the private sector with firms such as IBM, AT&T, EDS and Symantec. Prior to joining HPE, Drew spent 8 years as the CISO for Willis Group Holdings (now W...

  • speaker photo
    Robert Walden
    Chief Information Officer, Epsilon

    Robert Walden is the Chief Information Officer at Epsilon where he is responsible for cybersecurity, data center and public cloud infrastructure services, and network services. Additionally, Robert is responsible for providing all IT workplace services for a global user base. Robert has been delivering business value through technology for ov...

  • speaker photo
    Tianne Strombeck
    Sr. Principal, Security Risk Management, Verizon

    Tia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has work...

  • speaker photo
    John Berisford
    Sr. Security Architect, SecureWorks
  • speaker photo
    Michael Blaha
    Sr. Director, Cloud Operations, NucleusHealth

    Michael Blaha is currently Sr. Director of Cloud Operations and Security at NucleusHealth. Throughout his career, Michael has made a focus of integrating security and cloud native principles into his delivery and operations teams in both the healthcare payer and healthcare Software-as-a-Service space.

  • speaker photo
    Ian Schneller
    SVP Global Information Security, Financial Institution

    A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...

  • speaker photo
    Craig Swinteck
    IS Manager, Town of Castle Rock

    Craig Swinteck has a comprehensive background in IT operations and cybersecurity, with a career spanning across entrepreneurship, small businesses to global corporations, serving the public in local and federal government, and providing cybersecurity guidance in challenging industries such as Finance, Healthcare, and Manufacturing. Craig’s pa...

  • speaker photo
    Joe Dietz
    Network Security Architect, CenturyLink

    A technology focused senior level IT security professional with an excellent balance of business experience and knowledge of systems/network security. Always conducting oneself with integrity and ethical behavior following the motto of “Always do the right thing.”

  • speaker photo
    Diana Hennel
    CTO, Catalyst Corporation Federal Credit Union

    Diana Hennel is currently the Chief Technology Officer for Catalyst Corporate Federal Credit Union. In her role, Diana is responsible for the long-term strategic direction and implementation of technology strategy, security, and processes. She oversees the corporate’s network operations, technology development and information systems securit...

  • speaker photo
    Joshua Carlson
    Data Privacy and Technology Law Attorney, The Carlson Firm

    Joshua Carlson is a privacy lawyer but also is a technologist and understands sytem engineering, he has for a long time held his CISSP, CIPP, CIPP/G, CIPP/E and provides guidance and advisory to organizations around the world.

  • speaker photo
    Jay Jacobs
    Chief Data Scientist & Co-Founder, Cyentia Institute

    Jay is a Co-founder and Chief Data Scientist at Cyentia Institute, a research firm dedicated to advancing the state of information security knowledge and practice through data-driven research. Prior to Cyentia, Jay served as the Lead Data Analyst on the Verizon Data Breach Investigations Report and is the co-founder of the Society for Informa...

  • speaker photo
    Christopher Calarco
    Special Agent / Private Sector Coordinator, FBI Denver

    Special Agent (SA) Christopher A. Calarco has been in law enforcement for 25 years. He was previously a local and federal prosecutor, and has been an Agent for the FBI for over 20 years. SA Calarco has investigated a number of matters to include reactive violent crimes, gangs, organized crime, fraud and major theft. SA Calarco was also a m...

  • speaker photo
    Scott Bennett
    VP, Applications, Lear Corporation

    Scott Bennett leads Lear Corporation’s global applications as the Vice President of Applications, Deployment and Development. Prior to joining Lear Corporation, he served as the Global Chief Information Officer to International Automotive Components Group, a $6 billion Tier 1 automotive supplier. Before that, Scott was the North America CIO...

  • speaker photo
    Zahira (Zah) Gonzalvo
    SVP and Chief Information Security & Privacy Officer, Flagstar Bank

    Zah joined Flagstar Bank Information Security & Privacy team in 2018 as a Senior Vice President and Chief Information Security & Privacy Officer. Prior to her CISO role, Zah was the head of ERM and the Operational Risk teams since 2013 when she joined Flagstar Bank. Zah was the Strategy Leader for Diversity and Inclusion (D&I) for the Bank si...

  • speaker photo
    Janet Lawless
    CEO & Founder, Center for Threat Intelligence

    Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge threat intelligence consulting, training and a certification program for Certified Threat Intelligence Professionals (CTIP). We are a proud provider for The National Initiative for Cybersecurity Education (NICE)...

  • speaker photo
    Jason Rader
    Director, Network & Cloud Security, Insight Cloud + Data Center Transformation

    Jason Rader joined Insight in 2015 as the National Practice Director of Security. He is charged with managing Insight’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true s...

  • speaker photo
    Dennis Hodges
    CIO, Inteva Products

    Dennis Hodges is the Chief Information Officer for Inteva Products, LLC, a position he has held since March 1, 2008. Prior to this assignment Dennis was Chief Information Officer for Delphi Interiors and Closures. Prior to joining Inteva, Dennis served as the Global Business Systems Director at Huntsman Corporation. He began his career at She...

  • speaker photo
    Tammylynne Jonas
    CIO, Self Esteem Brands

    Tammylynne Jonas (TLJ) is a seasoned digital and technology executive with almost 20 years of experience leading large, international teams. TLJ is the Global CIO for Self Esteem Brands, the parent company for Anytime Fitness. In this role, TLJ has responsibility for multiple franchise brands, with almost 5000 locations across almost 40 count...

  • speaker photo
    Brenden Smith
    CISO, FirstBank

    Brenden Smith is the Chief Information Security Officer at FirstBank. Having spent the last 10 years at FirstBank he is passionate about their community involvement and “Banking for Good” philosophy. In his current role Brenden is focused on aligning security with the needs of the business to help drive better business outcomes through better...

  • speaker photo
    Christopher Riley
    CISO, Ntirety (formerly HOSTING.com)

    Chris is a seasoned IT Strategist with 20 years of leadership experience in Project & Program Management, Technology & Infrastructure, and Security & Governance. He creates and scales internal technology operations for sustained hyper-growth, builds security operations for Managed Security Provider and spearheads Compliance certification pro...

  • speaker photo
    Ronald Williamson
    Information Security Officer, Medical College of Wisconsin

    Ronald Williamson has over 20 years’ experience in Information Technology and Information Security. He has held roles within the banking, retail, and healthcare industry. Currently, he is Information Security Officer at the Medical College of Wisconsin. Driven by a belief in promoting a strategic vision and utilizing best practices to accompl...

  • speaker photo
    Bill Meredith
    Cloud Security Engineer, Charles Schwab

    Bill Meredith has over 25 years of experience designing, implementing, and supporting IT solutions for large enterprises, of which 10 years have been in the cybersecurity area. He is a cybersecurity professional with experience across a diverse set of cyber domains and industries such as Cloud Security, Financial, Forensics Investigation, Te...

  • speaker photo
    Panel Discussion
  • speaker photo
    David Sonheim
    Cybersecurity Advisor, DHS / CISA
  • speaker photo
    Kevin Beaver
    Independent Information Security Consultant, Principle Logic, LLC

    Kevin Beaver, CISSP is an information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. • With over 31 years in IT and 25 years in security, Kevin specializes in independent security assessments and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sen...

  • speaker photo
    Doug Boykin
    Solutions Engineer, OneTrust

    Doug Boykin serves as a Privacy Engineer at OneTrust – the #1 most widely used privacy, security and third-party risk technology platform. In his role, Boykin advises many of the world's leading organizations on CCPA, GDPR and ePrivacy (Cookie Law) solution implementations, focused on formulating efficient and effective responses to data prot...

  • speaker photo
    John Callaghan
    Sr. Security Engineer in SOC Operations, Forensics, and Threat Hunting, Pulte Financial Services

    As a security practitioner of 30 years, Jack's experience began in the 80s with commercial and military venues, and expanding in early days of the Internet. It continued to be shaped by the growth of malware and data breaches as global threats against business, nations, and individuals. While developing some of the earliest proactive IPS syst...

  • speaker photo
    Patrick Benoit
    VP, Global GRC & BISO, CBRE

    Patrick is the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a...

  • speaker photo
    Jeff Kenney
    CIO/CISO, Grasshopper Bank

    30+ years IT and Information Security practice. CIO/CISO at the first digital commercial bank in the US. Previously served as the Global Head of Wealth Technology for Thomson Reuters wealth management business line. Lead a team of over 380 developers and technologists supporting the TR BETA, BETA Online, and Thomson One products. Previously t...

  • speaker photo
    Dale Drew
    Chief Security Officer, Zayo Group

    Dale is currently the Chief Security Officer of Zayo Group, Inc, a global telecommunications service provider based in Boulder, Colorado. Dale is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, having worked in Federal/State Law Enforcement and with Inte...

  • speaker photo
    Rob Walk
    Sr. Security Engineer, Tenable

    Rob is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying, and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable, he helps organizations reduce risk due to Cyber Exposure.

  • speaker photo
    Kelce Wilson
    General Counsel, InfraGard North Texas

    Kelce S. Wilson was in the U.S. Air Force, both active duty and reserves, retiring as a Lieutenant Colonel. He has a B.S., M.S. and PhD in electrical engineering, an M.B.A., a J.D., US PTO patent practitioner registration, and is a certified privacy professional with CIPP-US, CIPP-E, and CIPM. During his military and engineering career he wor...

  • speaker photo
    TJ Gonen
    Co-Founder , Protego Labs

    TJ is a subject matter expert on cloud security who has decades of experience solving enterprise problems with innovative solutions. His current project, Protego Labs, is two years in the making. With Protego, TJ has developed an award-winning platform that automates security for serverless applications. The combination of reduced development...

  • speaker photo
    Book Signing
  • speaker photo
    Parthasarathi Chakraborty
    Director, Security Architecture, Bank of Montreal

    Partha has over 20 years of cyber security leadership experience in financial services industry. An active speaker and panelist in cyber security conferences around the world. Very much passionate about learning new technologies and writing on recent cyber trends. Currently heading up infrastructure security architecture for Bank of Montreal....

  • speaker photo
    Rob Maynard
    Solutions Architect, Trend Micro

    Rob Maynard is a sales engineer and DevOps SME for Trend Micro. He has been in the IT field for over 11 years working with various cloud, automation, and virtualization technologies. He lives in Michigan with his wife and two children.

  • speaker photo
    Jennifer Reicherts
    Certified Ethical Hacker, Healthcare Information Security Analyst

    Jennifer Reicherts is an Information Security Analyst with over 16 years of experience working in the Healthcare and Public Health sector. Her passions include IoT cybersecurity and threat intelligence. Jennifer is a Certified Ethical Hacker (CEH) and an Executive Board Member of InfraGard Minnesota Member Alliance.

  • speaker photo
    Michael Hiskey
    Chief Marketing Officer, Avanan

    Michael Hiskey is a long-time data, analytics, cloud, and AI industry executive. An accomplished writer and speaker, he has published articles in Forbes, InfoWorld, TechCrunch, ITProPortal, etc. He spends his time thinking about how these innovations impact B2B organizations and their customers. Michael has a background in enterprise technolo...

  • speaker photo
    Rebecca Harness
    VP & CISO, Quickbase

    Rebecca Harness is VP & Chief Information Security Officer for Quickbase and Founder/Principal of Pericuro. Rebecca has an established 20+ year career in information technology with the past ten years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technolog...

  • speaker photo
    Scott Hogg
    Chair Emeritus, Rocky Mountain IPv6 Task Force

    Scott Hogg is CTO and a co-founder of HexaBuild.io, an IPv6 consulting and training firm. He is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. He is the author of the a Cloud Guru course, “Rapidly Deploying IPv6 on AWS.” Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member o...

  • speaker photo
    Joseph Marentette
    MIM, Network Engineer 3, Washington University in St. Louis

    Joe Marentette, MIM (WashU IT Network Engineer 3), has worked for the university for over 20 years. Joe leads the design and engineering of the WashU enterprise network and the research network. Joe has a long history of collaboration with the Information Security department, and most recently built the data collection network to capture netw...

  • speaker photo
    Eddie Ho
    Former CIO & COO, Los Alamos National Bank

    Eddie Ho is the former COO and CIO for Los Alamos National Bank in New Mexico and CIO and CISO at OmniAmerican Bank in Texas. Prior to banking leadership roles, Eddie was in Technology Risk Management, cyber security, and Enterprise Architecture for IBM, Dell, Grant Thornton, and Blockbuster. Eddie is a board member for ePayAdvisors and is a ...

  • speaker photo
    Marc Ashworth
    CISO & SVP, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...

  • speaker photo
    Frank Leyva
    Systems Engineer, Radware

    Frank Leyva is a Systems Engineer with Radware, a market leader in cybersecurity with a focus on Network and Application level availability, and security. Prior to that, he was a subject matter expert in network security defense with a leading anti-malware company, performing advanced threat analysis, deep packet inspection, and creating hack...

  • speaker photo
    Rod Aday
    CISO, Dexia Crédit Local

    Rod Aday is the CISO, Head of Operational Risk and Information Security for Dexia Credit Local, NY Branch. He is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built I...

  • speaker photo
    Mark Nagiel
    CISO, Supreme Lending

    Mark is currently serving as the Chief Information Security Officer at Supreme Lending. Prior to Supreme Lending, Mark Served as the CISO at Prime Lending, Head of Information Security at MetroPCS (a T-Mobile division), VP of Information Technology and VP of Information Security at InCharge Institute, Head of NEC Information Security Consulti...

  • speaker photo
    Beth Young
    Sr. Security Incident Response Consultant, Aflac

    Beth Young has 20 years of cyber security experience. She is currently a Senior Security Incident Response Consultant with Aflac. Beth has previously worked for a financial services company and for one of the Information Sharing and Analysis centers. She just completed her Masters in Applied Data Science from Syracuse University. She has prev...

  • speaker photo
    Christopher McMahon
    Special Agent, Global Investigative Operations Center, United States Secret Service

    Chris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Servi...

  • speaker photo
    Siam Luu
    Lead Security Architect, Colorado Judicial Department

    Siam Luu has worked information security for over 8 years beginning as an analyst, graduating to an engineer, and currently is employed as a security architect. He has worked in both the public and private sectors in a myriad of different careers and locations in both technical and non-technical roles. At present, he has his CISSP certificati...

  • speaker photo
    Melissa Van Buhler
    Cybersecurity & Data Privacy Attorney, Focal Law

    Melissa’s legal practice focuses on cybersecurity, privacy, and regulatory compliance. Her key strength is helping organizations achieve cyber resiliency through legal and regulatory compliance.

    Before joining Newman Du Wors in 2018, she served more than 15 years as a Judge Advocate General officer in the United States Army where she s...

  • speaker photo
    Quin DeVries
    UX Researcher, Automotive Cybersecurity, Mitsubishi Electric Automotive America

    Quin DeVries is exploring the realm where technology and human behavior meet to create engaging user experiences. As a curious researcher, he is eager to tackle the challenges of today and the future.

    His research background includes topics in design thinking and ideation in engineering, managerial accounting and neuropsychology, and ...

  • speaker photo
    Alan Berry
    Vice President, Cybersecurity, Centene Corporation

    Alan Berry is the Vice President for Cybersecurity at Centene Corporation. He leads the Cyber Incident Response, Security Strategy, and Threat and Vulnerability Management teams, as well as the Business Resilience and Crisis Management teams. Alan brings 30 years of experience in cyber operations, communications, and command and control. Prio...

  • speaker photo
    Matthew Clapham
    Director of Cybersecurity, GE Healthcare

    Matt Clapham is a Directory of Cybersecurity at GE Healthcare. He and his team make products more secure.

  • speaker photo
    Michael Rogers
    Director, Cyber Defense, Optum / UHG

    Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybersecurity. He is a certified nerd with nearly 20 years of IT experience, and has spent the last decade developing his understanding of information security, business strategy, and communications. Mike earned his MBA from the Carlson School of Ma...

  • speaker photo
    David Stauss
    Partner, Husch Blackwell LLP

    David is the leader of Husch Blackwell’s national privacy and data security practice group. Accredited by the International Association of Privacy Professionals as a Fellow of Information Privacy, Certified Information Privacy Professional/United States, and Certified Information Privacy Technologist, David brings to the table a deep engageme...

  • speaker photo
    Marc Harwin
    Information Security Professional, Harwinet LLC

    Marc Harwin is an Information Security Professional with more than 20 years of experience. He has worked to improve Information Security at multiple Fortune 500 organizations with a focus on:
    - Security Operations