Speaker Directory
  • speaker photo
    Jarrod Forgues Schlenker
    Special Agent, Kansas City Division, FBI

    Jarrod Forgues Schlenker is a Special Agent with the Kansas City Division of the FBI, investigating cybercriminal violations. Previously, he investigated violent crimes against children and human trafficking in Kansas City and worked as an Intelligence Analyst at FBI Headquarters in Washington, DC. Before joining the Bureau, he worked in the ...

  • speaker photo
    Dr. Joye Purser, CISSP
    Field CISO, Veritas Technologies

    Dr. Joye Purser is Field CISO at Veritas Technologies, the number-one maker of data backup systems. She is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.

    In 2022, Dr Purser was the first-ever senior executive Regional Director in CISA Region 4, the U.S. Cybersecurity and Infrastructure Security Agency. Before CISA, ...

  • speaker photo
    Steve Hodges
    CISO, State of Georgia

    Steve Hodges serves as the Chief Information Security Officer (CISO) for the State of Georgia, where he leads the charge in safeguarding critical digital assets and infrastructure against cyber threats. With a career spanning more than three decades in information technology and cybersecurity, Steve brings a great deal of experience and exper...

  • speaker photo
    Angela Hinton
    Education Working Group Lead, HISPI AI Think Tank - Project Cerebellum
  • speaker photo
    Taiye Lambo, Moderator
    Founder, HISPI AI Think Tank - Project Cerebellum
  • speaker photo
    Kenneth Moras
    Security GRC Lead, Plaid

    Kenneth Moras is a recognized leader in the cybersecurity Governance, Risk, and Compliance (GRC) space, with extensive experience in building GRC teams from the ground up at Plaid and scaling large GRC programs at notable organizations such as Meta and Adobe. His expertise also extends to cybersecurity consulting for Fortune 500 companies dur...

  • speaker photo
    Jarrod Forgues Schlenker, Moderator
    Special Agent, Kansas City Division, FBI

    Jarrod Forgues Schlenker is a Special Agent with the Kansas City Division of the FBI, investigating cybercriminal violations. Previously, he investigated violent crimes against children and human trafficking in Kansas City and worked as an Intelligence Analyst at FBI Headquarters in Washington, DC. Before joining the Bureau, he worked in the ...

  • speaker photo
    Tracey 'The Safety Lady' Hawkins, Moderator
    Award-Winning Safety Speaker and Writer

    Tracey Hawkins, aka “Tracey, the Safety Lady,” is a leading safety and security expert. She’s a powerhouse speaker, writer, trainer, and international content creator who has created and delivered safety and security programs, in-person and virtually, since 1995. She hosts the new "Drive with NAR: The Safety Series" podcast, which debuted in ...

  • speaker photo
    Kelly Rogers
    Business Information Security Lead (BISO), Blackbaud

    Kelly also serves as First VP, Board of Directors, for the ISACA Philadelphia Chapter.

  • speaker photo
    Donna Ross
    CISO, Radian Group Inc.

    Dynamic leader and board member demonstrating over 20 years of diverse risk, compliance, information security, technology, and operations experience within the manufacturing, insurance, banking, financial services, and retail sector. Adept in developing and implementing strategic technology and risk solutions, performing research and analysis...

  • speaker photo
    Yaron Levi, Moderator
    CISO, Dolby Laboratories

    Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ...

  • speaker photo
    Michelle Garcia
    Director, Information Security & Compliance, Carnival Cruise Line

    Michelle is recognized as a leader in the fields of IT and OT Cyber Security with an extensive foundation of knowledge in ecommerce, security operations, technology globalization and pioneering where cybersecurity and vessel safety converge. In Michelle’s 30-year career, she has extensive experience leading diverse teams across multiple techn...

  • speaker photo
    Niculae (Masu) Baicoianu
    Director, Enterprise Security Architecture, TE Connectivity
  • speaker photo
    Josh Vander Veen
    Senior Counterintelligence Officer (SCIO), Kansas City National Security Campus

    Josh Vander Veen has worked in the counterintelligence profession for over 20 years and currently directs the Counterintelligence division at the Kansas City National Security Campus (KCNSC). Josh previously worked Multi-Discipline Counterintelligence (MDCI) activities within the Intelligence Community, and is a former U.S. Army CI Agent with...

  • speaker photo
    Chul Choi
    Sr. Solutions Architect, Okta

    For more than 25 years, Mr. Choi has been involved in more than 100 security and identity management projects. His experience spans multiple industries and public segment entities. He has served diverse roles in these IAM programs and holds a patent for entitlement management. Since 2019, he has been working as a Senior Solutions Architect fo...

  • speaker photo
    Ed Jowett
    President, ISC2 Philadelphia Chapter
  • speaker photo
    Shefali Mookencherry
    CISO & CPO, University of Illinois at Chicago
  • speaker photo
    Aaron Weismann
    CISO, Main Line Health
  • speaker photo
    Jay Longley
    Solutions Architect, Envision

    Jay is a seasoned tech professional with over 27 years of experience in the industry, including a remarkable 14-year tenure as CEO. His accomplishments have garnered him prestigious national and state-level awards, notably earning the title of Businessman of the Year in the State of Rhode Island.

    After successfully selling his previous...

  • speaker photo
    Walker Newell
    VP, Litigation and Enforcement, Woodruff Sawyer
  • speaker photo
    Theresa Payton
    First Female White House CIO, CEO of Fortalice Solutions, and 2019 Woman Cybersecurity Leader of the Year

    Payton is the cybersecurity expert that organizations turn to for discreet help during data breaches and to improve IT systems and strategies. She made history as the first female to serve as White House Chief Information Officer and currently helps organizations in both the public and private sectors protect their most valuable resources.

  • speaker photo
    Quinten Sepe
    Sr. Solutions Engineer, Rapid7
  • speaker photo
    Kelly Rogers
    First VP, Board of Directors, ISACA Philadelphia Chapter

    Kelly also serves as the Business Information Security Lead (BISO) at Blackbaud.

  • speaker photo
    Rosko (Ronald) Goings
    Solutions Engineer, Perception Point

    Rosko brings with him a diverse background in IT security and compliance. He has worked in a wide array of technical roles including Technical Support, Network Security, Solution Engineer, as well as Customer Success. Throughout all of his experiences, Rosko has dealt with a number of regulatory and compliance organizations. In his current ro...

  • speaker photo
    Chris Nicolaou
    CISO & CIO, Quantum Materials Corp.
  • speaker photo
    Steve Toole
    Principal Solutions Consultant, SailPoint

    Steve Toole is a Principal Solutions Consultant with SailPoint Technologies. With almost 20 years' of Identity Security experience, he is responsible for helping clients around the world understand Identity Security and how to apply it to achieve business goals and objectives.

  • speaker photo
    Joe Shope
    Staff Solutions Engineer, Snyk

    Joe Shope is a Staff Solutions Engineer for Snyk. They support Fortune 500 customers with modernizing AppSec practices and adopting a fix-based DevSecOps culture. With over a decade of cybersecurity experience, Joe has led programs ranging from Physical Security to Information Security, and from Vulnerability Management to Cloud Modernization...

  • speaker photo
    David Lindner
    CISO, Contrast Security

    David Lindner is an experienced application security professional with over 20 years in cybersecurity. In addition to serving as the chief information security officer, David leads the Contrast Labs team that is focused on analyzing threat intelligence to help enterprise clients develop more proactive approaches to their application security ...

  • speaker photo
    Michael Calderin
    CISO, YAGEO Group
  • speaker photo
    Allan Alford
    Host, The Cyber Ranch Podcast
  • speaker photo
    Scott Kasper
    CRO, Veriti
  • speaker photo
    Andrei Tchouvelev
    Chief Innovation Officer, Syxsense

    Andrei Tchouvelev, Syxsense Chief Innovation Officer, is a critical thinker, ideator, speaker, evangelist, and an accomplished executive with a breadth of strategic and operational expertise. Andrei has an extensive knowledge of the technology space, and a wealth of market positioning and business acceleration experience. His current role as ...

  • speaker photo
    Tad Brisson
    Enterprise Solutions Engineer, Okta

    Tad is a Solutions Engineer who has served Okta's enterprise customer base for close to three years. Tad is committed to helping organizations understand what they can achieve with Okta and is experienced in all stages of the product lifecycle, including demos/PoCs, system architecture, and product implementation. He has spent 10+ years in t...

  • speaker photo
    Arron Harrell
    Sr. Solution Architect, Picus Security

    Arron Harrell is a cybersecurity engineer with 25 years' experience for various cybersecurity manufacturers. Arron has spent the last eight years of his career in the Breach and Attack space for various BAS providers. Arron is an Army Veteran that served in Operation Desert Shield/Desert Storm. He resides outside of Dallas, Texas, on an off-g...

  • speaker photo
    Eleni Drier
    Vice President, ISSA South Texas
  • speaker photo
    Ben Carr
    Chief Security & Trust Officer, Halcyon

    Ben is a Security & Risk Executive and recognized thought leader with more than 25 years of results driven experience in developing and executing security strategies. Currently, Ben is the Advisory CISO for Halcyon. Halcyon has built the first anti-ransomware engine to address one of the most prevalent threats in the cyber industry today. Ben...

  • speaker photo
    Sule Tatar
    Sr. Product Marketing Manager, Arctic Wolf

    Sule Tatar is a Senior Product Marketing Manager at Arctic Wolf, where she does research on security trends and brings groundbreaking cybersecurity products and services to market. She has extensive experience in the B2B cybersecurity space and holds a bachelor's degree in computer engineering and an MBA.

  • speaker photo
    Carlos Guerrero, Moderator
    Co-Founder & Community Director, Mind Over Cyber

    Given that his roots are in fine arts, Carlos Guerrero's journey into the world of cybersecurity and compliance might seem unconventional. However, it is precisely this artistic background that has shaped his distinctive approach and allowed him to thrive as a Senior Account Executive at 360 Advanced, a leading cybersecurity audit and complia...

  • speaker photo
    Lisa Plaggemier, Moderator
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t b...

  • speaker photo
    Jonathan Carr
    Cybersecurity & Compliance Manager, Flow Control Group, Perception Point

    Meet Jonathan Carr, a cybersecurity and compliance manager with a passion for fortifying digital realms and collecting tangible treasures. With an extensive background in cybersecurity and compliance, Jonathan is the go-to guardian for securing data and ensuring regulatory adherence.

    Off the clock, you'll find Jonathan on the basketbal...

  • speaker photo
    Troy Gabel
    AVP, North America, Forcepoint
  • speaker photo
    Eric C. Botts, Moderator
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a cours...

  • speaker photo
    Devin Krugly
    Director, Practice Advisor, Rapid7

    Devin Krugly is the senior security executive with an ardent focus in establishing and maturing an enterprise security strategy to reduce cyber risk by strengthening attack surface and risk management programs. Devin has over 21 years of experience with numerous Fortune 500 companies as a practitioner and consultant in managing technical and ...

  • speaker photo
    Anahi Santiago, Moderator
    CISO, ChristianaCare Health System

    Anahi Santiago is the Chief Information Security Officer at ChristianaCare Health System, the largest healthcare provider in the state of Delaware. Prior to CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. In her role as CISO, Anahi has overall responsibility for the organization's ...

  • speaker photo
    David Lingenfelter, Moderator
    CISO, Penn Entertainment

    David Lingenfelter is the Chief Information Security Officer at Penn Entertainment, responsible for ensuring the highest possible level of security for the rapidly changing risk landscape. David manages teams that oversee IT security and compliance for both the retail and digital aspects of the business. David believes that in order to implem...

  • speaker photo
    Jacob Heisey
    Solutions Engineer, Wiz
  • speaker photo
    Jessie Gibbons
    Technical Director, Skybox Security
  • speaker photo
    Ray Cotten
    Principal Solutions Architect, Elastic

    With over 20 years of experience in information security, this accomplished expert addresses security challenges and vulnerabilities by crafting innovative solutions for organizations. They have successfully managed large, complex programs for Fortune 500 companies, exhibiting both technical expertise and exceptional cross-functional team lea...

  • speaker photo
    Bryan Bechard, Moderator
    CISO, Flagship Credit Acceptance

    Bryan is a 20+ year InfoSec career professional currently serving as CISO for an auto finance company and teaching the next generation of InfoSec pros.

  • speaker photo
    Luke McNamara
    Deputy Chief Analyst, Mandiant Intelligence, Google Cloud

    Luke McNamara is the Deputy Chief Analyst with Mandiant Intelligence, with over a decade of experience in cyber threat intelligence focusing on emerging threats and trends. His research has appeared in Bloomberg, CNBC, CNN, The Hill, The Nikkei, Lawfare, and other media outlets. Luke has presented at security conferences such as RSAC and Blac...

  • speaker photo
    Garry Coldwells
    Sr. Manager, Systems Engineering, Palo Alto Networks

    Garry has 25+years of cybersecurity experience. He has worked on security projects of global scale and reach and has spoken at conferences for 20+ years on what he has seen and learned in the field. Today, Garry is part of the global solutions consultant group at Palo Alto Networks, where he works with key clients on possibilities for their S...

  • speaker photo
    Bill Lawrence, CISSP
    Chief Delivery Officer, ITEGRITI Corporation

    Bill Lawrence, Chief Delivery Officer, ITEGRITI (CISSP, MS International Relations, MS Military Science, BS Computer Science), is a cybersecurity executive who previously served as the NERC VP/CSO and Senior Director of the E-ISAC. He led 40 employees in a 24/7 information sharing and analysis center to defend the North American electric grid...

  • speaker photo
    Adam Evans
    SVP & CISO, RBC

    Adam Evans is Senior Vice President (SVP) & Chief Information Security Officer (CISO) for RBC.

    As CISO, Adam sets RBC’s cyber vision, strategy and program to reduce cyber risks and keep clients, employees, and systems safe. He manages an evolving threat landscape and the global expansion of cyber security services as RBC’s businesses c...

  • speaker photo
    Greg Murray
    SVP, Information Security & CISO, Rogers Communications Cda Inc.

    A Canadian and United States dual citizen with over 25 years of international executive experience. Greg is widely recognized as a business‐focused technology and cyber security expert. He has a proven track record of establishing intricate public‐private partnerships and delivering transformational technological solutions by building high pe...

  • speaker photo
    Zaira Pirzada
    Vice President, Hive Pro

    Zaira Pirzada is the VP of Product Marketing at Hive Pro. Prior to joining Hive Pro, she was a Security Analyst with Gartner, Inc., covering the DLP, File Analysis, and Data Masking markets. Zaira was also featured on CBS as a main actress in the prime-time television show “Hunted”, Wired for her technical acumen, and is currently a popular-s...

  • speaker photo
    Chris Collins
    Head of Cybersecurity and Compliance, Denny's
  • speaker photo
    Gabriel Nwajiaku
    Commissioner, City of Austin's Community Technology and Telecommunications Commission

    Gabriel Nwajiaku is a seasoned cybersecurity expert, army veteran, and community leader. Holding a diverse array of certifications including CISM, PMP, Security+, and CySA+, Gabriel brings a wealth of knowledge and experience to the table. His journey began in the military, where he honed his skills in strategic planning and risk management, ...

  • speaker photo
    Chris Guarino, Moderator
    DevSecOps Lead, Vanguard
  • speaker photo
    Joe Tomasone
    Senior Sales Engineer, Thales
  • speaker photo
    Margaret Nolia White, Moderator
    Head of Cybersecurity Technology, Truist
  • speaker photo
    James McCarthy
    SVP, Americas, Forcepoint
  • speaker photo
    Tony Meholic, Moderator
    Director of Cybersecurity / CISO, The Bancorp Bank

    Anthony is currently Director of Cybersecurity, Chief Security Officer at The Bancorp Inc. in Wilmington, Delaware. He has worked extensively with application development including creation of simulation software for emergency medical providers, work with local government agencies on EMS trending and metrics and customized user interfaces for...

  • speaker photo
    Claroty Representative
  • speaker photo
    Lonnie Best
    Manager, Detection & Response Services, Rapid7

    Lonnie Best has spent over 13 years in security, with his introduction to the field working physical security at a commercial nuclear power generating plant, and the last 6+ of those years helping organizations detect and respond to security incidents as part of Rapid7's Managed Detection and Response (MDR) practice. His experience during tha...

  • speaker photo
    Simon-trésor Shabani
    Sr. Security Solutions Engineer II, Rapid7

    With more than 13 years of experience, Simon-trésor Shabani is a skilled cybersecurity expert with a demonstrated history of working in the industry both in EMEA and the Americas. As Sr. Security Solutions Engineer II at Rapid7, he strives to raise awareness on the importance of best security practices and to constantly educate clients and pa...

  • speaker photo
    Randy Cress
    Assistant County Manager / CIO, Rowan County, NC

    Randy J. Cress is the Assistant County Manager and Chief Information Officer for Rowan County, bringing over two decades of service in enhancing government technology and digital strategies. As CIO since October 2015, he has led the development of a fully virtualized data center and the adoption of cloud services to improve efficiency. His wo...

  • speaker photo
    Krista Arndt, Moderator
    CISO, United Musculoskeletal Partners

    Krista Arndt is the Chief Information Security Officer (CISO) at United Musculoskeletal Partners. As the CISO, Krista is responsible for the safety and security of all UMP and its practices' patients and employees. Krista accomplishes this by ensuring continued maturation and providing strategic direction for UMP's information security progra...

  • speaker photo
    Andreea Anderson
    IT Manager, AMNI International Petroleum

    IT Manager for AMNI International Petroleum, with over 15 years of experience in leading technical teams and leading strategic IT initiatives. With a robust background in technical architecture and design, Andreea has consistently delivered innovative solutions to enhance operational efficiency and align IT with business objectives.

    Ho...

  • speaker photo
    Chris Johnson
    Assistant Director of Technology Services, City of Independence, Missouri

    Chris Johnson is currently serving as the Assistant Director of Technology Services for the City of Independence, Missouri. In this role he is responsible for strategy and execution of all technology needs for the various City departments. These functions include HelpDesk, deskside support, applications management, data center/server admin, n...

  • speaker photo
    Benjamin Corll, Moderator
    CISO, Americas, Zscaler

    Ben is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, a...

  • speaker photo
    Tim Tsujii
    Elections Director, Forsyth County

    Tim Tsujii is the elections director for Forsyth County. Prior to joining Forsyth County, Tsujii worked at the Guilford County Board of Elections from 2005 to 2016, serving as early voting director and eventually deputy director of elections.

    He leads an organization responsible for conducting elections in Forsyth County, maintaining v...

  • speaker photo
    Tony Cook
    Sr. Director, DFIR & Threat Intelligence, GuidePoint

    Tony Cook is the Senior Director responsible for DFIR & Threat Intelligence on GuidePoint Security’s consulting team, where he manages digital forensics, threat intelligence and incident response engagements on behalf of the firm’s clients. His career background includes high-level national security activities in cybersecurity operations for ...

  • speaker photo
    John Brown
    Sr. Security Evangelist, Team Cymru

    John Brown is a Senior Security Evangelist and member of the Team Cymru Outreach team. Prior to joining Team Cymru, he was CTO of a regional ISP that provided Internet and Voice services via fiber optic and microwave technologies. Mr. Brown has actively been involved with Internet technologies since 1984, when as a high school student he conn...

  • speaker photo
    Savvy Security
  • speaker photo
    Vince Simonowicz
    CIO / ITS Director, City of Rock Hill, SC

    Vince Simonowicz graduated from the University of Houston in electrical engineering and is a certified CIO from the University of North Carolina School of Government and has been in the engineering and technology fields for more than 40 years. Vince has been an integral participant and leader for building complex secure enterprise based digit...

  • speaker photo
    Rob Solomon
    Senior Cloud Solutions Architect – Alliances, Crowdstrike

    Prior to his current role at CrowdStrike, Rob Solomon was a Senior Solutions Architect in the ISV segment at AWS, helping software companies migrate and modernize on AWS to accelerate their pace of innovation and operational efficiency. From past roles in SaaS operations and during his time at AWS, Rob experienced first-hand the challenges of...

  • speaker photo
    Berris Bramble, Moderator
    Director of Information Security, Commercial Real Estate Industry

    Berris Bramble holds a Computer Science degree, is a founding member of the local InfraGard Technology Cross Sector Council, and regularly volunteers at local cyber conferences and events. He is a 20-year active member in the local InfraGard Houston chapter participating at the Board and leadership levels. He has spent the bulk of his caree...

  • speaker photo
    Andy Stone
    CTO, Americas, Pure Storage

    Andy Stone is an accomplished IT executive with a passion for technology and creating innovative solutions that solve business problems and deliver results. As CTO, Americas, at Pure Storage, Andy is focused on delivering next-gen data storage and protection technologies that help companies get better insights, improve time-to-market, and mak...

  • speaker photo
    Jake Thomas
    Engineering Manager, Okta

    Jake currently manages the Data Foundations team at Okta after transitioning from Principal Engineer on Okta's Defensive Cyber Operations team. He previously led data platform teams at Shopify and CarGurus, has taught various O'Reilly courses, and regularly contributes to data-oriented OSS projects.

  • speaker photo
    Sanjit Ganguli
    CTO in Residence, Zscaler
  • speaker photo
    Brian Cederdahl
    Board Director, Membership, Cloud Security Alliance, Delaware Valley Chapter

    Brian has more than 25 years of technology expertise in IT Infrastructure, cybersecurity, semiconductor, and systems sales with Appgate, Rackspace, RealCloud, CoreSite, and Verizon Terremark. He is a graduate of Villanova University with B.S. in Electrical Engineering.

  • speaker photo
    Sherry Hunyadi
    Chief Security Architect, Chevron

    Sherry Hunyadi is the Chief Security Architect for Chevron, a role she assumed in May 2021. Sherry leads Chevron’s Cybersecurity Engineering and Innovation team, responsible for strategic direction and technical execution of security-by-design practices across information technology (IT) and operational technology (OT). She is a member of Che...

  • speaker photo
    Scott Dickinson
    CISO, AnMed Health

    Scott Dickinson is passionate about Information Technology and Information Security and has over 20 years in the fields of information security and information technology. He has worked with Federal and State governments to include FBI, DOD, Veteran Affairs, State of SC, and the private sector. He has been a CIO, a CISO, a virtual CISO, Cyber...

  • speaker photo
    Alamdar Hamdani
    United States Attorney, Southern District of Texas, DOJ

    Alamdar Hamdani is the 24th United States Attorney (USA) for the Southern District of Texas. Nominated by President Biden in October 2022 and confirmed by the United States Senate in December 2022, Hamdani is the chief federal law enforcement officer for the Southern District of Texas (SDTX). The district was established in 1902 and encompass...

  • speaker photo
    Adam Markert
    Solutions Architect, CyberArk
  • speaker photo
    Cheri Sigmon, Moderator
    vCISO, Confidential

    Leveraging 21 years of experience in leadership, information security and workforce development, as a Chief Information Security Officer (CISO), Office of the Secretary of Defense (OSD), Cheri secured sensitive military networks/communications/technology. The Joint Staff; USSTRATCOM Joint Task Force-Global Network Operations; Headquarters Air...

  • speaker photo
    Bjorn Boe
    Principal Solutions Engineer, Lacework

    Bjorn is a Principal Solutions Engineer at Lacework with over 20 years experience helping customers find better ways to build, run, manage and secure their software workloads.

  • speaker photo
    Pure Storage Representative
  • speaker photo
    Christine Weber
    CISO, N.C. State Board of Elections

    Christine Weber recently joined the NC State Board of Elections team as the Chief Information Security Officer. With over 20 years of experience in Information Technology and Cybersecurity, she brings a wealth of knowledge to her role. Her expertise spans both the Defense and Academic Industries, where she has contributed significantly to saf...

  • speaker photo
    Steve McCullar
    Principal Solutions Architect, Okta

    Steve McCullar is a Principal Solutions Architect at Okta. In this role, Steve advises Okta's customers and prospects on how Okta's solutions will help them solve complex Identity and Access related issues. Steve has more than 30 years of experience in crafting Identity and Access based solutions for customers, including almost six years at O...

  • speaker photo
    Jim Coyle
    Public Sector CTO, Lookout

    Jim Coyle is the U.S. public sector CTO at Lookout Security, utilizing his 20+ years of knowledge and expertise to help close the security gap many government agencies and organizations face today. A cybersecurity industry thought leader exploring geo-political cyber related issues, the latest threats and defense strategies, as well as indust...

  • speaker photo
    Brian Schwarzkopf
    Sr. Director, Systems Engineering – New England, Fortinet

    Brian Schwarzkopf is the Senior Director of Engineering for New England Enterprise at Fortinet. As an active leader in Fortinet’s wider engineering team, Brian and his team help organizations achieve their cybersecurity objectives with solutions for tooling, staffing and processes that enable greater security effectiveness. Whether in areas o...

  • speaker photo
    James Kimble, Moderator
    Sr. Director, Information Security Architecture, CISSP, C|CISO, Lowe's
  • speaker photo
    Misty Haynes
    Sr. Cybersecurity Manager, Krispy Kreme
  • speaker photo
    Neda Pitt
    CISO, Belk
  • speaker photo
    Sherri Leach
    Deputy CISO, Ingersoll Rand

    Sherri Leach is a proven tactical and strategic innovator, harnessing over 27 years of technical leadership experience across multiple fields within cybersecurity. She is currently the Deputy CISO at Ingersoll Rand, and has previously served in operations and engineering roles at Trane Technologies, MITRE, and ManTech.

    Her skills have ...

  • speaker photo
    Kimberly Trapani
    SVP & CSO / CISO, American Tire Distributors
  • speaker photo
    Mark Hurter
    Solutions Architect, CyberArk
  • speaker photo
    Mike Hortobagyi
    Sr. Manager, Solution Engineering, Okta

    With more than 20 years in Canadian InfoSec, Mike Hortobagyi is an accomplished engineer and technical leader. Based in Toronto, he currently leads Okta's Commercial Presales team across Canada. Mike has experience in a wide variety of security technologies, including Zero Trust, Identity, and Cloud Security.

  • speaker photo
    Lior Yaari
    CEO & Co-Founder, Grip Security

    Lior has vast experience in cybersecurity having worked as a practitioner, investor, and entrepreneur, providing him with a deep understanding of identifying key innovations and the business dynamics of building successful companies. Prior to Grip, Lior was CTO for YL Ventures and a member of the YL Ventures Insiders Network, and served as a ...

  • speaker photo
    James Parks
    Global Cyber Security Manager, Newpark
  • speaker photo
    Derek Fisher
    Executive Director of Product Security, JPMorgan Chase & Co.
  • speaker photo
    Chris Barone
    Security Architecture Lead, Convenience Retail

    Currently the Lead Security Architect at Wawa, Chris has had multiple roles developing process and evangelizing security functions to the rest of the organization. Chris' undergraduate degree is from Drexel University, and he holds a Master's in Cybersecurity Strategy from George Washington University.

  • speaker photo
    Grip Security Placeholder
  • speaker photo
    Fortinet Representative
  • speaker photo
    Bugcrowd Representative
  • speaker photo
    Akshit Goel
    Cybersecurity Architect, Schlumberger (SLB)

    Akshit Goel is a Cybersecurity Architect at SLB where he leads a team of security engineers to deliver secure software solutions to the Energy industry. He helps the teams design, build, and test security solutions and tools. His focus areas are Application Security, Cloud Security, and DevSecOps. He is an automation enthusiast and pursues th...

  • speaker photo
    Sara Ricci, Moderator
    Former Information Risk, Governance, and Resilience Executive, Hudson's Bay Company (HBC)

    Sara Ricci is an accomplished executive with a proven track record in global leadership roles, building new capabilities and enhancing organizational resilience. She is experienced in Risk Management and Technology Enablement in highly regulated financial and energy sectors. Sara excels at building trust and credibility with executives, clear...

  • speaker photo
    Henryk Ciejek
    VP, Information Security, PayScale, Inc.

    Henryk has actively been part of the technology space for over 25 years. He has worked at various companies ranging from start-ups to established global Fortune organizations. Throughout his career, he's worn many hats and titles, focusing on his passion for cybersecurity, business goals, and program building. Having been the first security l...

  • speaker photo
    Jared Lee
    Sr. Security Engineer, HubSpot

    With nearly 10 years at HubSpot, Jared leads automation initiatives within the Corporate Security team, elevating security measures to new levels. With extensive experience in the cybersecurity field, he is dedicated to building automated solutions to safeguard HubSpot's environment, driven by a passion for detection and incident response.

  • speaker photo
    Chas Clawson, Guest Speaker
    Field CTO – Security Solutions, Sumo Logic
  • speaker photo
    Kevin Sisney
    Solutions Architect, Seemplicity
  • speaker photo
    Stephen Head, Moderator
    National Director – Cyber Risk Center of Expertise, Jefferson Wells

    As the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both pub...

  • speaker photo
    Jimmy Phipps
    Regional VP of Sales – East, LightBeam.ai

    Data Security, Privacy, and Governance Evangelist at LightBeam.ai With more than 11 years of experience in selling cloud-based and enterprise-focused technology solutions, Jimmy has developed strong skills in new business development, customer relationship management, and strategic partnerships. He has also gained domain expertise in DPA, clo...

  • speaker photo
    Abhinav Singh
    Head of Security Research, Normalyze

    Abhinav leads security research at Normalyze. He has previously worked for companies like AWS, Netskope, and JPMorgan. His contributions to the security community include international books, academic papers, patents, and blogs. He is an active speaker and trainer at conferences like Black Hat, DEF CON, and RSA.

  • speaker photo
    Sanaz Yashar
    Co-Founder & CEO, Zafran Security
  • speaker photo
    Amy Bogac
    Former CISO, The Clorox Company

    Amy Bogac was most recently the CISO and Vice President of Enterprise Security and Infrastructure at The Clorox Company. With a passion for securing great brands, Amy previously led the Global Information Security and Infrastructure department for CF Industries, was the Director of IT Security Operations for the Walgreen Company, a member of ...

  • speaker photo
    Todd Knapp
    CEO, Envision Technology Advisors

    Todd has been providing IT services nationally for over 25 years and draws inspiration and insight from participation in a wide range of executive boards and industry associations. He has an extensive background in strategic planning and implementation of business technology solutions, and founded his firm Envision Technology Advisors. As a p...

  • speaker photo
    Amanda Berlin
    Lead Incident Detection Engineer, Blumira

    Amanda Berlin is Lead Incident Detection Engineer at Blumira, bringing nearly two decades of experience to her position. At Blumira, she leads a team of incident detection engineers who are responsible for creating new detections based on threat intelligence and research for the Blumira platform.

    An accomplished author, speaker, and po...

  • speaker photo
    Blaise Fello
    Solutions Architect, Syxsense

    Blaise is currently a Solutions Architect at Syxsense and has been working in the IT field for the last 12 years as part of retail, MSP contracted to educational systems, and systems administrator for a spectral imaging startup company. He currently holds A+, Network+, Server+, and Security+ Certifications.

  • speaker photo
    Jon Cassell
    Sr. Solutions Architect, Syxsense

    Jon Cassell is currently a Senior Solutions Architect at Syxsense and has been working in the IT and Infrastructure industries for the last 15 years. Before working at Syxsense, Jon was an IT Manager for a large financial services firm and has a background in Accounting and Tax consultation. He currently holds an MCSA in Server Infrastructure...

  • speaker photo
    AccessIT Representative
  • speaker photo
    Charles Garzoni
    Deputy CISO & Staff VP, Cyber Defense Operations, Centene Corporation

    Charles Garzoni is deputy CISO Centene Corporation and responsible for cyber defense operations. His career spanned multiple industries, law enforcement, and the military specializing in building teams to investigate, analyze, and attribute both nation-state and criminal cyber attacks. Over his career he has worked hundreds of high-profile i...

  • speaker photo
    Rocco Fiore
    Solutions Architect, Syxsense

    Rocco Fiore is a Solutions Engineer at Syxsense. Rocco has an eclectic experience profile within IT and Security, helping customers over the past seven years successfully implement transformational technologies in the areas of network security, wireless communications, and endpoint security. Experienced as a customer advocate and technical ex...

  • speaker photo
    Alkin Gorgun
    Sr. SASE Leader, Canada, Cloudflare

    Alkin specializes in helping drive Digital Transformation and Cybersecurity initiatives in the enterprise. At Cloudflare, he leads the SASE (Secure Access Service Edge) product portfolio for Canada, working with organizations across all verticals to build a safer, faster, more reliable Internet. Previously, Alkin was head of MIS3’s Cybersecur...

  • speaker photo
    Manoj Tripathi, Moderator
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C...

  • speaker photo
    Peter Thornton
    Sr. Security Consultant, AccessIT Group
  • speaker photo
    Cátia Pereira
    Manager, North American Sales Engineering, Kiteworks

    Helping CISOs achieve complete visibility of the sensitive content across the enterprise network, and recognize and mitigate risk associated with that content.

  • speaker photo
    Dr. Russell Handorf, Guest Speaker
    Computer Scientist, FBI Cyber Division HQ (Former)
  • speaker photo
    Carlos Bacquet
    Principal Solutions Architect, Lacework

    Carlos Bacquet is a Principal Solutions Architect at Lacework where he solves Cloud Security problems for enterprise customers in the Toronto region. Before joining Lacework Carlos spent the last 15 years working on network management and security applications in the Telecommunications, Cable and Streaming Media industries. Carlos holds a Bac...

  • speaker photo
    Clinton Herget
    Field CTO, Snyk

    Clinton Herget is Field CTO at Snyk, the leader in Developer Security, where he focuses on crafting and evangelizing our strategic vision for the evolution of DevSecOps. A seasoned technologist, Clinton spent his 20-year career prior to Snyk as a web software developer, DevOps consultant, cloud solutions architect, and engineering director. C...

  • speaker photo
    Ashley-Yvonne Howard
    Sr. Cloud Security Strategist, Panther

    Ashley-Yvonne Howard is an experienced cloud security strategist with a master's degree in Cybersecurity from the University of Denver, complementing her undergraduate degrees in German Language and Literature & Film Studies, which reflects her unique fusion of art and science. With a career marked by unwavering determination and adaptability...

  • speaker photo
    Gregory Wilson
    CISO, Putnam Investments
  • speaker photo
    Lina Dabit, Moderator
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto

    Lina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while...

  • speaker photo
    George Al-Koura
    CISO, Ruby Life; Co-Host, Bare Knuckles & Brass Tacks Podcast
  • speaker photo
    Rafal Los
    Head of Services Strategy & GTM, ExtraHop
  • speaker photo
    Amit Zimerman
    Co-Founder & CPO, Oasis Security

    Amit Zimerman, Co-Founder and Chief Product Officer at Oasis, is a seasoned leader with a diverse technical and product background. Before co-founding Oasis, he played pivotal roles at CyberMDX, and Microsoft, bringing a wealth of product and security expertise. Amit also had significant contributions during his seven-year tenure in Israeli M...

  • speaker photo
    Tommy Perniciaro
    VP, Solution Architecture, Halcyon

    Tommy Perniciaro is a highly experienced cybersecurity professional with over 20 years of experience in protecting critical network assets and data against cyber threats. Tommy has extensive experience with security technologies, including DDoS mitigation, intrusion detection and prevention systems, firewalls, SIEMs, and vulnerability scanner...

  • speaker photo
    Andrei Velicanu
    Principal Solutions Engineer, Okta

    Andrei is a Principal Solutions Engineer who has served Okta's enterprise customer base for over six years. Andrei is committed to helping organizations understand what they can achieve with Okta and is experienced in all stages of the product lifecycle, including demos/PoCs, system architecture, product implementation, and user training. He...

  • speaker photo
    Matthew Burroughs
    CISO, Novolex
  • speaker photo
    Travis Kaylor
    Sr. Special Agent, Boston Field Office, U.S. Secret Service

    Senior Special Agent Travis Kaylor has spent the last 22 years in a variety of roles both domestic and abroad, focused on the dual mission of the United States Secret Service across both protection and investigations. He began his career as a Uniformed Division Officer assigned to the White House Branch and later as a Special Agent in the Was...

  • speaker photo
    Sean Donlon
    Sr. Special Agent, U.S. Secret Service – Burlington, VT

    A 22-year veteran of the United States Secret Service, Senior Special Agent Sean Donlon currently manages the Burlington office, overseeing investigations of cyber and financial crimes in the state of Vermont. Prior to his post in Vermont, Senior Special Agent Donlon served as an assistant attaché for the Secret Service in the United States ...

  • speaker photo
    Peter LaRoche
    Network Intrusion Forensic Analyst, U.S. Secret Service – Manchester, NH

    Peter LaRoche has served as a Network Intrusion Forensic Analyst (NIFA) with the US Secret Service out of the Manchester Resident Office since September 25, 2023. As a NIFA, Mr. LaRoche is responsible for providing expert guidance to the Secret Service as well as federal, state, and local partners in network and digital forensics. This inclu...

  • speaker photo
    Gabrielle Bryant
    VP, Cyber Practice Leader, Cadence Insurance

    As the Cyber Practice Leader, Gabrielle Bryant focuses on the strategic and operational vision regarding how cyber exposures will impact our clients as well as researching methodologies to mitigate emerging cyber threats and their intersectionality with other lines of coverage.

    Before becoming Cyber Practice Leader, Gabrielle Bryant wa...

  • speaker photo
    Jacob R. Guffey
    Supervisory Special Agent for the Intrusion Squad, Charlotte Division, FBI
  • speaker photo
    Matt Warren
    Cybersecurity Attorney
  • speaker photo
    Chris Usserman
    Chief Technologist, Infoblox

    Chris Usserman is the Chief Technologist with Infoblox Federal. Chris has over 33 years’ experience in the U.S. Intelligence Community helping clients understand and incorporate cyber business intelligence to improve cyber security programs. With a focus on the U.S. Government and public sector, Chris brings a public/private perspective to en...

  • speaker photo
    John Newsome
    Solutions Engineer, Claroty

    John is a 30-year industry veteran in IT and cybersecurity and has worked for some of the most recognizable brands in cybersecurity such as Palo Alto Networks, Cisco Systems, Blue Coat (now Symantec), and Websense (now Forcepoint). John has been a guest speaker and panelist at numerous industry events and tradeshows and has served as a subjec...

  • speaker photo
    Charles Chu
    General Manager, IT and Developer Solutions, CyberArk
  • speaker photo
    Scott Margolis, Moderator
    CISO, Massachusetts Bay Transportation Authority (MBTA)

    Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business cont...

  • speaker photo
    Michael Ferguson
    Director, Security Transformation, Netskope

    Michael Ferguson is the Global Director for Security Transformation at Netskope. He is a highly customer-focused security professional, having worked in the cyber security industry for over 15 years across the Asia Pacific Region. Michael has been CISSP certified for over 7 years, speaking at various industry events (e.g. Gartner, AusCert, an...

  • speaker photo
    Nick Duda
    Security Architect, HubSpot

    With over 25 years of experience in the cybersecurity industry, he has dedicated a decade to HubSpot, concentrating on safeguarding the corporate environment through the deployment of various cutting-edge security tools. Nick holds multiple vendor certifications, including Netskopes NSCO&A and NSCI&I. As a client of various security vendors, ...

  • speaker photo
    Jeff Williams
    Founder & CTO, Contrast Security
  • speaker photo
    Justin Rainey
    SVP, CISO & CPO, UMB Bank

    Justin Rainey serves as Chief Information Security Officer and Chief Privacy Officer at UMB Financial Corporation. In this role, he is responsible for establishing strategy and overseeing implementation of an effective, integrated, and proactive information security and privacy program. He is also responsible for advising and partnering with ...

  • speaker photo
    Dr. Howard Goodman
    Sr. Technical Director, Skybox Security

    Howard Goodman, with a distinguished career spanning two decades, has emerged as a pivotal figure in cybersecurity, seamlessly integrating strategic planning with hands-on cybersecurity applications across numerous sectors. His significant contributions to organizations like Skybox Security highlight his prowess in navigating through the intr...

  • speaker photo
    Tom O'Malley, Moderator
    Advisor to The Identity Theft Resource Center; Founder, Frozen Pii LLC

    Tom O’Malley is the founder of FrozenPii.com, a public service website promoting free security credit freezes and help for identity theft victims. He also serves as a consultant to the non-profit Identity Theft Resource Center. Previously, Tom was a career state (5 years) and federal prosecutor (32 years) in South Florida and Western North C...

  • speaker photo
    Thomas Watson, CISM, CISSP
    CISO, isolved HCM

    Tom Watson has more than 25 years of experience in Information Risk Management and Security. His focus is on enabling businesses to be more productive while not losing focus on security and integrity of key corporate data. He has knowledge and experience working for multinational organizations as well as having fulfilled international assignm...

  • speaker photo
    Mike Brannon, Moderator
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Eric Robuck, Instructor
    Cybersecurity Specialist and Founder of The Valander Group

    Eric Robuck is a seasoned cybersecurity expert with over two decades of experience in the industry. As the owner and founder of The Valander Group, he leads a team of top-notch business experts dedicated to providing comprehensive cybersecurity solutions for business owners.

    Eric's extensive military background as a Warrant Officer fo...

  • speaker photo
    Dan Murphy, Moderator
    Chief Architect, Invicti

    Dan Murphy has 20+ years of experience in the cybersecurity space, specializing in web security, distributed systems, and software architecture. As a Chief Architect at Invicti, his focus is on ensuring that Invicti products across the entire organization work together to provide a scalable, performant, and secure dynamic analysis experience....

  • speaker photo
    Kevin Werner
    System Director, IT Security Operations, Main Line Health

    Kevin is the System Director of Security Operations at Main Line Health, a mid-sized hospital system in Suburban Philadelphia, where his team oversees all non-GRC aspects of information security. He has more than a decade of information security experience and is a licensed attorney in Pennsylvania and New Jersey. He currently holds a CISSP c...

  • speaker photo
    Lisa Jones-Huff
    Sr. Director, Global Security Specialists, Elastic

    Lisa Jones Huff is a seasoned cybersecurity expert with over two decades of experience in the field. As the Senior Director of Global Security Specialists, SA Team at Elastic, she brings a wealth of knowledge and a consultative approach to the table.

    Lisa's passion lies in helping organizations identify and tackle their ongoing securit...

  • speaker photo
    Erik Gaston
    CIO for Financial Services, Tanium

    Erik comes to Tanium from AppDynamics (part of Cisco), where he spent almost five years in field sales. For the past two years, he was the CTO for the East Sales Team, which is responsible for generating more than half of the company's revenue with a focus on large financial firms in the region. Prior to that, he built out and headed the Busi...

  • speaker photo
    Jason Schwent
    Senior Legal Counsel, Clark Hill PLC
  • speaker photo
    Elastic Representative
  • speaker photo
    Aruna Sreeram
    Sr. Director, Product Management, Information Protection, Proofpoint

    Aruna leads the Enterprise DLP and Insider Threat Management solutions at Proofpoint and joined the company in 2019 through the acquisition of ObserveIT. She has 20+ years’ experience in leading cybersecurity product and strategy at several organizations including Leidos, RSA, and Axeda (PTC). She is currently working within her organization ...

  • speaker photo
    Chad Hicks
    CISO, MercuryGate International

    Chad is a proven InfoSec leader, with nearly 10 years' experience as a CISO. He has significant experience managing people, process, and technology to reduce risk and deliver business value. He has successfully led multinational companies through mergers and acquisitions, divestitures, and rapid security certifications.

    An experienced ...

  • speaker photo
    Brent Bigelow, Host
    President, Charlotte Metro ISSA Chapter

    Brent is a seasoned Cybersecurity Leader with 36+ years of IT and Information Security experience and a passion for enhancing Cybersecurity through awareness training, architecture design, thought leadership, policy, people, process, and technology. He has worked in many industries including healthcare, aviation, financial, government, automo...

  • speaker photo
    Julie Rizzo
    Partner, K&L Gates LLP

    Julie Rizzo is a partner in the firm's Capital Markets practice group. Julie has substantial experience representing companies in a variety of capital markets and corporate governance matters. She focuses her practice on advising clients on SEC reporting and disclosure issues, stock exchange compliance, and environmental, social and governanc...

  • speaker photo
    Hugo Lai
    CISO, Temple Health
  • speaker photo
    Craig Pfister
    GVP, Solutions Engineering, Kiteworks
  • speaker photo
    Sean Goodwin, Guest Speaker
    Senior Manager, Wolf & Company, P.C.

    Sean is a Senior Manager in Wolf’s DenSecure group. His role entails developing security reviews and managing projects, including security reviews, penetration tests, social engineering, and threat emulation. Sean has over ten years of experience in consulting and has worked extensively in the financial, healthcare, education, and software se...

  • speaker photo
    Representatives from North Carolina State Board of Elections; State of North Carolina; and Mecklenburg County Elections
  • speaker photo
    Arielle Baine
    Chief of Cybersecurity, Region 3, DHS CISA
  • speaker photo
    Lina Dabit, Inspector
    RCMP Officer in Charge, Cybercrime Investigative Team Toronto

    Lina Dabit joined the RCMP in 1994 and started her career in British Columbia where she spent 13 years posted to detachments up and down eastern Vancouver Island. She was lucky for the opportunity to work a variety of duties ranging from uniform patrol, drug section, major crime, intelligence, border integrity, and running a police boat while...

  • speaker photo
    Molly Dodge, Moderator
    Information Security Analyst, Federal Reserve Bank of Philadelphia
  • speaker photo
    Dan Elliott
    Principal, Cyber Security Risk Advisory, Zurich Resilience Solutions (ZRS) Canada

    Dan Elliott is the Principal for Cyber Security Risk Advisory at Zurich Resilience Solutions (ZRS) Canada and is responsible for supporting Zurich’s clients in making risk-based cyber security decisions to improve their overall organizational resilience. Dan has over 15 years of experience in national security and risk management and brings a...

  • speaker photo
    Debra Brown
    Vice President, Savvy

    Debra Brown brings over 25 years of experience in cybersecurity. Starting her career at Xerox and then honing her experience in high-growth startups like Ping Identity and Chainalysis, Debra excels in introducing innovative security technologies to the market. Her dedication extends beyond her professional sphere as she is also a passionate l...

  • speaker photo
    David van Heerden
    Product Evangelist, Automox
  • speaker photo
    Candace McCaddon
    Attorney - Tech, Cyber, and Privacy Contracts, Candace McCaddon Law
  • speaker photo
    Bryan Perkola
    VP, Information Security, First Community Credit Union

    Bryan Perkola, CISSP, CISM, is a passionate cybersecurity professional and IT veteran with over thirty years of experience primarily in organizations associated with manufacturing, retail, and finance. Bryan holds multiple bachelor's degrees from the University of Houston in Marketing and Organizational Behavior and Management and has receive...

  • speaker photo
    Mike Ste Marie, Moderator
    Security Program Manager, Office of the Secretary, Commonwealth of Massachusetts

    Mike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a...

  • speaker photo
    Lisa Angelo
    Cyber Liability & Data Privacy Attorney, Angelo Law Firm PLLC

    Lisa M. Angelo has a law practice focused on cyber liability & data privacy. With over a decade of experience, Lisa is one of the first attorneys in Texas to earn a board certification in privacy law, a credential issued from the International Association of Privacy Law Professionals and recognized by the State Bar of Texas. In addition, Lisa...

  • speaker photo
    Matthew Maynard
    Analyst, Security Incident Response III, BJC HealthCare

    Matthew Maynard a seasoned cybersecurity professional with a wealth of experience in IT security and incident response. Currently serving as an IT Security Incident Response Analyst at BJC HealthCare, Matthew specializes in monitoring operations, networks, and infrastructure for security issues. His expertise extends to ethical hacking, penet...

  • speaker photo
    Zscaler Representative
  • speaker photo
    Tony Bryan
    Executive Director, CyberUp

    Tony, CyberUp’s Executive Director, has served the nonprofit community for more than 14 years. He spent nine years serving in the United States Army, where he was known as the youngest Military Police Sergeant in Brigade. Succeeding his time in the Military, Tony was appointed by the Governor of Missouri to serve on the Workforce Development ...

  • speaker photo
    Blumira Representative
  • speaker photo
    Thomas Heverin
    Cybersecurity Teaching Professor and Pentesting Project Lead, Drexel University

    Former Navy researcher turned cybersecurity educator, Dr. Thomas Heverin ignites minds at The Baldwin School, an all-girls college preparatory school, and Drexel University. He empowers future ethical hackers, sparks innovation with tools like ChatGPT, and uncovers critical ICS vulnerabilities. Google hacks, new hacking modules, new GPTs, and...

  • speaker photo
    James Thompson, Moderator
    Director, Information Security, Hypertherm Associates

    James brings more than 20 years of experience in Information Technology including seven years in cybersecurity within the manufacturing vertical. He has a passion for team development and attributes his program’s success to relationship and team building skills developed earlier in his career. He started his career in higher education and has...

  • speaker photo
    Dana Tannatt
    Sr. Sales Engineer, Thales

    Dana Tannatt graduated from Norwich University with a master’s degree in information security and assurance. He is also a member of the Upsilon Pi Epsilon honor society for Computing and Information Disciplines. He has been a Security and Privacy software specialist for more than 18 years. He has extensive experience with Identity Access Gove...

  • speaker photo
    Dominic Keller
    First Vice President & Senior Consultant, Alliant Insurance

    Dominic Keller has global experience across the cybersecurity, law and risk management fields. Dominic has worked as an attorney in Australia and California, a cyber risk consultant, and a cyber insurance broker with domestic and international companies across many industries. He holds the CISSP certification and has studied Corporate Strateg...

  • speaker photo
    Graham Brooks
    Lead Solutions Architect, Syxsense

    Graham is a Pre-Sales Manager at Syxsense and has been working in the IT and Security industries for the last seven years. Before working at Syxsense, he was an IT Analyst for a major DOE and DOD Security manufacturing company. He currently holds the RHCE and Security Plus certifications.

  • speaker photo
    Burton Kelso
    TEDx and Cybersecurity Technology Speaker
  • speaker photo
    Shevani Jaisingh
    Senior Counsel, TittmannWeix
  • speaker photo
    Margaux Weinraub
    Cyber Practice Leader, Graham Company, a Marsh & McLennan Agency LLC Company
  • speaker photo
    Ian Forrest
    Global VP of Solutions Engineering, Hunters

    As the Global VP of Solutions Engineering at Hunters, Ian brings two decades of technology experience, specializing in application and database security, SOC operations, and SOAR. With a background in leading industry players, Ian’s contributions include several patents in the SOAR space, showcasing a sustained commitment to advancing cyberse...

  • speaker photo
    Nancy Hunter
    Board President, WiCyS Delaware Valley Affiliate

    Nancy Hunter is certified in Risk and Information Systems Controls (CRISC) and holds a B.A. in Mathematics from Temple University.

  • speaker photo
    Graeme Barrie
    President & CISO, Netmechanics Inc.

    Graeme is a CISO with more than 25 years in IT risk and security governance in government, healthcare, and manufacturing sectors. He fell in love with computers when he discovered a Tandy TRS80 at the public library in the rural Ontario town he grew up in. Fast forward to today, where Graeme assists business leaders in understanding that cybe...

  • speaker photo
    Bill Tenerelli
    VP, Incident Response, BlackRock
  • speaker photo
    Robert Pavone
    VP, Threat Detection Management, BlackRock
  • speaker photo
    Matthew Jochym
    VP, Cyber Observability, BlackRock
  • speaker photo
    Evgeniy Kharam, Moderator
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with...

  • speaker photo
    Evgeniy Kharam
    Cybersecurity Architect and Evangelist

    Evgeniy is built and wired differently. As a father of four, including twins, he has mastered the art of remaining unflappable in the face of adversity. His career, which began on the technical frontlines as a firewall deployment engineer, has evolved remarkably to a VP of Architecture at The Herjavec Group. This journey has provided him with...

  • speaker photo
    Hunters Representative
  • speaker photo
    Seemplicity Representative
  • speaker photo
    Ian Schneller, Moderator
    CISO, Health Care Service Corporation

    A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...

  • speaker photo
    Zafran Representative
  • speaker photo
    Colleen Lennox, Moderator
    Founder & CEO, Cyber Job Central
  • speaker photo
    Mark Eggleston, CISSP, GSEC, CHPS, Moderator
    CISO, CSC

    Mark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, ...

  • speaker photo
    Idan Gour
    Co-Founder & CTO, Astrix Security

    Idan Gour is the CTO and co-founder of Astrix Security, a leading enterprise solution securing app-to-app interconnectivity. Having served as a leader in the elite class of the Israeli Military Intelligence Unit 8200, his hands-on offensive and defensive cyber experience affords him a unique attacker point of view. Previously, Gour also led s...

  • speaker photo
    Phil Curran, Moderator
    CISO & CPO, Cooper University Health Care

    Phil Curran has more than 25 years of experience in information security and privacy in the military, government and private sectors. As the Chief Information Assurance Officer and Chief Privacy Officer at Cooper University Health Care in Camden NJ, he is responsible for managing governance and regulatory compliance, risk assessment and manag...

  • speaker photo
    Kevin Powers, J.D., Moderator
    Professor; Founder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston College

    Kevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Program at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College’s Carroll School of Management’s Business Law and Society Department. Along with his teaching at Boston College, Kevin is a C...

  • speaker photo
    William Kyrouz
    Information Security Director, Paul, Weiss, Rifkind, Wharton & Garrison LLP

    William (Bill) Kyrouz is Information Security Director at Paul Weiss, one of America’s most prestigious law firms. Bill has worked in the legal industry for about twenty years, with a four year stint in Higher Education Technology , and has served in dedicated Information Security roles for the last 12. Prior to Information Security he work...

  • speaker photo
    Ben Howard
    VP, IT & Cybersecurity, Inari Agriculture

    Ben originally asked ChatGPT to write his bio, but felt it was self-aggrandizing, pompous, and unbearably long. After many efforts to tell ChatGPT to tone it down a bit, he gave up and wrote it himself. Ben is a Cybersecurity and IT leader with over 25 years of experience. He specializes in rapidly maturing cybersecurity programs from scratch...

  • speaker photo
    Fabio Martins
    BISO, Omnicom Group
  • speaker photo
    John Finizio
    VP, Security, Risk & Compliance, Whistic
  • speaker photo
    Daniel Pinsky
    CSO and Head of Security, Governance & Compliance, CDW Canada

    Daniel is an accomplished cybersecurity professional with more than two decades of experience, serving diverse clients across North America and Europe across the financial, public, and technology sectors. His expertise encompasses technical roles and leadership positions, including leading the implementation and certification of essential sec...

  • speaker photo
    Dan Hopkins
    VP of Engineering, StackHawk

    Dan Hopkins, VP of Engineering at StackHawk, has been a software engineer for 20 years, working at high-growth startups such as VictorOps and LivingSocial and large high-tech companies such as Splunk. For the last ten years, he has focused on building tools for progressive engineering teams adopting DevOps and DevSecOps practices.

  • speaker photo
    Merritt Baer
    Field CISO

    Merritt is a security executive based in Miami, FL. She serves as Field CISO at Lacework, a cloud security unicorn, and serves as an advisor to a number of young companies including expanso (container orchestration and compute at the edge, based on open source protocol bacalhau). She advises executives on cloud security and go to market, from...

  • speaker photo
    Scott Register, Moderator
    VP, Security Solutions, Keysight
  • speaker photo
    Stuart Smith
    Enterprise Security Architect, Delta Air Lines

    Stuart Smith is the Enterprise Security Architect for Delta Air Lines reporting to the CISO. He is one of the senior security advisors to the security organization and is responsible for providing security input into various business and technology initiatives across the company. Stuart has over 23 years of professional experience in the cybe...

  • speaker photo
    Ali Abbas Mehboob Hirji
    Lead, Cybersecurity Services at YES, and Professor

    With over 16 years of experience, Ali has been a driving force in team development and leadership across various phases of the IT development lifecycle. His career milestones include pioneering the expansion of Durham College’s Cybersecurity Innovation Center and the establishment of their cutting-edge AI and Cybersecurity labs. Ali's leaders...

  • speaker photo
    Audrey Long
    Sr. Security Software Engineer, Microsoft

    Audrey Long is a Senior Security Software Engineer at Microsoft. She is passionate about making security accessible both to software engineers and as a career for girls in STEM. She holds DoD secret clearance and a Master of Science degree in Cyber Security from Johns Hopkins University.

  • speaker photo
    Rhea Michael Anthony
    Product Security Architect – Associate, SAP

    Rhea Michael Anthony is a Product Security Architect Associate at SAP's Global Security team. Her mission is to research and develop robust software security and secure software development practices that support innovation and champion a security-first culture that impacts products across SAP. She is actively engaged in researching threats a...

  • speaker photo
    Syxsense Representative
  • speaker photo
    Envision Technology Advisors Representative
  • speaker photo
    Snyk Representative
  • speaker photo
    Rapid7 Representative
  • speaker photo
    Natalia Bakhtina, MBA, CRISC
    Director of Cybersecurity and IT Risk Management, BFL CANADA

    Natalia Bakhtina is a strategic CISO-level leader and is globally recognized as the Women in IT Canada Finalist 2022. Natalia holds a Master’s of Business Administration Degree from Dalhousie University and is Certified in Risk and Information Systems Control (CRISC).

    Experienced results-oriented strategic professional in cybersecurit...

  • speaker photo
    Paul Lynch, Moderator
    Director, Information Security, CubeSmart

    Paul Lynch, who has more than 20 years of experience in information technology, is Director of Information Security and Infrastructure for CubeSmart Self Storage. He has established security governance programs and best practices for government, non-profit, private, and publicly traded organizations ranging from technology startup to city. He...

  • speaker photo
    Katie Crowley, Moderator
    AVP, eRisk Underwriting, Crum & Forster
  • speaker photo
    Steve Naphy, Moderator
    CIO, Morgan, Lewis & Bockius LLP

    Steve Naphy serves as Morgan Lewis's Chief Information Officer. In his role, Steve concentrates on leveraging data analytics and process to drive efficiency and effectiveness in both business operations and the delivery of legal services. He has over 20 years of experience working in information technology (IT), including previously running i...

  • speaker photo
    Violet Sullivan, Moderator
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions, Crum & Forster

    Violet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to de...

  • speaker photo
    Justin Armstrong, Moderator
    Founder, Armstrong Risk Management LLC

    Justin Armstrong is a security, privacy, and regulatory compliance consultant with over 25 years of experience in the Healthcare Industry. He worked as a vCISO at FractionalCISO, managed security at Healthcare Cybersecurity startup Tausight, and led Product Security at MEDITECH, a top three Electronic Health Record vendor. He has engaged with...

  • speaker photo
    Dave Heaney
    CISO, Mass General Brigham
  • speaker photo
    John Fanara
    Director, IT Security, Plymouth Rock Assurance

    John Fanara is the Director of IT Security at Plymouth Rock Assurance, a leading auto and home insurer in the Northeast. Before joining Plymouth Rock, John served as CISO at the Risk Management Foundation of the Harvard Medical Institutions (CRICO). John has been overseeing Security and IT Infrastructure teams for over 22 years and has a pas...

  • speaker photo
    Rob Barberi
    Director, Chief Client Officer, FINEX NA Cyber Security & Professional Risk, WTW
  • speaker photo
    Infoblox Representative
  • speaker photo
    Panther Representative
  • speaker photo
    Thales Representative
  • speaker photo
    Astrix Security Representative
  • speaker photo
    Google Representative
  • speaker photo
    Veriti Representative
  • speaker photo
    Andrew Smeaton, Moderator
    CISO, Afiniti

    Andrew holds over 22 years of experience in the banking, financial services, and healthcare industries. He is experienced in all facets of IT/IS Security & Risk Management including acquisitions and disaffiliations, and has a track record of developing and implementing security strategies from inception through execution. In addition to his c...

  • speaker photo
    Greg Garcia
    Executive Director, Health Sector Coordinating Council Cybersecurity Working Group

    Greg served as former (and nation's first) Assistant Secretary for Cybersecurity and Communications at the U.S. Department of Homeland Security, appointed by President Bush in 2006. He also led the Financial Services Sector Coordinating Council, and served in Congress and senior industry executive roles in technology and security.

  • speaker photo
    Keith McMenamin
    VP of IT, Visit Philadelphia

    Keith McMenamin is the Vice President of Information Technology at VISIT PHILADELPHIA®, the region’s official tourism marketing agency. In his 17 years with VISIT PHILADELPHIA®, Mr. McMenamin is credited with building and securing the technical infrastructure for an award-winning organization that was responsible for creating $11 billion doll...

  • speaker photo
    Mendsaikhan Amarjargal
    Fulbright Scholar, MSISPM Student, Carnegie Mellon University

    Mendsaikhan Amarjargal, a Fulbright Scholar and a GXPN certificate holder (1103), is pursuing his graduate studies in Information Security Policy and Management at Carnegie Mellon University. Before embarking on his academic journey, Amarjargal amassed nine years of industry experience, during which he worked from an Information Security Anal...

  • speaker photo
    Delgerbayar Lochin
    Fulbright Scholar, MSISPM Student, Carnegie Mellon University

    Delgerbayar Lochin is a Fulbright Scholar and 2nd-year master’s student in the Information Security Policy and Management program at Carnegie Mellon University. Preceding his degree pursuit at CMU, he accumulated 8 years of experience in both private and public sectors. During this time, he held key roles such as Team Leader at the Cybersecur...

  • speaker photo
    Jimmy Benoit
    VP, Cybersecurity & Program Management, PBS
  • speaker photo
    Paul Schmeltzer
    Partner, Clark Hill PLC
  • speaker photo
    Hemanth Tadepalli
    Cybersecurity and Compliance Engineer, May Mobility

    Hemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and other...

  • speaker photo
    David Anderson
    Vice President, Cyber Liability, Woodruff Sawyer

    David focuses on complex cyber, privacy, technology, and professional liability issues and is a dedicated and fierce advocate for his clients.

  • speaker photo
    Diana Riley, Moderator
    VP, Sr. Manager - Cyber Oversight, Citizens Financial Group Inc.

    Diana knows what is required to develop and enhance an information security program. She specializes in gathering evidence, preparing for and conducting information security audits, and due diligence visits. Additionally, she is an expert in assisting small to mid-size companies in presenting their information security posture to potential bu...

  • speaker photo
    Josephine Wolff
    Associate Professor, Computer Science; Engineering Director, The Fletcher School at Tufts University

    Josephine Wolff is an associate professor of cybersecurity policy at The Fletcher School at Tufts University. Her research interests include liability for cybersecurity incidents, international Internet governance, cyber-insurance, cybersecurity workforce development, and the economics of information security. Her first book "You'll See This ...

  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information ...

  • speaker photo
    Tony Goulding
    Cybersecurity Evangelist, Delinea
  • speaker photo
    Eliott Tallqvist
    Product Marketing, Hoxhunt
  • speaker photo
    Eliot Baker
    Content Marketing Lead, Hoxhunt
  • speaker photo
    Jon Gellin
    Threat Operations Lead, Hoxhunt
  • speaker photo
    Maxime Cartier
    Human Risk Management Advisor, Hoxhunt

    Maxime has built Security Awareness, Behavior, and Culture programs for global companies in manufacturing, aerospace, and at H&M Group. His goal is to help organizations switch from just raising awareness to effectively changing behaviors and culture.

  • speaker photo
    Connie Glaspie
    Regional Vice President of Sales, ForgeRock

    RVP of Sales serving Western North America & LATAM for the global digital leader ForgeRock. Leading a team of security sales professionals, responsible for managing some the world’s largest enterprises throughout Western Canada & USA, Argentina, Chile, Peru, Columbia, Mexico and Brazil.

    Connie brings over 19+ years of digital identity...

  • speaker photo
    Evan Shelley
    RVP, Sales Engineering Strategy, Rubrik
  • speaker photo
    John C. Checco
    President, ISSA NY Metro Chapter
  • speaker photo
    Glen Sorensen
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information ...

  • speaker photo
    Glen Sorensen, Moderator
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information ...

  • speaker photo
    Peter Tse
    Head of Information Security, CTBC Bank New York Branch

    Peter is the head of Information Security for CTBC Bank New York branch, where he oversees the Cyber Security Program. With more than 25 years of experience in financial services, information security, and information technology, Peter has expertise in cybersecurity governance, risk management, and cybersecurity technologies.

  • speaker photo
    Jenny Moshea
    CIO / CISO, Sellen Construction

    My magic spans numerous industries where I've led teams to new worlds. I speak tech and love geeks. I'm the bridge between business and technology. I eat risk for breakfast yet am passionate to the pixel. I inspire new thinking and brand everything. Experts seek me out and people want to be part of what I create. I forged the role of CIO wher...

  • speaker photo
    Benjamin Benhan
    Global Privacy and InfoSec Attorney, eBay

    With over six years of experience in privacy and data governance, Ben is a passionate and driven global privacy and infosec attorney at eBay, where he helps the company navigate the complex and evolving regulatory landscape of data protection and cyber security. He has a strong background in computer science, cyber security, network engineeri...

  • speaker photo
    Anne Purtell
    Community Manager, CREST USA

    An experienced professional transitioning from a successful career in occupant protection engineering to technical community management, Anne blends technical expertise with exceptional communication and leadership skills. Her unique background in ensuring the safety and effectiveness of critical civilian and military equipment now informs my...

  • speaker photo
    Jessica Labouve
    Sales Engineer, Cymulate

    Jessica LaBouve, eCPPTv2, CEH, has spent her entire career specializing in offensive security. She started as a penetration tester performing application, network-level assessments, and social engineering. This experience ultimately led her to become a Solutions Architect at Bishop Fox, where she helped facilitate the scoping and sale of offe...

  • speaker photo
    Mike Sheward
    Head of Security, Xeal

    Mike Sheward is Head of Security at Xeal, an EV Charging hardware startup. Mike has around 18 years experience building security programs. Originally from the UK where he worked mostly in penetration testing and digital forensics, Mike moved to the US in 2011, where he has been focused on running security teams for SaaS companies ever since. ...

  • speaker photo
    Robert Kraczek
    Global IAM Strategist, One Identity

    Robert Kraczek, Global Strategist with One Identity, has more than three decades of security experience, with a specialization in Identity Security. Over the years, Robert has worked with, implemented solutions, and advised customers in all major industries as well as local, state and federal governments. Robert’s responsibilities include wor...

  • speaker photo
    Robert Mazzocchi, Moderator
    VP, Identity & Access Management for Global Information Security & Compliance, AIG

    Robert Mazzocchi was the Vice President Identity & Access Management for Global Information Security & Compliance at AIG for 16 years. In this role, he had corporate responsibly for the implementation of the AIG’s Identity & Access Management Strategy and Program across AIG’s global business lines.

    Prior to joining AIG, Mr. Mazzocchi h...

  • speaker photo
    Arlenee Lopez-Ferguson, Moderator
    SVP & CISO, Pendulum Holdings, LLC

    Arlenee Lopez-Ferguson is a dynamic cybersecurity professional with proven expertise in strategizing, developing, and leading change across organizations.

    She is currently the Chief Information Security Officer at Pendulum Holdings, LLC, a strategic investment and advisory platform that seeks to accelerate opportunity and value creatio...

  • speaker photo
    Henry Jiang, Moderator
    CISO, Diligent Corporation

    Henry Jiang is a seasoned cybersecurity professional with extensive experience and expertise in securing software-as-a-service (SaaS) companies. As the Chief Information Security Officer (CISO) at Diligent Corporation, Henry is responsible for developing and implementing robust security strategies that protect the company's valuable assets, d...

  • speaker photo
    Pari Sarnot
    Risk Advisory Practice - Cyber Privacy and Risk, Grant Thornton LLP (US)

    Privacy Consulting Director with Blueprint Technologies- Over 10 years of international consulting and industry experience, with Fortune 500 clients across US and Europe. Consulting Practice Lead including Managed Services for Strategy and Risk, focused on clients in Technology, Retail and Payment sectors.

    Possess a strong understandin...

  • speaker photo
    Alexander Vitruk
    Sr. Associate Attorney, BakerHostetler

    Alex Vitruk advises clients in complex data privacy and cybersecurity matters, offering practical solutions to help companies comply with rapidly evolving privacy and data protection laws and defending class actions in this cutting-edge space. Alex advises and defends clients across different industries on multifaceted issues such as biometri...

  • speaker photo
    Vlad Brodsky
    CISO, SVP of IT Operations and Infrastructure, OTC Markets Group Inc.

    Vlad Brodsky is the Chief Information Security Officer and SVP of IT Operations and Infrastructure at OTC Markets Group, a regulated publicly traded financial institution that operates the world’s largest OTC equity electronic marketplace.

    Vlad has a bachelor’s in computer science and economics from Brandeis University, an MBA from NYU...

  • speaker photo
    Tom Brennan, Moderator
    Executive Director, Americas Region, CREST

    Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrast...

  • speaker photo
    Lana DeMaria
    Head of Data Governance and Privacy, Alaska Airlines

    Lana is a motivated and results-oriented leader with 20+ years of international experience.

    She is experienced in supervising and training teams, building global enterprise-wide programs from the ground up, and leading, planning & executing projects in a variety of industries, ranging from aviation to software, to manufacturing, to tel...

  • speaker photo
    Jake Olcott
    Vice President, Government Affairs, BitSight

    Jacob (Jake) Olcott has been in the cybersecurity industry since 2005 and currently serves as the Vice President of Communications and Government Affairs for BitSight. In his role, he helps organizations benchmark their cybersecurity programs using quantitative metrics and provides thought leadership and recommendations regarding the role of ...

  • speaker photo
    Charles Lee
    Enterprise Sales Engineering Manager, Rubrik
  • speaker photo
    Alexander Abramov
    Head of Information and Cyber Risk, Santander Capital Markets

    Alex Abramov is senior leader in Technology and Cyber Governance, Risk, and Compliance with strong track record of accomplishments across all three lines of defense - Controls, Risk, and Audit. He had created and led highly effective IT and Cyber risk management programs that addressed regulatory requirements and enabled business growth, expa...

  • speaker photo
    Thanh Thai
    CISO, VP, Constellis

    As a technology leader with 15 years of experience, Thanh develops IT strategic plans, creates governance frameworks and processes, and aligns IT organization priorities with business strategy. He leads digital transformation to create innovative business models, optimize technology capabilities, and develop competitive advantages. His deep e...

  • speaker photo
    Jared Pfost
    Independent Consultant

    Jared is a builder and leader of information security teams and products with more than 20 years of learnings. From startups to global enterprises, he's worked across multiple industries with expertise in secure development, risk management, visual story-telling, and consulted across all InfoSec domains. Over the past few years, he's invested...

  • speaker photo
    Jeff Edstrom
    Director, Infrastructure Security, AccessIT Group

    Jeff Edstrom is the Director of Infrastructure Security at AccessIT Group (AITG). Jeff is a cybersecurity leader with over twenty years of experience managing infrastructure, security, compliance and support teams across North America and Europe. Jeff enjoys solving complex problems, getting to the root cause and deploying robust solutions th...

  • speaker photo
    Andy Stewart
    ISSA-PS Board Secretary; Division Cybersecurity Officer, PNW, CommonSpirit Health
  • speaker photo
    Andy Baker, Moderator
    Regional Director, Optiv

    Andrew Baker built a base of skills starting with the earliest implementations of 4th Generation Languages, originator of operator company wide voice mail systems, to seeing the product development and deployment of the first off switch Home Location Register and Authentication Center (HLR/AC) which dramatically improved AT&T’s call handling ...

  • speaker photo
    BitSight Representative
  • speaker photo
    Saketh Machavarapu
    Business Development Manager, SSH Communications Security

    With over 13 years of experience working in Unix and Cybersecurity teams in Fortune 500 companies, Saketh currently is responsible for Pre-sales, Architecture and Strategic Accounts in Americas. Prior to SSH, Saketh spent most of time in enterprise architecture and evaluating solutions that are eventually deployed into Production along with D...

  • speaker photo
    Kartik Maddali
    Senior Solutions Engineer, Okta

    Accomplished Business and Technology professional with over a decade focused on strategic account software sales, advanced enterprise software applications, modeling, business process optimization, solution development and software implementation. Strong technical and business acumen with the ability to execute a wide range of strategies desi...

  • speaker photo
    Ian Moore
    Cybersecurity State Coordinator/Advisor, Region 10, State of WA, DHS CISA

    Ian serves as the Cybersecurity State Coordinator for the State of Washington for CISA, based in Olympia, WA. He supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.

    His program coordinates cyber preparedness, risk mitigation, and incident resp...

  • speaker photo
    Doug Drewry
    Director of IT, CISO, Blueprint
  • speaker photo
    Chris Harding
    Solutions Engineer, Outshift by Cisco
  • speaker photo
    Stefan Braicu
    Customer Success Manager, Outshift by Cisco
  • speaker photo
    Oren Koren
    Co-Founder & CPO, Veriti

    Oren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings 19 years of experience in cybersecurity, advanced threat analysis, and product management,. Prior to founding Veriti, Oren was a Senior Product Manager at Check Point Software Technologies, where he led AI-based innovations and advanced data analytics projects redef...

  • speaker photo
    Jake Bernstein, Esq., Moderator
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP

    Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense cou...

  • speaker photo
    Zabrina McIntyre, Host
    President, WiCyS Western Washington Affiliate
  • speaker photo
    Philip Conrod, Moderator
    CEO, Kidware Software LLC

    Philip Conrod has served in various IT leadership roles (Manager, Director, ISO, CISO & SVP/CIO) during his 35-year career for companies like Raytheon Technologies (Sundstrand), Safeco Insurance, CRU (FamilyLife), Kenworth Truck Company, PACCAR, and Darigold. Philip has been a CISM since 2003. Philip currently serves as the CEO of Kidware Sof...

  • speaker photo
    Bryce Carter
    Deputy Director of IT, CISO, City of Arlington

    Bryce Carter is a nationally-recognized leader known for his transformative impact on organizational culture and his ability drive cybersecurity as a key business enabler. Bryce has not only developed groundbreaking security strategies that safeguard data, but has also focused on the broader welfare of communities. His visionary approach has ...

  • speaker photo
    David Balcar
    Security Strategist, VMware Carbon Black

    Balcar has over 18 years of experience in security and extensive knowledge of security research, network penetration testing, incident response and computer forensics. At VMware, he is responsible for the activities of the VMware Carbon Black portfolio, including EDR, App Control, Cloud Endpoint, Cloud Enterprise EDR, Cloud Audit and Remediat...

  • speaker photo
    Biagio DeSimone
    Enterprise Solutions Architect, Aqua Security

    Biagio DeSimone is an experienced Solutions Architect with a history of working in the cloud native application space. Skilled in Kubernetes, Containers, Cloud Platforms and Pre-Sales, Biagio is currently an Enterprise Solutions Architect at Aqua Security. In his role, Biagio works to educate organizations on the importance of container and c...

  • speaker photo
    Outshift by Cisco Representative
  • speaker photo
    Philip Dawson
    Head of AI Policy and Assurance, Armilla Assurance
  • speaker photo
    Donovan Blaylock
    Sr. Director of Solutions, SecureAuth
  • speaker photo
    Jeffrey Jones, Moderator
    CISO, Milliman

    Jeff Jones is the Chief Information Security Officer (CISO) for Milliman, Inc., an actuarial consulting and solutions firm headquartered in Seattle. Jeff is responsible for managing the information security program that encompasses 130 Practices in 80 cities, and supports over 8000 clients and more than 500M participants worldwide. Jeff was ...

  • speaker photo
    Kevin Murphy, Moderator
    Business Information Security Officer (BISO), T-Mobile USA

    Kevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT sec...

  • speaker photo
    Chris Boykin
    Software Engineering Director, CyCognito

    Chris Boykin joined CyCognito in 2022, his first job on the vendor side, after spending over 20 years on the VAR side. Starting his career at NASA as an electronics technician, he eventually worked his way into computer networking, where he obtained the coveted CCIE certification. He has spent the last 15 years focusing on cybersecurity, wher...

  • speaker photo
    Sara Ricci
    Information Risk, Governance, and Resilience Executive, Hudson's Bay Company (Former)

    Sara Ricci is an accomplished executive with a proven track record in global leadership roles, building new capabilities and enhancing organizational resilience. She is experienced in Risk Management and Technology Enablement in highly regulated financial and energy sectors. Sara excels at building trust and credibility with executives, clear...

  • speaker photo
    David Sigman
    Cortex Systems Engineer, Palo Alto Networks

    David Sigman has spent the last 20 years working with enterprise customers to make informed decisions about their cybersecurity challenges. He is a passionate cybersecurity evangelist and likes working closely with customers on turning endless alerts into actions through the power of automation. When not working, David likes to spend time pla...

  • speaker photo
    John Wang
    VP, Product Management - Platform, Saviynt

    John Wang currently serves as Saviynt’s VP of Product Management for its Enterprise Identity Cloud Platform, the industry’s most complete identity security solution. In this role, John is responsible for supporting the platforms IGA, PAM, AppGRC, and third-party identity security capabilities. He has more than 20 years of product development ...

  • speaker photo
    Sabino Marquez
    Chief Trust Officer, Pantheon.io

    Sabino Marquez is the Chief Trust Officer at Pantheon.io, a premier provider of WebOps solutions for Drupal and WordPress sites globally. His approach to leading cybersecurity as a ‘Trust Product Practice’ has led to substantial returns on security investments, higher value-generation velocity, and enhanced equity valuations. Sabino leads the...

  • speaker photo
    Cliff Steinhauer
    Director, Information Security & Engagement, National Cybersecurity Alliance

    Cliff Steinhauer is a passionate information security and privacy professional. Currently based in Seattle, he has over a decade of experience in sales, marketing, and project management. With the National Cybersecurity Alliance, Cliff works to direct community engagement through live events, educates through thought leadership, and runs the ...

  • speaker photo
    Benjamin Corll
    CISO, Americas, Zscaler

    Ben is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, a...

  • speaker photo
    Petri Kuivala
    CISO Advisor, Hoxhunt

    With more than 25 years of experience, Kuivala was most recently the Vice President of General IT and User Experience at NXP Semiconductors. Prior to this role, Kuivala was a long-time security executive at Nokia, serving as the company's CISO and CSO throughout his tenure of more than a decade. He helped form a streamlined and co-operative s...

  • speaker photo
    Rubrik Representative
  • speaker photo
    Automox Representative
  • speaker photo
    Delinea Representative
  • speaker photo
    Hoxhunt Representative
  • speaker photo
    ForgeRock Representative
  • speaker photo
    Tony UcedaVelez
    Vice Chairman, Penetration Testing Focus Group Sub-Committee, CREST

    After nearly 25 years of IT/ InfoSec work across a vast range of industries, experience has fueled my drive to deliver a better information security consulting practice. In 2007, I started VerSprite (aka VerSprite Security) with the idea of developing a team of 'security hybrids' - consummate security professionals that personify both technic...

  • speaker photo
    Kelly Robertson
    Principal Security Practitioner, Horizon3.ai

    Over 30 years of professional information security experience in 30 countries across various disciplines, technical areas and market segments. Holds key industry certifications including CISSP #409644, F5 and Imperva WAF, Microsoft ISA, CheckPoint, CSI Encryption, and WhiteHat web security analyst. Also serves on the board of Silicon Valley I...

  • speaker photo
    Chris Tillett
    Sr. Engineer, Strategic Product Intelligence, Palo Alto Networks

    Chris currently works for Palo Alto Networks in R&D, helping customers stay ahead of threat actors and helping our products stay customer focused. His experience with UEBA and IAM helped drive the ITDR module to not only focus on Identity based attacks, but also the entire Identity lifecycle helping to improve outcomes for customers and detec...

  • speaker photo
    Mary Greenlee, Moderator
    Field CTO & Principal Solutions Engineer, Okta

    Mary Greenlee serves as a Field CTO and Principal Solutions Engineer at OKTA, where she leads programs to mitigate the security risks of large-scale integrations of enterprise applications. Her multifaceted expertise in databases, networking protocols, and server systems coupled with her business acumen allows her to address today’s unique cy...

  • speaker photo
    Davin Darnt
    CISO, Americas, Louis Vuitton

    With a dynamic career spanning 20 years, including seven years at prestigious luxury retail company, Louis Vuitton. Davin Darnt currently excels as the Chief Information Security Officer (CISO) for the Americas region. His journey in the company has been marked by significant leadership roles, including Head of IT Operations and Head of Tech...

  • speaker photo
    Tom Harrington
    Information Security Engineer, World Wide Technology
  • speaker photo
    Andrew Wilder
    Adjunct Professor, Cybersecurity, Washington University in St. Louis

    Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security E...

  • speaker photo
    Samantha Zee
    Enterprise IT Policy Manager, State of Washington

    As Washington State’s Enterprise IT Policy Manager, Samantha Zee shepherds the IT policy updates and waiver requests. She previously managed a 24/7 answering service, leveraging the latest technology to encourage human connections serving government, private, and non-profit clients. She earned her MBA while serving as Western Washington Unive...

  • speaker photo
    Renita Rhodes
    Adjunct Professor, Management Information Systems and Cybersecurity, Harris Stowe State University

    Renita M. Rhodes is a seasoned professional with over 22 years of distinguished experience in Information Technology (IT), IT Audit, Risk Management, Compliance, and Cybersecurity. She currently holds the role of Vice President, Audit Manager - Cybersecurity Manager at a prominent global bank, where her expertise is instrumental in safeguardi...

  • speaker photo
    Ariel Weil
    VP, GTM Strategy, Cyera

    With more than 20 years of cross-functional knowledge and experience focusing on data security, compliance, risk management, cloud adoption, digital transformation, and modern application architectures, Ariel (Ari) Weil leads Cyera’s go-to-market (GTM) efforts as the Vice President of GTM Strategy. As a hands-on executive, Ari brings his know...

  • speaker photo
    Mitch Morice
    Sr. Systems Engineer, Illumio
  • speaker photo
    Steve Pettit
    Sr. Manager, Operations IT – Applications Security, Verizon

    Steve holds the CISSP certification.

  • speaker photo
    Steve Curtis
    Chief Cyber Business Officer, CYGNVS

    Steve is a global cybersecurity executive helping organizations prevent, prepare for, and respond to a cyberattack. Over 20 years in cybersecurity, Steve has worked with the leaders in cybersecurity including Palo Alto Networks, Accenture, and PwC. He has served hundreds of organizations around the world, envisioned, and launched multiple new...

  • speaker photo
    Yolanda Reid
    Director, Business Strategy and Growth, Raytheon BBN

    Passionate about addressing the problems related to cybersecurity and technology of the future. People speak about innovation, but Yolanda encourages innovation from workplace entry to developing new tools, solutions, and techniques. As a former U.S. Department of Defense civilian for more than 20 years, she has been "doing cyber" before we h...

  • speaker photo
    Parrish Gunnels
    SVP & CISO, Sunflower Bank

    Parrish is currently SVP & CISO of Sunflower Bank and has more than 25 years of technology experience and more than 14 years in cybersecurity. During this time, Parrish has worked in various functions of technology, risk management, infrastructure services and support, audit and compliance, incident response, and cybersecurity / information s...

  • speaker photo
    David Wren, Host
    President, InfraGard Saint Louis Members Alliance
  • speaker photo
    Roftiel Constantine, Host
    Global CISO, Barry-Wehmiller

    Roftiel also serves as Vice President of the InfraGard Saint Louis Members Alliance.

  • speaker photo
    Andrew Neville
    Director, Channel & Sales Engineering, WithSecure

    Andrew has more than 10 years of experience in strategic alliances at BitSight and Recorded Future, currently leading the WithSecure Product and Services commercial and sales engineering teams in North America.

  • speaker photo
    Michael Clinton
    Detective, St. Louis County Police Department, Intelligence Operations Bureau
  • speaker photo
    Ryan Frillman, Moderator
    CISO, Equifax Workforce Solutions
  • speaker photo
    Craig Reeds, Moderator
    Senior Controls Surveillance & Compliance Analyst, Ameren

    Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Complia...

  • speaker photo
    Rebecca Barton
    Claims Director, Cowbell
  • speaker photo
    William Birchett, Moderator
    Treasurer, ISC2 Dallas-Ft. Worth
  • speaker photo
    Damien Burks, Moderator
    Cloud Security Engineer - VP, Citi
  • speaker photo
    Dr. Adrian M. Mayers, Moderator
    VP & CISO, Premera Blue Cross

    Dr. Adrian M. Mayers joined Premera Blue Cross in November 2019 as Vice President, IT and Chief Information Security Officer (CISO) for Premera Blue Cross. Dr. Mayers is responsible for providing and optimizing an enterprise-wide security program and architecture that minimizes risk, enables business imperatives, and further strengthens Preme...

  • speaker photo
    Matt Hillary
    Vice President of Security & CISO, Drata

    Matt Hillary is the Vice President of Security and CISO at Drata—a continuous security and compliance automation company—where he oversees Drata’s global security, IT, compliance, and privacy strategy and programs. With 15+ years of security experience, Matt has a track record of building and leading exceptional security programs. He has been...

  • speaker photo
    Albert Caballero
    Americas Field CISO Director, SentinelOne

    Albert Caballero is a patented cybersecurity expert, systems integrator, and published technologist with a passion for security engineering, cloud computing, and threat intelligence. Currently Field CISO at SentinelOne, he has acted as Global Head of Security Engineering at Warner Bros. Discovery and BISO with WarnerMedia and ATT. Co-founded ...

  • speaker photo
    Oded Hareven
    CEO & Co-Founder, Akeyless
  • speaker photo
    Robb Reck
    Co-Founder & Podcast Host, Colorado = Security

    Robb Reck, MBA, CISSP, is an information security and risk professional, with over 20 years of experience in IT, Compliance, and Information Security. Reck has created comprehensive application security programs for multiple financial institutions.

  • speaker photo
    Anmol Agarwal
    Security Researcher, Nokia

    Anmol Agarwal is a security researcher at a Fortune 500 Company and is focused on securing AI and Machine Learning in 5G and 6G. She holds a doctoral degree in cybersecurity analytics from George Washington University and a master’s degree in computer science from the University of Texas at Dallas. She previously worked at the U.S. Cybersecur...

  • speaker photo
    Kurt Sanger
    Director, Integrated Cybersecurity Partners, LLC
  • speaker photo
    Josh Yost
    Sr. Director, Systems Engineering, Palo Alto Networks

    Josh is an experienced cybersecurity leader with over 20 years in security and networking. He has spent the last decade at Palo Alto Networks where he has held multiple roles, beginning with Next Generation Firewalls and Network Security, and now leading the Cortex Systems Engineering and Solutions Architecture teams for North America. Josh a...

  • speaker photo
    Tina Lampe
    Director, IT Software Engineering, DIRECTV

    Tina Lampe, CISSP, CISM, PMP, is a highly-effective, seasoned, and influential technology delivery leader with 20+ years of experience working in varied Critical Software Development and Strategic Technical Program/Project/Product Management roles including groundbreaking automation. Tina recently obtained a Master of Science in Cybersecurity...

  • speaker photo
    Habibeh Deyhim
    Director of Customer Success, Horizon3.ai
  • speaker photo
    Robin Purnell
    Sr. Security Engineer, Trend Micro

    Robin Purnell currently works as a Senior Security Engineer at Trend Micro. With almost two decades of experience, he has made significant contributions to the global security landscape, partnering with organizations worldwide to tackle their most pressing security challenges. His expertise spans diverse industry sectors, including corporate,...

  • speaker photo
    Brittany Weinstein, Moderator
    Manager, Cybersecurity, KPMG
  • speaker photo
    Elaine Doyle
    VP, Data Security Architecture, Salesforce
  • speaker photo
    Erika Voss
    VP, Engineering & Security, Capital One
  • speaker photo
    Kristen Beneduce
    Deputy CISO, Corporate Security Engineer, Nextdoor
  • speaker photo
    Alex Diaz
    Customer Success Lead, Horizon3.ai
  • speaker photo
    Armando Aguilar
    Solutions Engineer, Okta

    Armando is a Solutions Engineer whose expertise lies in developing comprehensive strategies that enable organizations to manage identity and access privileges efficiently while mitigating security risks around the Okta Identity Cloud. Armando has a deep understanding of industry best practices and a proven track record of successful implement...

  • speaker photo
    Madi Brumbelow
    Digital Forensics Analyst, Bank of America

    Madi Brumbelow (she/they) works as a Digital Forensics Analyst at Bank of America. She has been working at the Bank since June of 2020, when she started as an intern in the Technology Analyst Program. As a Digital Forensics Analyst, Madi works on investigations to reduce and mitigate risk to the Bank, its employees, and its customers. Madi re...

  • speaker photo
    Lumakar Challa
    IT Director, JBS; Secretary, ISC2 Denver Chapter

    Lumakar Challa is a transformational technical leader who transforms application and database infrastructure for large, complex Global Fortune 500 companies. His greatest talent is creating Trusted Advisor relationships with senior technology, corporate, and business line stakeholders. He defines strategies to deliver savings and improvements...

  • speaker photo
    Robert Blythe
    VP, InfoSec & Technology Risk Manager, WWE

    Robert has over 30 years of Information Technology experience and has been a leader in the cybersecurity space for almost a decade. His areas of expertise are in Cybersecurity Operations and Threat Intelligence, Cybersecurity Engineering, Information Security and Governance, Data Privacy and Compliance, and Technology Risk Management.

  • speaker photo
    Thomas Scott
    vCISO & CEO, Cyber Sherpas

    Thomas Scott (Tom) is the Executive Director of the South Carolina Cybersecurity Association and Foundation. As the inaugural Director of the SC Cyber Consortium, he has been a key leader in the cyber education, cyber workforce development, and cyber protection efforts in both South Carolina and across the Nation. He is the CEO of CyberSherpa...

  • speaker photo
    Dan Shoemaker, Moderator
    Professor and Graduate Program Director, UDM

    Daniel P. Shoemaker, PhD, is a Full Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy, where he has worked for over 35 years. He has retired from his administrative position as Department Chair, PI for the NSA Center and Subject Matter Expert for DHS and NIST. He is enjoying more time with his ...

  • speaker photo
    Kip Boyle, Moderator
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial ...

  • speaker photo
    SentinelOne Representative
  • speaker photo
    Melissa Lopez-Barbosa
    Interim Secretary, Washington State InfraGard Member's Alliance
  • speaker photo
    Palo Alto Representative
  • speaker photo
    Cymulate Representative
  • speaker photo
    Rajesh Nanwani
    Director, Information Security, Roush

    Rajesh is the Chapter President of ISSA Motor City.

  • speaker photo
    Violet Sullivan
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster

    Violet Sullivan works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and n...

  • speaker photo
    Nick Hayes
    Sr. Director, Cyber Solutions, SureCloud

    As part of the SureCloud cyber services division's leadership team, Nick is responsible for developing and executing the strategy for the cyber testing team. Along with the responsibility for developing tech-led consulting service propositions that combine our expertise, the SureCloud platform and technology. Additionally, Nick oversees and d...

  • speaker photo
    Juan Rodriguez
    CTO & Founder, Whistic

    After graduating from college, Juan joined numerous startups in the Los Angeles area, specifically focusing on the early stages of what we now know as SEO. During that time, Juan established himself as a seasoned engineer and learned the ins-and-outs of running a company.

    In 2011, a large eCommerce company approached Juan, and he and h...

  • speaker photo
    Jake Bernardes
    CISO, Whistic

    Jake is a technology leader with significant experience in funding rounds, delivering security transformation and building best in class security functions.

    Passionate, innovative & pragmatic with an understanding of what makes businesses tick and how to take them from start up or growth phase to enterprise level security capabilities,...

  • speaker photo
    Scott Aschenbach, Moderator
    Director of IT Security, CISO, Hygieia, Inc.
  • speaker photo
    Randy Lariar
    Practice Director, Big Data & Analytics, Optiv
  • speaker photo
    Andrew Johnson
    Solutions Architect, State of Washington

    Andrew Johnson is a solutions architect based in Olympia, WA, responsible for the State's adoption of SD-WAN technology and interconnecting state government with cloud-based resources and external business partners. Andrew spearheaded the development of the state's SD-WAN strategy, oversaw proof of concept efforts, and designed solutions that...

  • speaker photo
    Mike Costello
    Strategic Planning & Design Manager, State of Washington

    Mike Costello is a strategic planning & design manager based in Olympia, WA. Mike oversees solution architecture, systems engineering, and capacity management to develop effective IT strategies. His expertise in networking, computing, and security allows him to harmonize and integrate diverse infrastructure technologies into comprehensive des...

  • speaker photo
    Marwan Youssef
    Third Party Cybersecurity Program Leader, General Motors

    Marwan Youssef is an accomplished cybersecurity and risk management expert with over 25 years of experience leading information security and technology programs at large organizations. Marwan is currently serving as the Third Party Cybersecurity Program leader at General Motors.

    Prior to GM, Marwan was the Client Management Executive f...

  • speaker photo
    Marie Olson
    Deputy Chief Privacy Officer (CPO), Boeing
  • speaker photo
    Cynthia Damian
    CISO, Valon
  • speaker photo
    Tom Cline
    VP, Cyber Risk, Skybox Security

    15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include - designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO's.

  • speaker photo
    Sam Masiello, Moderator
    CISO, The Anschutz Corporation

    Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to Beckage, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the protection of employ...

  • speaker photo
    Zachary Lewis
    AVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis

    Zach Lewis serves as the CIO and CISO for the University of Health Sciences and Pharmacy. He handles IT Strategic Planning, Cyber and Physical Security, Enterprise Risk Management, Infrastructure Management, IT Governance and Compliance, and day-to-day technology leadership. He volunteers on IT advisory boards for SIUE and UMSL and is an offi...

  • speaker photo
    Tyler Thornsberry
    SOC Analyst and Red Team Operative, Universal Logistics Holdings

    Tyler Thornsberry is a SOC Analyst for Universal Logistics who holds a Bachelor’s Degree in Information Security from Oakland University. He provides an offensive perspective in the threat landscape with his experience in pen-testing. Ranging from Active Directory to web applications, Tyler has engaged in numerous red-team exercises in an eff...

  • speaker photo
    Joe Wilson
    Sr. Security Engineer, BI Incorporated

    With over 15 years in IT and 5 years in cybersecurity, Joe is a recognized leader in safeguarding global digital landscapes. His experience and commitment IT and cybersecurity has seen him contributing to large and high-profile assignments such as the 2020 US Census Bureau Project through the Department of Commerce to his current task with th...

  • speaker photo
    J.D. Perham
    Solutions Architect, Acronis

    With five+ years of experience as a sales engineer with Acronis, John currently works with some of the company’s largest enterprise customers, helping them develop, deploy, and maintain software to ensure system uptime and business continuity. John’s expertise also includes working with smaller to medium businesses so he understands the compl...

  • speaker photo
    Ryan Davis
    Sr. Director, Enterprise Sales, Acronis

    Ryan brings over a decade of storage and data management experience to Acronis leading a commercial enterprise sales organization. Acronis’ enterprise sales team is focused on helping organizations improve their business continuity plans and reduce cyber exposure in historically difficult computing areas such as the edge, endpoints, industria...

  • speaker photo
    James Slaby
    Director, Cyber Protection, Acronis

    James R. Slaby is the Director of Cyber Protection at Acronis. Previously, Slaby was an industry analyst covering cybersecurity, cloud computing and networking at Forrester Research, HFS Research, Yankee Group and The Info Pro. He has also held solutions, vertical, product and campaign marketing roles at tech security and networking vendors i...

  • speaker photo
    Alex Wood, Moderator
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security...

  • speaker photo
    Christopher Hetner
    Co-Chair, Cybersecurity and Privacy, Nasdaq

    Chris Hetner is a Senior Executive, Board Director, and leader in Cybersecurity recognized for raising cyber risk to the Corporate Board level to protect industries, infrastructures, and economies. He creates operational resilience by aligning robust Cybersecurity strategies with business objectives. Mr. Hetner’s professional judgment combin...

  • speaker photo
    Skybox Representative
  • speaker photo
    Michael Silva
    Leader of Solution Engineering, Outshift by Cisco

    Michael Silva is the Leader of Solution Engineering within Cisco’s Outshift team. He is a technology leader with over 17 years of experience. He joined Cisco via the acquisition of Lightspin, where he was the Director of Technical Solutions. At Lightspin, Michael designed the technical go-to-market strategy, developed strategic partnerships, ...

  • speaker photo
    Edgar Acosta
    Deputy CISO, Open Technology Solutions, LLC
  • speaker photo
    Tim Gallo
    Mandiant Principal Architect, Google Cloud

    Tim Gallo leads the Google Global Solutions Architecture Team that covers Security Risk Solutions, including Cyber Threat Intelligence, traditional Intelligence Operations, Managed Detection and Response, Security Controls Validation, and Attack Surface Management and asset discovery. He Joined Google Cloud through the acquisition of Mandiant...

  • speaker photo
    Kamara Watson, Jr.
    Former VP, Cyber Strategy, BNY Mellon
  • speaker photo
    Craig Hurter
    Sr. Director, Information Security, State of Colorado Governor's Office of Information Technology

    Craig has worked in the IT industry for over 25 years and has focused on security for the past 15 years. He started in security as a forensic analyst and incident handler. After doing that for several years he moved into leadership in the InfoSec space and has been leading security teams in different capacities for the past 12 years. Craig ha...

  • speaker photo
    Acronis Representative
  • speaker photo
    Cynthia Gonzalez
    Senior Product Marketing Manager, Exabeam

    Cynthia Gonzalez is a Sr. Product Marketing Manager at Exabeam. An advocate for customers, she’s focused on their use of technology to enable and simplify work. She is at her best when bridging the gap between sophisticated software products and the benefits customers can expect.

  • speaker photo
    Wes Spencer
    VP, Cybersecurity Strategy, CyberFOX

    Wes Spencer is a nationally recognized technology innovator and co-founder of multiple cybersecurity companies including Perch Security which was successfully acquired in 2020. He has numerous awards including the 2020 Cybersecurity Educator of the Year by the Cybersecurity Excellence Awards. Wes has been featured in The Wall Street Journal, ...

  • speaker photo
    Wei Chen Lin
    Cybersecurity Advisor, Region 5, CISA

    Mr. Lin serves as a Cybersecurity Advisor (CSA) in Region 5 (IL, IN, MI, MN, OH, WI) at the Cybersecurity and Infrastructure Security Agency (CISA). Based in Chicago, IL, Wei Chen supports CISA’s mission of strengthening the security and resilience of the nation’s critical infrastructure.
    As a CSA, Mr. Lin conducts various cyber prepare...

  • speaker photo
    Sumi Gorla
    Director of Systems Engineering, Illumio

    Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West.

    Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as E...

  • speaker photo
    Team Cymru Representative
  • speaker photo
    Illumio Representative
  • speaker photo
    Netskope Representative
  • speaker photo
    Optiv Representative
  • speaker photo
    Alexander Salazar Jr.
    Cybersecurity Advisor, Region 10, DHS CISA
  • speaker photo
    Michael Bacon
    Managing Partner, Rezolvrizk LLC; Former CSO, Wells Fargo

    Michael is the Founder and Managing Partner at Rezolvrizk (pronounced “resolve risk”), a boutique risk management firm specializing in assisting companies in resolving their physical security, information security, investigative, and conduct management risks. Rezolvrizk clients span a wide range of businesses and industries to include brand n...

  • speaker photo
    Bryce Matsuoka, Moderator
    Outreach Director, ISSA Puget Sound
  • speaker photo
    Charlotte Hooper
    Director & Helpline Manager, The Cyber Helpline

    Charlotte is the Helpline Manager at The Cyber Helpline and has supported thousands of victims of cybercrime and online harm, specializing in cyberstalking and technology-facilitated intimate partner violence. On top of her role at The Cyber Helpline, Charlotte has a first-class degree in Policing and Criminal Justice and a masters degree in ...

  • speaker photo
    Chris Roberts, Moderator
    CISO and Senior Director, Boom Supersonic

    Chris is the CISO for Boom Supersonic and works as an advisor for several entities and organizations around the globe. His most recent projects are focused within the aerospace, deception, identity, cryptography, Artificial Intelligence, and services sectors. Over the years, he's founded or worked with several folks specializing in OSINT/SIG...

  • speaker photo
    Exabeam Representative
  • speaker photo
    CyCognito Representative
  • speaker photo
    Jeff Hudesman
    CISO, Pinwheel

    Jeff is the Chief Information Security Officer at Pinwheel. He leads the Information Security function responsible for securing and protecting information and systems while ensuring overall cyber resiliency. Jeff previously held global leadership positions at DailyPay, Sony and PR Newswire. Jeff also advises several startups and nonprofits. J...

  • speaker photo
    David Mau
    Cybersecurity Consultant, WSP USA
  • speaker photo
    Shanae Chapman
    Founder, CEO & Managing Director, Nerdy Diva

    Shanae Chapman has secure tech experience from her work at HashiCorp, Boeing, Akamai, MathWorks, Red Hat, and IBM. She is currently the strategic project partner for clients working with the Nerdy Diva team. She leads the areas of business strategy, user research, design, content creation, and training on client projects. She holds degrees fr...

  • speaker photo
    Melissa Ventrone
    Partner, Data Privacy & Cybersecurity, Clark Hill PLC

    Melissa Ventrone focuses her practice on class action privacy litigation, privacy breach response (pre- and post-event), payment card industry (PCI) standards and investigation, and advising clients in identifying, evaluating and managing first- and third-party data privacy and security risks. Melissa has represented numerous clients in litig...

  • speaker photo
    Patryk Stachowiak
    Chief Product Evangelist, Tenfold Security

    Patryk has years of experience in technical support, presenting IT solutions, and sales in a global IT market. He enjoys traveling, meeting, and interacting with different people all around the world. He is highly customer service-driven and likes to build strong relationships with clients.

  • speaker photo
    Chris Sistrunk
    Technical Leader on the ICS/OT Security Consulting team, Mandiant (now part of Google Cloud)

    Chris Sistrunk is Technical Leader on the Mandiant ICS/OT Security Consulting team at Mandiant (now part of Google Cloud) focusing on helping protect and secure critical infrastructure around the world for over 9 years. Before Mandiant, Sistrunk was a Senior Engineer at Entergy for over 11 years where he was a subject matter expert for Transm...

  • speaker photo
    Robyn Ready
    CISO, KnitWell Group

    With more than 17 years’ experience in the cybersecurity field, Robyn has led five organizations in their transformation from no security program or a minimal security program to a mature security organization. Starting with an organization that needed to achieve NIST compliance to survive, moving to a large financial firm, and then into the ...

  • speaker photo
    Mo Wehbi
    Head of Cybersecurity, Penske Automotive Group

    As the Director of Information Security & Project Management Office within the IT department at Penske Automotive Group, Mo oversees the implementation and governance of cybersecurity and IT service management best practices across the organization. He has over 18 years of experience in leading and managing complex IT projects, portfolios, an...

  • speaker photo
    Julian Wayte
    Solutions Engineering Manager, Uptycs

    Julian Wayte is a highly skilled cybersecurity professional specializing in cloud security. With over a decade of experience in the industry, Julian has become an expert in protecting digital assets and ensuring the security and integrity of cloud-based systems.

    Julian's passion for technology and security began early in his life, spar...

  • speaker photo
    Jay Chetty
    Cloud Security, Confidential Computing, Intel

    Jay Chetty is a seasoned Cloud Security Architect, responsible for overseeing the end-to-end security of the Intel Developer Cloud, a service offering from Intel. His experience spans multiple projects, where he has skillfully navigated the complexities of cloud-based systems to optimize security. His unwavering dedication and insightful stra...

  • speaker photo
    Richard Staynings
    Board Member and International Healthcare Cybersecurity Luminary; Teaching Professor, University of Denver

    Richard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised...

  • speaker photo
    Frannie Matthews
    President & CEO, Colorado Technology Association

    Frannie is a passionate leader who drives energy and innovation in everything she touches. With over 35 years of experience in the technology sector, Frannie provides clarity in the face of complexity and uncertainty. She believes that transformation is the key to success in today's business climate. Frannie is continuously scanning for re...

  • speaker photo
    Tsvi Korren
    Field CTO, Aqua Security

    Tsvi Korren, CISSP, has been an IT security professional for over 25 years. In previous positions at DEC and CA Inc., he consulted with various industry verticals on the process and organizational aspects of security. As the Field CTO at Aqua, he is tasked with delivering commercial and open source solutions that make Cloud Native workloads t...

  • speaker photo
    Changiz Sadr
    Director, Cyber Security Global Alliance

    Changiz Sadr is an accomplished Telecommunications Engineer, licensed Professional Engineer in Ontario, and a distinguished Fellow of Engineers Canada. With a strong background in Communications Infrastructure Engineering and Cybersecurity, he has made significant contributions to the field throughout his career. Changiz holds prominent posit...

  • speaker photo
    Robert Loy
    Executive Director of Innovation, Grand Canyon University

    Robert Loy is the executive director of academic success and innovation at Grand Canyon University. After 18 years in technology roles as a programmer and IT leader and 20 years in education at the Maricopa Colleges, Robert joined Grand Canyon to reshape the technology training and learning landscape and help provide marketable technology ski...

  • speaker photo
    Yasmin Karimli, Moderator
    Vice President, Strategic Transformation, T-Mobile USA
  • speaker photo
    Mark Clancy
    Sr. Vice President, Cyber Transformation, T-Mobile USA
  • speaker photo
    Tim Rains
    Vice President, Digital Security, T-Mobile USA

    Tim is the author of the book "Cybersecurity Threats, Malware Trends, and Strategies."

  • speaker photo
    Larry Yarrell, II
    Chief Development Officer / Diversity & Inclusion Program Development, The Marcus Graham Project
  • speaker photo
    Amit Basu
    VP, CIO & CISO, International Seaways
  • speaker photo
    Bidemi Ologunde
    Sr. Intelligence Analyst, Expedia Group

    Bid is a seasoned intelligence analyst with years of experience and industry certifications in security operations, threat intelligence, cybercrime investigations, inter-agency collaboration, and lots more. He's currently a Senior Intelligence Analyst at Expedia.

  • speaker photo
    Zachary Warren
    Chief Security Advisory, EMEA, Tanium
  • speaker photo
    Shawn Geib
    CISO, Honeywell
  • speaker photo
    Shua Gamradt
    Sr. Director, Rugged DevOps & Enterprise DevOps Ambassador, Alight Solutions

    Joshua "Shua" Gamradt is set on influencing culture change and introducing security by investing in others through the development and delivery of gamified security, engineering customer centric security solutions, focusing on risk, and utilizing continuous feedback and data to drive decisions. Shua began this journey of shifting empathy left...

  • speaker photo
    Helmut Semmelmayer
    VP, Revenue Operations, tenfold Software North America

    In his role as VP Revenue Operations at the Austrian IAM software company tenfold, Helmut has been responsible for partner sales and product marketing across Europe and North America since 2012.

    Right at the start of his tenfold career, he launched the company’s direct sales and was later strongly involved in developing its channel sal...

  • speaker photo
    Eric Vanderbur
    Solutions Architect, Global Alliances and Partners, Forescout

    Eric Vanderbur is a highly skilled computer security professional with a deep understanding of cybersecurity principles and a passion for protecting digital assets. With over 20 years of experience in the field, Eric has developed expertise in network security, endpoint security, cyber, threat intelligence, and incident response.

    Throu...

  • speaker photo
    Ve Bui
    Sr. Solutions Engineer, Okta

    Ve is a technologist at heart who graduated University of Iowa during the dot com boom. He started as a software engineer in airlines at Unisys, then moved to ecommerce in 2005 where he implemented omni channel experiences. Since 2011, he's been a solutions engineer helping grow market share for technologies like ATG, Endeca, Oracle, Sitecore...

  • speaker photo
    Robert Burda
    CEO, Cybercrime Support Network

    Robert Burda currently serves as the Chief Executive Officer for the Cybercrime Support Network (CSN). Mr. Burda started at CSN in 2019 as the Chief Strategy Officer. He served as the Interim CEO from June 2021 until July 2022, when he was formally appointed as CEO by the board of directors. Prior to becoming CEO, Mr. Burda led several key pr...

  • speaker photo
    Gina Yacone
    VP, ISSA Denver Chapter; Information Security Lead, Trace3 Mountain State Region

    Gina, based in Denver, severs as the information security lead for Trace3's mountain state region. Additionally, Gina offers valuable guidance to Trace3 clients on implementing innovative security solutions, enabling companies to safeguard their most valuable digital assets. Furthermore, she is an accomplished public speaker and a mentor in t...

  • speaker photo
    Matthew Calcagno
    Senior Solutions Engineer, Okta

    IT professional with a passion for cybersecurity management. 15+ years of experience leading key initiatives within both large companies and start-ups selling identity and access management, data monitoring, security, risk and governance solutions. Able to communicate effectively and professionally with key stakeholders to conduct and report ...

  • speaker photo
    Greg York, Moderator
    CISO, Follett Learning

    Greg enjoys inspiring, innovating, and collaborating to drive business value; time with family; backpacking adventures; and craft beer.

  • speaker photo
    Lynn Dohm, Moderator
    Executive Director, Women in CyberSecurity (WiCyS)

    Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. ...

  • speaker photo
    Michael Boucher, Moderator
    Executive Director, Global Information Security, JLL
  • speaker photo
    Aria Langer, Host
    Security Engineer, Morningstar Inc.; Events Lead, WiCyS Chicago
  • speaker photo
    Tony Beaird, Moderator
    VP & Chief Security Officer, Claro Healthcare
  • speaker photo
    Gary Walderich
    Sr. Regional Manager, Cloudflare

    Gary has more than 25 years' total IT industry experience, with the last 21 years focused on security. In addition, he has spent seven of those years as an SE Manager and SE Director. Gary currently works for Cloudflare supporting enterprise solutions for companies in the Southeast region.

  • speaker photo
    Tony Enriquez
    Chief of Cybersecurity, Region 5, U.S. Cybersecurity and Infrastructure Security Agency (CISA)

    Tony serves as a Cybersecurity and Infrastructure Security Agency (CISA) Chief of Cybersecurity for Region 5 (Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin). Based in Chicago, he leads the cyber team, supporting the mission of strengthening the security and resilience of the nation's critical infrastructure. Before becoming the ...

  • speaker photo
    Brian Yoshino
    Cybersecurity Advisor, Region 5, CISA

    Brian Yoshino serves as a Cybersecurity Advisor with the Cybersecurity and Infrastructure Security Agency (CISA) where he supports CISA’s mission of strengthening the security and resilience of the nation’s critical infrastructure. As a CSA, Mr. Yoshino is the liaison between federal services and state, local, tribal, and territorial governme...

  • speaker photo
    Rollin Morris
    Principal Sales Engineer, Okta
  • speaker photo
    Andy Olpin
    Sr. Solutions Engineer, Lookout

    Andy is a seasoned cybersecurity professional with more than 20 years in the field. At the Walt Disney Company, Andy was a compliance and security architect, managing solutions for Disney's broad portfolio of businesses. He moved on to be a solutions architect for MobileIron and now Lookout, where he has been for the past five years.

  • speaker photo
    Chris Wolski
    InfraGard Houston Maritime Cross Sector Chief

    Chris Wolski is a distinguished information security expert, former Chief Information Security Officer for a Fortune 1000 company, and now provides fractional information security leadership for Applied Security Convergence. He is currently on the board of ISSA South Texas and is dual-hatted as the Maritime Cross Sector Chief for the Houston ...

  • speaker photo
    Ally Armeson
    Program Director, Military & Veteran Program, Cybercrime Support Network

    Ally Armeson serves as the Program Director for the Military & Veteran Program at Cybercrime Support Network (CSN). Ally is responsible for building and managing CSN’s Military & Veteran Program, which provides service members, veterans, and their families with the education and resources they need to protect themselves from fraud and scams t...

  • speaker photo
    Cloudflare Representative
  • speaker photo
    TJ Preyear
    Cyber Security Analyst, Ethical Hacker Enthusiast

    TJ Preyear is a Cyber Security Analyst that is currently employed by Independent Security Evaluators (ISE), the company of ethical hackers known for hacking IoT devices, web applications, and password managers. TJ got into cybersecurity because of his limitless curiosity and his accidental hacking of an educational website. This opened a new ...

  • speaker photo
    Lookout Representative
  • speaker photo
    Larry Holt
    Director of Education, ISSA Atlanta
  • speaker photo
    Harvey Nusz, Moderator
    Board of Directors, ISACA (Past President)

    Harvey is a Boomeranger at Capgemini, having joined Insights and Data in February 2018 for GDPR, and again in late August 2021 for CPRA. He is now with Cybersecurity in Cloud Infrastructure building out Data Protection and Privacy Offerings, serving clients in Data Protection and Privacy, and assisting in Data Discovery with Securiti. He is a...

  • speaker photo
    Aaron Woo
    Partner, Vanguard Legal

    Aaron Woo is a business and corporate lawyer with a focus on technology in healthcare, energy, AI/Machine Learning, blockchain, cybersecurity, and data privacy. Aaron's practice includes corporate transactions, mergers and acquisitions, technology, licensing, and corporate/securities. He advises technology companies from startup through acqui...

  • speaker photo
    David Sledge
    Director of Cybersecurity, Avelo Airlines

    David Sledge is the Director of Cybersecurity for Avelo Airlines, where he collaborates with the CISA and FBI. He holds +20 IT and cybersecurity-focused professional certifications, including CISSP, CISM, and CIPM. He brings 16 years of experience in IT and security leadership, working with global Fortune 500 companies. Previous speaking enga...

  • speaker photo
    Justin Jordan
    Regional Sales Engineer, CrowdStrike

    As a skilled cybersecurity specialist with over 15 years of experience, Justin has honed his expertise in privileged access, identity security, and Endpoint Security Solutions. His background spans various industry-leading companies, including BeyondTrust, FireEye, and CrowdStrike. As a subject matter expert and advisor, he has contributed to...

  • speaker photo
    Paul McBratney
    Sr. Solutions Engineer, Fortra

    Paul came to security after many years working in hosting and managed services. He has a background in Windows Administration, networking, and public cloud.

  • speaker photo
    Madhu Dodda
    Principal Product Manager, Lookout

    Madhu Dodda is a seasoned security professional who has been contributing to the growth and evolution of the Lookout security solutions for the past 10 years. Dodda has been building network & data security products at scale for over a decade. As Field CTO, he evangelizes on Zero Trust principles and helps organizations defend against modern ...

  • speaker photo
    Adam Pendleton
    CISO, LendingPoint
  • speaker photo
    Dan Shiebler
    Head of Machine Learning, Abnormal Security

    Dan is the Head of Machine Learning at Abnormal Security, responsible for leading a team of 40+ detection and ML engineers in building the data processing and ML layers in the platform. Prior to Abnormal, Dan worked at Twitter, first as a staff machine learning engineer in Cortex, and later as the manager of the web ads machine learning team....

  • speaker photo
    Tom Cline, Moderator
    VP of Cyber Risk, Skybox Security

    15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include - designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO's.

  • speaker photo
    Neal Tillery
    Sr. Manager, Solutions Engineering, Okta

    Neal Tillery has helped customers design and implement Identity solutions for 18 years. He has worked for industry-leading companies like Sun Microsystems, SailPoint, and Okta. He is now a Senior Manager for Pre-Sales Solution Architecture at Okta. He is passionate about how Okta can help customers quickly and easily secure their applications...

  • speaker photo
    Eric Peeters
    Senior Manager, Weaver

    Eric has more than 15 years of IT advisory and operations experience with significant knowledge of cloud services providers and users. He often works in complex, highly technical environments and consults with global cloud providers, Fortune 100 companies, private equity groups, start-ups, large pension fund managers, and state government ent...

  • speaker photo
    Lulu Hernandez Walker
    Senior Manager, Weaver

    Lulu is a highly experienced and knowledgeable IT advisory Senior Manager with a strong focus on governance, risk, and compliance. She possess over seven years of experience in the field and has led and executed a range of projects, including SOC 1 and SOC 2 examinations, IT audits, Sarbanes-Oxley compliance, EI3PA assessments, FFIEC, FDICIA,...

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial ...

  • speaker photo
    Jim Ballowe, Moderator
    CIO, Esquire Deposition Solutions, LLC
  • speaker photo
    Tamika Bass, Moderator
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys ...

  • speaker photo
    Mike Britton
    CISO, Abnormal Security

    Mike Britton is the CISO of Abnormal Security, an email security company that uses behavioral AI to prevent business email compromise, supply chain fraud, and other socially-engineered attacks. At Abnormal, he leads the information security and privacy programs, where he is integral in building and maintaining the customer trust program, perf...

  • speaker photo
    Pete Nicoletti, Moderator
    Field CISO, Check Point Software Technologies

    Pete Nicoletti has 31 years of IT and MSSP experience and has been a hands-on CISO for the last 18 years and recently joined Check Point as Field CISO of the Americas.

    Pete’s experience and leadership was most recently at Cybraics Defense as CISO. This company is an advanced Artificial Intelligence and Machine Learning Analytics formed...

  • speaker photo
    Jack Roehrig
    Technology Evangelist, Uptycs

    Jack has been passionate about (obsessed with) information security and privacy since he was a child. Attending 2600 meetings before reaching his teenage years, and DEF CON conferences shortly after, he quickly turned an obsession into a career. He began his first professional, full-time information security role at the world's first internet...

  • speaker photo
    Deron T. McElroy
    Chief of Cybersecurity, U.S. Cybersecurity and Infrastructure Security Agency

    Deron McElroy is Chief of Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA), Region 6. He leads a team of Cybersecurity Advisors focused on enhancing our Nation’s cyber resilience. Deron’s team is available to help critical infrastructure owners and operators improve their cybersecurity posture, better manage cyb...

  • speaker photo
    Theresa Le
    Chief Claims Officer, Cowbell Cyber

    Theresa Le is Chief Claims Officer at Cowbell Cyber, the leading provider of standalone cyber insurance for small and medium-sized enterprises. At Cowbell, she leads the team of cyber claims specialists and risk engineers who work tirelessly to minimize the frequency and severity of cyber incidents. Theresa brings nearly 20 years of cyber c...

  • speaker photo
    John T. Irwin
    Solutions Leader for North America, Cloudflare

    For 16 years of his career, John has worked in IT operations running infrastructure, network and cyber security teams for Fortune 100 companies and U.S. government agencies. The next 15 years, he transitioned to leading vendor solutions engineering teams across the Americas, Eastern Europe, Middle East and Africa. In this time he focused on S...

  • speaker photo
    Vasanth Balakrishnan
    Sr. Enterprise Solution Engineer, Cloudflare

    Vasanth Balakrishnan is a Senior Enterprise Solution Engineer for Cloudflare based in Houston, TX. His career started with 10 years in the telecommunications provider industry in engineering/planning roles moving towards customer-facing architect roles. His cybersecurity solution engineer career started in 2010 with RSA Security and subsequen...

  • speaker photo
    Linda White, Moderator
    Director, Information Security, Axiom Medical

    With 30+ years of technology related experience, Linda White has possessed a wide variety of Information Security and IT related roles over three decades within the Enterprise, Government, and non-profit space. Linda currently serves as the Director of Information Security at Axiom Medical. Prior roles include various Information Security fun...

  • speaker photo
    Joshua Shapiro
    Global Director, Threat Intelligence, CrowdStrike

    Joshua Shapiro leads CrowdStrike’s Threat Intelligence business, globally. His team builds strong partnerships and helps customers develop robust intelligence-driven information security programs that stop breaches and reduce risk. Prior to CrowdStrike, Joshua was a leader in Deloitte’s Federal Intelligence & Investigations practice. In this ...

  • speaker photo
    Wayne Crowder
    VP of Information Security, Shamrock Trading Corporation
  • speaker photo
    Kyle Krejci
    Security Engineer, Team Cymru

    Kyle Krejci is a highly skilled and experienced Security Engineer at Team Cymru with over a decade of experience in Network Security and Engineering. He has a strong background in the field of cybersecurity and is passionate about using his expertise to help organizations better protect themselves against cyber threats.

    Kyle has gained...

  • speaker photo
    Donna Gomez
    Security Risk and Compliance Analyst, Johnson County Park & Recreation District

    Donna Gomez, CRISC, is the Security Risk and Compliance Analyst at Johnson County (KS) Park & Recreation District. Previously, Donna served as the Critical Infrastructure Protection Senior Manager and Risk Compliance Analyst for a municipally owned utility. Donna has been an information security professional since 1999, where she began docume...

  • speaker photo
    David Witte
    Information Security Manager, Jackson County, MO
  • speaker photo
    Rob Pankau
    Sr. Solutions Engineer, Okta

    Rob is a Senior Solutions Engineer from Okta with over 14 years of experience in Information Technology. His expertise falls with the Identity, Virtualization, and End User Computing spaces in regulated environments. Rob holds a MS of Information Technology Management and BA of Communication from Oakland University. He additionally sits on th...

  • speaker photo
    Kashif Zaidi
    Director of Solution Architects, Aqua Security
  • speaker photo
    Field Representative from Local FBI Office
  • speaker photo
    Snehal Antani
    Co-Founder & CEO, Horizon3.ai

    Snehal Antani is CEO and Co-founder of Horizon3.ai, a cybersecurity company using AI to deliver Red Teaming and Penetration Testing as a Service. He also serves as a Highly Qualified Expert for the U.S. Department of Defense, driving digital transformation and data initiatives in support of Special Operations.

  • speaker photo
    Craig Riddell
    Field CISO, Netwrix

    Craig Riddell is an ephemeral identity enthusiast and has recently joined the Netwrix team as the North American Field CISO. Prior to joining Netwrix Craig was responsible for all of Identity at HP. He brings a wealth of knowledge and experience around modernizing identity solutions while reducing costs and improving security. Outside of work...

  • speaker photo
    Abnormal Security Representative
  • speaker photo
    Rob Arnold
    Director of Information Security & Privacy Officer, Children International

    Rob Arnold is Director of Information Security at Children International, where his job is protecting the data and systems we use to fight to end global poverty. Twenty-eight years of working in Information Technology in the public and private sector has given Rob the conviction that successful outcomes happen when you don’t let the technolog...

  • speaker photo
    Kristen Gilmore
    Outreach Chair, WiCyS Houston Affiliate

    Kristen Gilmore is a senior business development director at INSPYR Solutions, a top-tier technology solutions company. With over 20 years of experience in IT staffing solutions in the Houston market, Kristen is a proven sales leader who has cultivated a strong reputation for building and expanding customer relationships. Kristen is well-vers...

  • speaker photo
    Cassandra Dacus, Moderator
    Atlanta Chapter President, Cyversity
  • speaker photo
    Jarell Oshodi
    Deputy Chief Privacy Officer, Centers for Disease Control and Prevention

    Jarell Oshodi is a licensed attorney, Certified Information Privacy Professional (CIPP/US), and Certified Information Privacy Manager (CIPM) with more than 12 years of experience helping a range of government agencies in privacy and data governance roles. She has worked at the Department of Veterans Affairs, the National Institutes of Health,...

  • speaker photo
    Susan Lam
    Chief Risk Officer, Bakkt

    Susan Lam is a resourceful and multi-disciplined senior Enterprise Risk Management and Governance leader with a proven track record for developing and leading strategic initiatives and innovations in dynamic and fast-paced environments. She is currently the Chief Risk Officer at Bakkt responsible for Enterprise Risk Resilience which comprised...

  • speaker photo
    Kevin Chalk, Moderator
    Sensitive Information Analyst, USAA
  • speaker photo
    John Roskoph
    SVP, IT, Caesars Entertainment
  • speaker photo
    Tyrone Watson-Ferguson, Moderator
    SVP & CISO, Security Bank of Kansas City
  • speaker photo
    Eric Storm
    Regional Sales Director – Northeast & Mid-Atlantic, BlackBerry

    Eric Storm is the Regional Sales Director for the North East & Mid-Atlantic territories at BlackBerry. He has been a sales leader with BlackBerry for over two years, and his passion has only grown over that time for Cyber Security and the solutions we provide. He has worked in AI and Technology over the last 10+ years at companies such as Cit...

  • speaker photo
    VB Malik
    Partner Solutions Architect, Cloudflare

    Vaibhav Malik, also known as "VB," is a seasoned networking and security professional and industry thought leader with over 12 years of experience in the field. He holds a Masters in Telecommunication from the University of Colorado Boulder and an MBA from the University of Illinois Urbana Champaign. Currently, Vaibhav is serving as a Global ...

  • speaker photo
    Taylor Speaker
    Sr. Sales Engineer, Orca Security

    Taylor Speaker has been working in the information security industry for over 13 years. His experience includes working with organizations in the trading industry, technology startups, in addition to consulting across a wide variety of industries.

  • speaker photo
    Jennifer Galvin
    Principal Partner Sales Engineer, Contrast Security

    Jennifer Galvin is a Principal Channel Sales Engineer at Contrast Security, where she provides technical leadership supporting Contrast Channel Partners to help secure their customer's applications from the inside out. She has helped architect and build many critical application services you may use today. If you've viewed NASDAQ's video wall...

  • speaker photo
    Robert Young
    Regional Sales Engineer, CrowdStrike

    Robert Young is a Regional Sales Engineer for CrowdStrike in the northeast U.S. territory, with an extensive background in security and IT operations. Over his career, Robert has worked both in the private and public sectors, as the customer and in sales, giving him a deep understanding of the people, processes, and technologies involved in s...

  • speaker photo
    Stu Saffer
    Partner Sales Manager, Expel

    After spending the first half of his career in fintech, Stu moved into cyber security as a Strategic Global Account Manager with RSA in 2012. Since joining Expel in 2019, Stu has spent time in a variety of roles with clients and partners of all sizes. He currently manages the partner ecosystem in the Northeast.

  • speaker photo
    Naiche Robison
    Sales Engineer, Identity and Access Management, Thales

    Naiche Robison is a Field Sales Engineer with Thales Group covering their Identity and Access Management Solutions; SafeNet Trusted Access and OneWelcome. With 16yrs of channel/distribution experience covering multiple solutions, Naiche has worked with some of the biggest players in the field from Palo Alto Network’s, to Aruba, and Brocade to...

  • speaker photo
    Nader Zaveri
    Sr. Manager, Incident Response & Remediation, Mandiant, now part of Google Cloud

    Nader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states. He also lea...

  • speaker photo
    Brandi Burton
    Deputy CISO / Sr. Director, Governance, Risk & Compliance, TE Connectivity

    Brandi Burton has more than 25 years experience in information and cyber security, with a specialty in technology risk management. Brandi has successfully helped companies in various industries design and lead information security and risk management programs that enable the organization's business strategies while meeting stakeholder expecta...

  • speaker photo
    Kelly Rogers, Host
    Business Information Security Lead (BISO), Blackbaud
  • speaker photo
    Bistra Lutz
    Director of Global Information Security Operations, Crown Holdings

    Bistra has been in information security for 15 years; and all of it she spent in security operations/engineering for various industries from financial, to health care, to consulting; and most recently, manufacturing. Bistra is a passionate blue teamer, likes experimenting with new technologies, and is a team builder with a knack for process i...

  • speaker photo
    Expel Representative
  • speaker photo
    April Boyd-Noronha, Moderator
    Global Diversity & Inclusion Advisor, Board Member, XR Safety Initative (XRSI)

    April Boyd-Noronha, also known as The STEM Broker, consults parents, educational and civic entities on actively engaging the NextGen as they pursue careers in STEM. She is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe ...

  • speaker photo
    Tom Malta
    Sr. Principal, Industries, Okta
  • speaker photo
    Joseph Arahill, Moderator
    Sr. Manager, Information Security, Affiliated Distributors

    Joe Arahill is the Senior Manager of Information Security at Affiliated Distributors (AD). He oversees the people, processes, and technology that secures AD's infrastructure and business systems. Joe started his career in information security for a commercial loan software company, and for most of his career, he has worked in the financial se...

  • speaker photo
    Dan Herrmann, Moderator
    FIS, Director, Information Security & Risk Officer
  • speaker photo
    Sarah Buerger
    BISO, The Kraft Heinz Company

    Sarah Buerger serves as the Business Information Security Officer for The Kraft Heinz Company.

  • speaker photo
    Mary Faulkner
    CISO, Thrivent
  • speaker photo
    Mike Zachman
    VP & Chief Security Officer, Zebra Technologies
  • speaker photo
    CrowdStrike Representative
  • speaker photo
    Erik Hart, Moderator
    CISO, Cushman & Wakefield

    Erik Hart oversees global information security for Cushman & Wakefield, one of the world’s largest commercial real estate services firms. A recognized thought leader with more than 20 years of experience in providing information security services to various industries and organizations, he also serves in an advisory role for numerous companie...

  • speaker photo
    Will DeMar
    Global Head of Cyber Security (CISO), Mandarin Oriental Hotel Group
  • speaker photo
    Michael DaGrossa, Moderator
    VP, Information Security, Genesis HealthCare

    A mission and customer focused Senior Information Technology Risk Management professional with a strong concentration in Computer Security Initiatives, Governance, Risk Management and Forensics. Extensive experience in creating security and risk programs for companies of various industries, sizes, and complexities. Hands-on pen testing, app...

  • speaker photo
    Todd Crosley
    Sr. Director, Head of Cloud Sales, Uptycs
  • speaker photo
    Linda White
    Director, Information Security, Axiom Medical

    With 30+ years of technology related experience, Linda White has possessed a wide variety of Information Security and IT related roles over three decades within the Enterprise, Government, and non-profit space. Linda currently serves as the Director of Information Security at Axiom Medical. Prior roles include various Information Security fun...

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin

    Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted ...

  • speaker photo
    Uptycs Representative
  • speaker photo
    Rick Bosworth
    Director, Product Marketing - Cloud, SentinelOne

    Rick Bosworth is an engineer turned product manager and marketer, bringing an uncommon technical perspective to enterprise GTM strategy and execution for almost two decades. At SentinelOne, his focus in cybersecurity—in particular cloud workloads, IoT, and user endpoint security—has provided expertise to the rapidly-evolving challenges across...

  • speaker photo
    Aqua Representative
  • speaker photo
    Jordan Fischer, Special Guest
    Cyber Attorney, Partner, Constangy, Brooks, Smith & Prophete, LLP

    Jordan Fischer represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts,...

  • speaker photo
    Julie Boehl
    Director, Information Security, Southwestern Energy
  • speaker photo
    Ionel Chila
    VP of IT Security & Compliance, Cornerstone Capital Bank
  • speaker photo
    Paul Dial
    CISO, AECOM
  • speaker photo
    Stephanie Franklin-Thomas, PhD
    SVP & CISO, ABM Industries
  • speaker photo
    Annessa McKenzie
    CISO, ConocoPhillips
  • speaker photo
    Adnan Hussain
    Cybersecurity Engineering Manager, Schlumberger

    Adnan Hussain is a Cybersecurity Engineering Manager at Schlumberger where he is responsible for cybersecurity solutions for endpoint, perimeter, network, identity and secret management, physical security, and tools & automation teams. With more than 25 years of experience in IT and Cybersecurity, he has worked in operations, engineering, arc...

  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he ha...

  • speaker photo
    Ryan Spelman
    Managing Director, Cyber Risk Consulting, K Logix

    Ryan Spelman is K logix's Managing Director of Cyber Risk Consulting. He focuses on helping organizations of all sizes navigate complex cyber risks and guiding them on their cyber security journey. Ryan has over fifteen years of experience in homeland security and cyber security. Ryan joined the firm from Kroll, where he was a Senior Vice Pre...

  • speaker photo
    Mike Villavicencio
    Channel Sales Engineer, LogRhythm
  • speaker photo
    Frederick Webster, CISM, Moderator
    Information Security Officer, Blue Cross & Blue Shield of Rhode Island

    Frederick Webster leads Blue Cross & Blue Shield of Rhode Island’s cybersecurity program as their Information Security Officer. He has over 15 years of experience in the IT and Information Security fields with a background in Security Operations, Business Continuity and Information Assurance. He has experience in Healthcare, Retail Pharmacy, ...

  • speaker photo
    Jim Cratty
    Deputy Regional Director, Region 3, Cybersecurity and Infrastructure Security Agency

    James Cratty currently serves as the Deputy Regional Director within DHS CISA Region 3 In this role, he is responsible for the coordination of critical infrastructure protection via the operational delivery of CISA resources to include training, vulnerability assessments, and efforts between the public and private sector to secure and ensure ...

  • speaker photo
    Jeanette Sherman
    Director of Product, Mend

    Jeanette Sherman has spent her cybersecurity career working to understand and relieve the struggles of security leaders as they work to secure open source. After a youth spent befriending famous hackers, Jeanette has developed a perspective on cybersecurity that takes into account not only today's business needs, but also the thought patterns...

  • speaker photo
    Patrick Haley
    Principal Solutions Engineer, Lacework

    Pat is a Principal Solutions Engineer for Lacework and has been with the company for 3.5 years. He spent the previous ~10 years working for Boston based Cyber Security companies in similar roles and prior to that focused on implementation and consulting work for data automation workflows. Having been in security for the past 10 years and seei...

  • speaker photo
    Doug Rinehart
    Global CISO, Newfold Digital

    Retired U.S. Navy veteran and cybersecurity Leader. Passionately helping to build and transform information security strategies and programs that work for the business.

  • speaker photo
    Dd (Catharina) Budiharto
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
  • speaker photo
    Deniz Gurkan
    Associate Professor, University of Houston

    Deniz Gurkan received her BS and MS degrees in Electrical Engineering from Bilkent University, in Ankara, Turkey, in 1996 and 1998, respectively. Her PhD is also in Electrical Engineering, received from the University of Southern California in 2003. She briefly worked as a lecturer at the California State University in Long Beach, Electrical ...

  • speaker photo
    Carlos Torres
    Assistant Professor, Baylor University

    Carlos I. Torres is an assistant professor in the Information Systems and Business Analytics department at the Hankamer School of Business at Baylor University. He received his PhD in Business Administration with a concentration in Information Systems from Washington State University. He also holds a MIB from Florida International University,...

  • speaker photo
    Dr. Katie Evans
    Dean of the College of Science and Engineering, Houston Christian University

    Dr. Katie Evans is a Professor of Mathematics and the Dean of Science and Engineering at Houston Christian University (HCU). Prior to HCU, she was on faculty at Louisiana Tech University for 16 years in the College of Engineering and Science, where she served in various administrative roles and is now Professor Emerita. Dr. Evans serves in le...

  • speaker photo
    Ben DiMolfetta
    Principal Solutions Director | Client Solutions Architect, Winmill

    Ben DiMolfetta is a Professional Services Director and AppSec Client Solutions Architect for Winmill Software, a technology services company headquartered in New York City. With over 30 years of industry experience, Ben is a highly qualified AppSec implementation architect, systems developer, project manager and educator, and holds the follo...

  • speaker photo
    David Dumas, Moderator
    Sr. Principal, Security Risk Management, Verizon

    David Dumas, CISSP, CISM, ISSA Distinguished Fellow. David is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. He has 32 years in the security field, working at Digital Equipment and Verizon. He has been on the ISSA New England Chapter Board since 1998.

  • speaker photo
    Ben Halpert
    CSO, Castle Black; Founder, Savvy Cyber Kids; NACD Board Leadership Fellow

    Ben Halpert is a man on a mission: to educate and empower today’s digital citizens in the workplace, at schools, and at home. By day, he is the CSO at Castle Black providing individuals cybersecurity, online privacy, and digital hygiene services with 24/7 human support. By night, he champions cyber ethics education throughout society via the ...

  • speaker photo
    Michael Terry
    Senior Information Security Analyst, LPL Financial
  • speaker photo
    Jason Albuquerque
    Chief Operating Officer, Envision

    With more than 20 years of experience in the technology field, Jason has served in numerous leadership role in his career leading to the Chief Operating Officer position with Envision.

    Jason takes pride in leading the charge, and in building a culture that is innovative and secure by design for the business and its clients. He brings t...

  • speaker photo
    Allison K. Prout, Esq.
    Senior Counsel, Constangy, Brooks, Smith & Prophete

    Allison Prout is Senior Counsel at Constangy, where she represents clients, including SaaS providers, data aggregators, and healthcare-covered entities, in complex technology transactions with a specialized focus on data privacy and security contractual requirements. She develops and implements contracting procedures for clients, including in...

  • speaker photo
    Dmitriy Sokolovskiy, Moderator
    Sr. Vice President, Information Security, Semrush

    From 1999 to 2007, Dmitriy had first-hand experience with servers, networks and datacenters, and NOCs and SOCs as he worked and consulted for defense contractors, public and private financial and medical companies, and non-profits. Between 2007 and 2018, Dmitriy spent 11 years at CyberArk software, helping them go public as he was building an...

  • speaker photo
    Tammy Klotz
    CISO, Trinseo

    Tammy Klotz is a vibrant and accomplished executive with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned...

  • speaker photo
    Adam Rosen
    VP, Product Strategy, Netwrix

    Adam Rosen serves as Vice President of Product Strategy at Netwrix. An expert on managing and securing data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity, he manages Netwrix’s portfolio of data security and data privacy technologies ...

  • speaker photo
    Donald Borsay, Moderator
    Director of Security Solutions, HCH Enterprises
  • speaker photo
    Denis Calderone
    Managing Director, Digital Investigations & Discovery, J.S. Held

    Denis Calderone joined J.S. Held in October 2022 following J.S. Held's acquisition of TBG Security.

    Denis has worked in the information technology field for more than 20 years with the last 18 being completely dedicated to information security. He holds multiple security certifications and prides himself on viewing information security...

  • speaker photo
    Taylor Milligan Crotty
    Director, Cyber Administration, BlackRock

    Taylor M. Crotty leads Cyber Administration at BlackRock, with responsibility for Cyber Diligence, Cyber Governance, Cyber Partnerships, Cyber Training & Awareness including the Firm's cyber resilience initiatives, and Business Management activities across Information Security, including fiscal management, talent management, and strategic pro...

  • speaker photo
    Sarah Rugnetta
    Partner, Buffalo, Constangy, Brooks, Smith & Prophete, LLP

    Sarah serves as a vice chair of the Constangy Cyber Team and practices in New York. She leads the provision of compliance advisory services for the Cyber Team, advising clients on strategies to mitigate risk associated with data privacy and security through business-oriented approaches. Sarah has more than 15 years of experience working in th...

  • speaker photo
    Lindsay Nickle
    Partner, Dallas, Constangy, Brooks, Smith & Prophete, LLP

    Lindsay serves as a vice chair of the cybersecurity and data privacy practice group. Lindsay has extensive experience managing responses to data privacy and security incidents, having managed some of the largest and most complex healthcare-related incidents in the world. Lindsay also has substantial experience assisting clients with the Payme...

  • speaker photo
    David Richardson
    VP, Product Management, Lookout

    David Richardson has been building software to help individuals and enterprises secure mobile devices for over a decade. David currently oversees product management at Lookout. He has 45 patents issued related to mobile security. He is a frequent speaker at security conferences on the topic of iOS and Android security.

  • speaker photo
    Tom Brown
    Senior Solutions Engineer, Zimperium

    Tom Brown has held individual and leadership roles in sales engineering, customer success, and IT consulting over the past 20 years. As mobile, hybrid, and public cloud computing have become dominant models, his technical focus has evolved from endpoint and email security toward mobile and cloud-based, software-defined architectures deliverin...

  • speaker photo
    Jose Acosta
    Solution Engineer, Okta

    Jose Acosta is a Solution Engineer at Okta, with more than 20 years of experience in the IT industry. He has specialized in Identity and Access Management, Business Analysis, and Software Engineering, honing his skills to become a trusted advisor and subject matter expert in these areas. Jose’s extensive IT experience has equipped him to lea...

  • speaker photo
    Violet Sullivan
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster

    Violet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to de...

  • speaker photo
    Karen Painter Randall
    Partner & Chair, Cybersecurity, Data Privacy, and Incident Response, Connell Foley LLP

    Karen Painter Randall, partner and Certified Civil Trial attorney at Connell Foley LLP, chairs the firm’s Cybersecurity, Data Privacy and Incident Response Group. Considered a national thought leader, she has extensive experience advising clients on cyber risk mitigation and resiliency, privacy laws and regulations and incident response. The ...

  • speaker photo
    Monique Ferraro
    Cyber Counsel, HSB Insurance

    Monique Ferraro provides legal and technical expertise in support of HSB Global Cyber Products. Ms. Ferraro's cybersecurity and privacy experience spans more than twenty-five years in digital forensics, ediscovery, information security and privacy. Ms. Ferraro holds a master’s degree and a JD. She is a Certified Information Systems Security P...

  • speaker photo
    Jon Fredrickson, Moderator
    VP, CISO, Blue Cross & Blue Shield of Rhode Island

    Jon Fredrickson is Vice President & Chief Information Security Officer for Surgery Partners. Prior to Surgery Partners, Jon has held various leadership & CISO positions across healthcare in both the provider and payor markets. Jon has developed a pragmatic approach to implementing cyber security solutions and assisting his organizations in ...

  • speaker photo
    Christine Nagy, Moderator
    CISO, Advent International
  • speaker photo
    Mark P. Scichilone
    Network Intrusion Forensic Analyst, U.S. Secret Service & New England Cyber Fraud Task Force

    Mark Scichilone is currently a Network Intrusion Forensic Analyst (NIFA) for the United States Secret Service-Boston Field Office, serving the New England region. With over 14 years of experience in computer forensics, Mark previously worked for eight years at the U.S. Postal Inspection Service - Boston Division - Digital Evidence unit as a S...

  • speaker photo
    Garrett FitzGerald
    Cyber Special Agent, Boston Field Office, United States Secret Service

    Garrett FitzGerald is a Cyber Special Agent for the United States Secret Service Boston Field office serving the New England region, with over eight years of experience in investigating cyber and financial fraud.

  • speaker photo
    Michael Holcomb
    Fellow & Director of Cybersecurity, Fluor

    Michael Holcomb is the Fellow and Director of Information Security for Fluor, one of the world's largest construction, engineering, and project services companies with 60,000 employees around the world. In his role at Fluor, Michael is responsible for vulnerability management, incident detection/response, penetration testing and industrial co...

  • speaker photo
    Mike Semaniuk
    Systems Engineer, Palo Alto Networks

    Michael Semaniuk is a Systems Engineer at Palo Alto Networks. He has been with Palo Alto Networks for 14 years where he was the first SE hired in New England. Michael enjoys solving customer problems and seeing their aha moment.

  • speaker photo
    Paul Marchione
    Sr. Sales Engineer, Thales

    Paul Marchione is part of Thales Cloud Protection and Licensing division. Paul is currently a Senior Sales Engineer with Thales focusing on products that protect customer’s data at rest and data in motion for both on premise and cloud based deployments. Having received a Computer Science Engineering degree from Northeastern University, Paul...

  • speaker photo
    David Ruiz, Moderator
    Cybersecurity Manager, Fayetteville Public Works Commission
  • speaker photo
    Dmitriy Sokolovskiy
    Sr. Vice President, Information Security, Semrush

    Dmitriy is currently a Senior Vice President, Information Security at SEMrush. From 1999 to 2007 Dmitriy had first-hand experience with servers, networks and datacenters, and NOCs and SOCs as he worked and consulted for defense contractors, public and private financial and medical companies, and non-profits. Between 2007 and 2018, Dmitriy spe...

  • speaker photo
    JT Keating
    SVP, Strategic Initiatives, Zimperium

    For 30 years, JT Keating has been driven to deliver technology-based solutions that make enterprises more profitable, compliant, and secure. At Zimperium, JT is responsible for leading strategic initiatives/partnerships, tracking/reporting mobile threat data, and guiding product strategies.

  • speaker photo
    Amy Eubanks
    EVP, Strategy and Professional Development, (ISC)²

    Amy is responsible for driving organization-wide strategy and global product innovation for education and professional development experiences for (ISC)² members and other cybersecurity professionals at all career stages. She leads a diverse team of strategists, educators, course developers, subject matter experts and instructors, as well as ...

  • speaker photo
    Anna Belak
    Director, Office of Cybersecurity Strategy, Sysdig

    Anna has 10 years of experience researching and advising organizations on cloud adoption with a focus on security best practices. As a Gartner Analyst, Anna spent six years helping more than 500 enterprises with vulnerability management, security monitoring, and DevSecOps initiatives. Anna's research and talks have been used to transform orga...

  • speaker photo
    Eric Robuck
    Cybersecurity Specialist and Founder of The Valander Group

    Eric Robuck is a seasoned cybersecurity expert with over two decades of experience in the industry. As the owner and founder of The Valander Group, he leads a team of top-notch business experts dedicated to providing comprehensive cybersecurity solutions for business owners.

    Eric's extensive military background as a Warrant Officer fo...

  • speaker photo
    Chris Jennings
    VP, Cyber Analytics, BlackRock
  • speaker photo
    Richard Israelite
    Sr. Director, Information Security, Addepar

    Richard Israelite is Sr. Director of Information Security at Addepar. He is an information security leader with over 15 years experience building and leading global teams in some of the world’s largest Financial Services firms as well as smaller, cloud native FinTech companies. Christopher Jennings is the head of Cyber Analytics and Data Oper...

  • speaker photo
    Cindy Allen, Moderator
    CEO & CISO, River Birch Data Security Consulting

    Cindy Allen has over 30 years of experience in technology and security and has served as CISO, Privacy Officer, and HIPAA Security Officer for a global organization of roughly 5,000 employees in 8 countries. Prior to this role she was CIO for a Philadelphia-based professional services firm. She holds both CISSP and ITIL Expert certifications...

  • speaker photo
    John Vecchi
    Chief Marketing Officer, Phosphorus Cybersecurity

    As CMO at Phosphorus Cybersecurity, John has achieved more than 25 years of experience in high-tech security marketing, strategy, product marketing, product management, and consulting. A serial CMO and security visionary, he has helped build and lead some of the biggest brands in enterprise security, including Solera Networks, Blue Coat Syste...

  • speaker photo
    Terry Dever
    Systems Engineer, Palo Alto Networks
  • speaker photo
    Check Point Representative
  • speaker photo
    Erin Joe
    Sr. Executive Service, Office of Private Sector (Retired), FBI

    Erin Joe, Office of the CISO, Google Cloud, formerly SVP, Strategy and Alliances at Mandiant, draws from her 25-year career serving as a transformational leader guiding organizational change as well as an Executive Leadership Coach developing other leaders. Erin is responsible for supporting the cyber industry, clients, and partners as a thou...

  • speaker photo
    J.S. Held Representative
  • speaker photo
    Authomize Representative
  • speaker photo
    Corian Kennedy
    Hacker & Founder, SecKC

    Corian Kennedy is a cutting-edge technologist and cybersecurity expert with a deep passion for hacking and the power of AI. As a top researcher in the field, he has pioneered some of the most innovative and futuristic technologies that have revolutionized the world of cybersecurity, leveraging the latest advancements in hacking and AI to stay...

  • speaker photo
    Sanara Marsh
    Security Evangelist, Randori, an IBM Company

    Director of Product Marketing for Randori and Security Evangelist, Sanara Marsh focuses on trends in cybersecurity and looks to apply methods to operationalize security programs. Working with a range of organizations to improve their security programs, Sanara has experience in endpoint as well as the exposure management space.

  • speaker photo
    Colleen Lennox
    Founder & CEO, Cyber Job Central
  • speaker photo
    Rich Dandliker
    Chief Strategist, Veza

    Rich is Chief Strategist at Veza, where his responsibilities span high-level messaging and positioning, competitive market analysis, product strategy, go-to-market strategy, and evangelism. Prior to Veza, Rich led product management across the entire portfolio at Okta for over 4 years through their IPO, with overall responsibility for product...

  • speaker photo
    Brandon M. Bapst
    Cyber Risk Advisor, EY

    Brandon has more than nine years of strategic experience in the security risk field. As a Cyber Risk Advisor within EY's Cyber Transformation practice, he works closely with executives, CSOs and CISOs on developing mature cyber risk programs. He has worked with Global Fortune 100 companies to transform tactical security programs into holistic...

  • speaker photo
    Donna Ross, Moderator
    President, WiCyS Delaware Valley Affiliate

    Dynamic leader and board member demonstrating over 20 years of diverse risk, compliance, information security, technology, and operations experience within the manufacturing, insurance, banking, financial services, and retail sector. Adept in developing and implementing strategic technology and risk solutions, performing research and analysi...

  • speaker photo
    Horizon3.ai Representative
  • speaker photo
    OpenText Representative
  • speaker photo
    Mike Tetreault
    Cybersecurity Advisor to Rhode Island, DHS CISA; Colonel (Retired), Rhode Island Army National Guard
  • speaker photo
    Woody Groton
    CIO, Draper Labs; Colonel, U.S. Army National Guard; VP, New England Chapter, MCPA
  • speaker photo
    Roy Wattanasin, Moderator
    Research Security Officer, Massachusetts Institute of Technology

    Roy Wattanasin is an information security professional. Additionally, Roy is an avid speaker who has spoken at many conferences and webinars. Roy also enjoys data forensics & incident response and building security in. He is heavily involved with many computer security groups including OWASP Boston, ISSA and the local communities. Roy is also...

  • speaker photo
    Dafina Buçaj
    Data Privacy & Cybersecurity Attorney, Constangy, Brooks, Smith & Prophete, LLP

    Dafina Buçaj counsels and advises Octillo clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state, and international privacy regulations. Her practice includes helping organizations build out data privacy and security regulatory assessments, information...

  • speaker photo
    Lacework Representative
  • speaker photo
    Sysdig Representative
  • speaker photo
    Netwrix Representative
  • speaker photo
    Zimperium Representative
  • speaker photo
    Okta Representative
  • speaker photo
    Alicia Laing Clarke
    Director, Cybersecurity Risk, Privacy & Compliance, PGA Tour Superstore

    Alicia Laing Clarke is the Director of Cyber Security, Risk and Privacy (Head of Security) for PGA Tour Superstores. Alicia oversees PGA Tour Superstore (PGATSS) Cyber Protection, Risk, Compliance and Privacy of all PGATSS assets and data. She is responsible for protecting PGATSS from cyber activities and leading PGATSS’s response to cyber th...

  • speaker photo
    Kevin Augspurger
    Director of IT, Unite Private Networks

    Kevin Augspurger is an accomplished IT professional with over 18 years’ experience in the industry, 9 of which have been in the telecommunications field. In his career, Kevin specializes in networking, IT security, server/cloud infrastructure, IT management, and facilities/real estate. Additionally, Kevin holds certifications including Certif...

  • speaker photo
    Jeannie Warner
    Director, Product Marketing, Exabeam

    Jeannie Warner, CISSP, Director of Product Marketing at Exabeam, is an information security professional with over twenty years in infrastructure operations/security. Jeannie started her career in the trenches working in various Unix helpdesk and network operations centers. She began in Security Operations for IBM MSS and quickly rose through...

  • speaker photo
    Marc Varner
    Global CISO & Corporate VP, Lowe's Companies
  • speaker photo
    Bill Ryan
    Regional Director, Region 3, CISA

    William J. Ryan (Bill) was appointed Regional Director (RD) for Region 3 in 2016. Region 3 is headquartered in Philadelphia, PA, and serves Pennsylvania, Delaware, Maryland, Virginia, West Virginia, and Washington, DC. As CISA RD, Bill sets strategic level guidance for, and maintains an operational view of, the region’s cyber and physical inf...

  • speaker photo
    Joe Bennett
    SVP, CIO, Adient

    Joe Bennett is the Vice President and Chief Information Security Officer for Adient. A security leader known for developing and implementing strategic plans to support business objectives, Joe blends leadership and team building to execute an overall security program. As Chief Information Security Officer, Joe has built a security framework t...

  • speaker photo
    Scott Gillis
    Regional Director, Exabeam

    Accomplished cybersecurity industry leader with 20+ years of experience in the IT industry specializing in creating and leading hyper performing teams to achieve key company metrics and KPI’s. He is widely known across the industry as a successful product and operational leader specializing in creating, rebuilding, and realigning business seg...

  • speaker photo
    Paul Lynch
    Director, Information Security, CubeSmart

    Paul Lynch, who has more than 20 years of experience in information technology, is Director of Information Security and Infrastructure for CubeSmart Self Storage. He has established security governance programs and best practices for government, non-profit, private, and publicly traded organizations ranging from technology startup to city. He...

  • speaker photo
    Chris Glanden, Host
    Founder, The BarCode Podcast

    Chris Glanden is an experienced cybersecurity strategist and the Founder & CEO of BarCode Security, a full-service consulting firm he launched in November 2023. Through BarCode, Glanden provides advisory services, pentesting, training, and incident response with a team of seasoned industry experts.

    In 2020, Glanden started the BarCode ...

  • speaker photo
    Chase Cunningham
    Advisor, Akeyless
  • speaker photo
    Monica Cole-Rowe
    CISO, Mazuma Credit Union
  • speaker photo
    Michael Leland
    Chief Cybersecurity Evangelist & Head of Technical Marketing, SentinelOne

    Michael joined SentinelOne in May 2020 as Head of Technical Marketing where he brings over 25 years of security domain expertise. He is responsible for messaging and strategic development of the XDR product roadmap. Prior to SentinelOne, he held the title of Chief Technical Strategist for McAfee. Michael served formerly as the CTO at NitroSec...

  • speaker photo
    Benjamin Corman
    Director, Information Security & IT Governance, Digital Federal Credit Union

    Ben has had a lifelong love of all things technical and has been an IT and Security professional for over 15 years. For the last 12 years he has been in the credit union industry and has been involved in an array of different projects and solutions. From core platform, networking, and system operations, to working on custom developed applicat...

  • speaker photo
    Chris Roberts
    CISO and Senior Director, Boom Supersonic

    Chris is the CISO for Boom Supersonic and works as an advisor for several entities and organizations around the globe. His most recent projects are focused within the aerospace, deception, identity, cryptography, Artificial Intelligence, and services sectors. Over the years, he's founded or worked with several folks specializing in OSINT/SIG...

  • speaker photo
    Chris Boehm
    Global Field CISO, SentinelOne

    Chris Boehm currently works as the Global Field CISO at SentinelOne. As a cybersecurity thought leader, he drives strategy and works closely with some of the largest organizations in the world. Prior to SentinelOne, he was a Senior Product Manager at Microsoft in the Azure Security engineering division. In his 5 years at Microsoft, he focused...

  • speaker photo
    Joshua Brown
    VP & Global CISO, H&R Block

    Joshua Brown is a Chief Information Security Officer, with deep experience in designing and building information security programs to deliver efficient and effective risk management practices. HIs core expertise is in zero trust design, implementation of data-centric risk mitigation, raising security awareness, and aligning security strategy ...

  • speaker photo
    Brian Cayer
    CISO, Keck Medicine of USC
  • speaker photo
    Eric Anderson
    Cybersecurity Architect, Instructor, and Evangelist, Atlantic Data Security

    Eric is a 35-year veteran of the technology industry, with the last 25 of that focused on cybersecurity. After having served in just about every technical capacity from coding to customer service, in both pre- and post-sales, he currently spends the majority of his time working with clients to solve their security challenges. Combining creati...

  • speaker photo
    Dd (Catharina) Budiharto, Moderator
    CISO, Advisory Board Member; Founder, Cyber Point Advisory
  • speaker photo
    Karen Harris
    VP & Lead Cybersecurity Architect, Threat Modeling Center of Excellence Program Lead, JPMorgan Chase

    Karen Harris is an IT professional with over 20 years of global banking and finance technical and operational expertise and is an avid threat modeling advocate. Karen is currently the Threat Modeling Center of Excellence Lead, and actively supports Grace Hopper, npower and Technica conferences mentoring and supporting young men and women (in...

  • speaker photo
    Annie Jamshed
    VP & Lead Cybersecurity Architect, JPMorgan Chase; President, WiCyS Houston Affiliate

    Annie Jamshed is a cybersecurity professional with Bachelor's in Electrical Engineering and Master's in Cybersecurity. She has more than four years' experience working in Security Operations Center performing incident response, forensics, and threat intelligence. She is currently working at JP Morgan Chase as a Security Architect and threat m...

  • speaker photo
    Robert Esposito
    Director, Security Strategy, Phosphorus

    As Director of Security Strategy at Phosphorus Cybersecurity, Robert helps organizations address xIoT attack surface management and preventative risk mitigation, enabling organizations to safely embrace an increasingly Thing-based world. He has been a cybersecurity professional in the Silicon Valley for over 20 years, with his early career fo...

  • speaker photo
    Will Rogers
    Former CISO, ActBlue Technical Services
  • speaker photo
    Rob Dalzell, Moderator
    BISO, Bank of America

    Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awa...

  • speaker photo
    Todd Bearman, Moderator
    VP, CISO, TE Connectivity

    Todd Bearman is the Chief Information Security Officer for TE Connectivity with responsibility for Information Security globally across nearly 150 countries with 75,000 employees.

    Todd is responsible for ensuring collaboration and risk management across the corporate functions and business units where he leverages his leadership, techn...

  • speaker photo
    Mike Miller
    Author, "Break In Cyber," vCISO

    Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For more than 25 years, Mike has specialized in both offensive and defensive cybersecurity and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to fol...

  • speaker photo
    Scott Fisher
    Sr. Security Engineer, Team Cymru
  • speaker photo
    Bruce Coffing
    CISO, City of Chicago

    Bruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank o...

  • speaker photo
    Michael Marsilio
    CISO, Paradies Lagardère

    Michael Marsilio is the Information Security and Compliance Officer for Paradies Lagardère, where he is responsible for information security, risk management, privacy and compliance. Michael plays a strategic role in protecting Paradies Lagardère IT resources, infrastructure and information assets, and helps drives global security initiatives...

  • speaker photo
    Daniel J.W. King
    Chief of Cybersecurity, CISA Region 1 (New England)

    Daniel J. W. King is the Region 1 Chief of Cybersecurity for the Cybersecurity and Infrastructure Security Agency (CISA) within the U.S. Department of Homeland Security. Region 1 is headquartered in Boston and Mr. King oversees CISA cybersecurity services and support via Cybersecurity Advisors throughout New England. CISA works with partners ...

  • speaker photo
    Ed Hudson
    CISO, University of Kansas

    Hudson brings 20 years of IT security and IT governance experience to the role. He previously worked as the CISO for the California State University system, overseeing strategic information security and privacy efforts for the 23 campuses of the CSU system.

    Hudson also served as faculty director for the EDUCAUSE Management Institute, i...

  • speaker photo
    Chris Guarino
    DevSecOps Lead, Vanguard
  • speaker photo
    Harvey Perriott
    Director, Region 6, CISA

    Harvey O. Perriott currently serves as the Regional Director for the Cybersecurity and Infrastructure Security Agency (CISA), Region VI headquartered in Irving, TX. His staff overseas risk management, and both physical and cyber security activities for private and public sector partners across five states including Arkansas, Louisiana, New Me...

  • speaker photo
    Al Lindseth
    Principal, CI5O Advisory Services LLC
  • speaker photo
    Walter Williams
    CISO, Monotype

    Walter Williams has over 20 years of experience in Information Security. He is the author of "Creating an Information Security Program from Scratch" (2021, CRC Press) and "Security for Service Oriented Architecture" (2014, CRC Press). He was a member of the program committee for MetricCon 8 and Metricon 10. He holds the CISSP and SSCP certifi...

  • speaker photo
    Michael L. Woodson
    CISO, Sonesta Hotels

    Michael Woodson is Sonesta’s Director of Information Security and Privacy and was formally the Chief Information Security Officer (CISO) for the Massachusetts Bay Transit Authority, the public agency responsible for operating most of the transportation services in Greater Boston, Massachusetts. He was responsible for the MBTA’s total informa...

  • speaker photo
    Tim Cavanaugh, CISSP-ISSMP, CISM, CRISC
    CISI, Maiden Global Servicing Company, LLC

    Tim has over 20 years' experience in all aspects of Information Technology, spending the last eight years in Information Security roles. He was lead author of a whitepaper on Cyber Insurance for Object Management Group (OMG) and has presented for CSA, (ISC)2, and OMG.

  • speaker photo
    David Lingenfelter
    CISO, Penn Entertainment

    David Lingenfelter is the Chief Information Security Officer at Penn Entertainment, responsible for ensuring the highest possible level of security for the rapidly changing risk landscape. David manages teams that oversee IT security and compliance for both the retail and digital aspects of the business. David believes that in order to implem...

  • speaker photo
    Shawn E. Tuma, Instructor
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small...

  • speaker photo
    Esmond Kane, Moderator
    CISO, Steward Health Care

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuab...

  • speaker photo
    Ravi Monga
    CISO, Saint Luke's Health System
  • speaker photo
    George Jouldjian
    Cyber Director, Elliott Davis

    George has 21 years of experience as an IT Security Professional who works with clients in a variety of industries to analyze and improve their overall security posture through penetration testing and threat assessments. He also advises organizations on cyber incident response and provides comprehensive cybersecurity consulting services. Geo...

  • speaker photo
    Stanley Hammond
    Sr. Security Engineer, Cape Cod Healthcare

    Stanley Hammond has been in the IT field for the past 20 years and in the information security since 2006. He is currently a Senior Security Engineer in the healthcare field in Massachusetts. Throughout his career he has worked for non-profits, non-government organizations, higher education, and both public and private sector organizations. H...

  • speaker photo
    Col. Candice E. Frost
    JIOC Commander, United States Cyber Command

    Candice E. Frost is the Joint Intelligence Operations Center Commander at the United States Cyber Command. As the commander, Colonel Frost leads over 200 employees from the Defense Intelligence Agency (DIA), National Security Agency, and Department of Defense, to provide and produce intelligence required to direct, operate, and secure Departm...

  • speaker photo
    Frederick Webster, CISM
    Information Security Officer, Blue Cross & Blue Shield of Rhode Island

    Frederick Webster leads Blue Cross & Blue Shield of Rhode Island’s cybersecurity program as their Information Security Officer. He has over 15 years of experience in the IT and Information Security fields with a background in Security Operations, Business Continuity and Information Assurance. He has experience in Healthcare, Retail Pharmacy, ...

  • speaker photo
    Brian McGowan, CISM
    VP, Global Security & Privacy, SharkNinja

    Brian currently leads the cybersecurity and privacy program as Vice President, Global Security & Privacy at SharkNinja, a relentless innovator and global leader in the housewares industry. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed t...

  • speaker photo
    Sean McCloskey
    Chief of Cybersecurity, Region 4, DHS Cybersecurity and Infrastructure Security Agency

    Sean McCloskey is the Chief of Cybersecurity, Region 4, within the Department of Homeland Security’s (DHS) Cyber and Infrastructure Security Agency (CISA). As the Chief of Cybersecurity, Sean leads the Cyber Security Advisors in Region 4 that assist critical infrastructure owners and operators in improving their cybersecurity capabilities an...

  • speaker photo
    Patrick Keating, Moderator
    SVP & CISO, Sterling Bank & Trust
  • speaker photo
    Lee Kim JD CISSP CIPP/US
    Sr. Principal, Cybersecurity & Privacy, Healthcare Information and Management Systems Society, Inc. (HIMSS)

    Lee Kim is a top rated attorney, cybersecurity and data privacy subject matter expert, and creative professional (actress and voiceover artist).

    Lee has earned the highest distinction as an attorney with an AV Preeminent peer review rating. Lee is licensed in the District of Columbia, Commonwealth of Pennsylvania, and registered to pra...

  • speaker photo
    Richard Marcus
    VP, Information Security, AuditBoard

    Richard is the VP of Information Security at AuditBoard, where he leads product, infrastructure, and corporate IT security functions as well as AuditBoard’s own internal risk and compliance initiatives. In this capacity, he has become an AuditBoard product power user, leveraging the platform’s robust feature set to help achieve SOC 2, GDPR, I...

  • speaker photo
    Clar Rosso
    CEO, (ISC)2

    Clar Rosso has more than two decades of experience helping global professional associations and certifying bodies grow and strengthen member value. As CEO of (ISC)², she has established a forward-looking strategic framework and set bold goals for the future of the association. Under her direction, (ISC)² has established a Diversity, Equity, a...

  • speaker photo
    Neil Clauson
    Regional CISO, Mimecast

    Neil has 25+ years of experience building and securing complex IT and Security solutions. He's led Security Operations teams at Mimecast and other enterprises which face a variety of threats and challenges, and has built and enhanced cybersecurity programs to support and achieve business outcomes.

  • speaker photo
    Jennifer Harkins Garone
    Sr. Director, Privacy and Information Governance, Carnival Corporation

    Jennifer Harkins Garone is the Senior Director of Privacy and Information Governance for North American brands of the Carnival Corporation since July 2018. Prior to this role, she spent 10 years at Microsoft leading privacy in diverse roles and organizations, including IT, HR, and corporate privacy.

    Jennifer launched her career in ma...

  • speaker photo
    Jason Kikta
    CISO, Automox

    Jason Kikta is the Chief Information Security Officer at Automox. He previously served for over 20 years in the United States Marine Corps, which included seven years at U.S. Cyber Command designing and managing the national counter-APT and counter-ransomware missions.

  • speaker photo
    Naimah J. Duporte, Esq.
    Incident Response & Data Privacy Compliance Attorney

    Experienced Data Privacy and Compliance Attorney, with a focus on Incident Response, and data analysis and classification standards. Background in criminal law, European Union law, and international law.

  • speaker photo
    Anthony James
    Vice President - Security Strategy, Infoblox

    Anthony James is a seasoned technology executive with 20+ years of product and marketing experience in the cybersecurity industry. Anthony leads as Infoblox’s VP of Product Marketing and has also held executive leadership roles across a variety of security startups and well-known organizations, including FireEye, Fortinet, Cyphort and TrapX. ...

  • speaker photo
    Arien Seghetti
    Director of Solution Architecture, Cymulate

    Arien Seghetti is an Industry veteran with 20 plus years of experience in cybersecurity, starting out his career serving in the US Air Force for six years to now Director of Solutions Architects at Cymulate. Having worked on all 7 continents, he has a global view of IT and security across all verticals. Though Arien calls the Greater Atlanta ...

  • speaker photo
    Sean Updegrove
    Director, Asset Protection, BECU
  • speaker photo
    Shawn Harris
    Sr. Director, Information Security & Compliance, Chipotle Mexican Grill
  • speaker photo
    Aradhna Chetal
    Managing Director, Cloud Security, TIAA
  • speaker photo
    Brad Russell
    Sr. Systems Engineer, Code42

    Brad started his career in IT consulting after graduating from Vanguard University with a B.A. in Business Administration. From there, he moved to Cylance Inc. as an IT Manager/Systems Administrator and later into product development. From Cylance, he went to SentinelOne as a TAM for companies such as Nike and Salesforce, helping shape their ...

  • speaker photo
    Mark Hamilton
    Enterprise Sales Manager, Cloud, SentinelOne

    Mark Hamilton is a Cloud Sales Manager for SentinelOne based in the Seattle area. His long selling career has included time with HP, Cisco, F5, and Palo Alto Networks. In this current role, he facilitates cloud security discussions between clients, partners, and sales teams.

  • speaker photo
    Jordan Fischer
    Cyber Attorney, Partner, Constangy, Brooks, Smith & Prophete, LLP

    Jordan Fischer represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts,...

  • speaker photo
    Jerry Petru, CISSP, CISM, FBCS, CITP
    President, Washington State InfraGard Chapter

    Mr. Petru is the President of the Washington State InfraGard Chapter and a Fellow of the British Computer Society, The Chartered Institute for IT. He is an innovative, and technically sophisticated professional, offering substantial years of broad-based experience in evaluating large corporate systems. Powered with a comprehensive background...

  • speaker photo
    Andrew Frey
    Financial Analyst (Forensics), United States Secret Service - San Francisco Field Office

    Andrew is a Forensic Financial Analyst with the U.S. Secret Service’s San Francisco Field Office. Andrew is currently assigned to San Francisco’s Digital Assets team, where he investigates crimes involving cryptocurrency and other digital assets. Andrew’s background includes large scale criminal investigations involving a wide range of cyber-...

  • speaker photo
    Dan Conrad
    AD Security and Management Team Lead, One Identity

    Dan Conrad is AD Security and Management Team Lead for One Identity. He has been with Quest since 2007, where his roles have included Solutions Architect, Federal CTO, and IAM Strategist. He is an experienced sysadmin, having administered organizations ranging from 10,000 to 150,000 users. Dan holds a BS in Information Systems Management fro...

  • speaker photo
    Scarlett Menendez
    Technical Sales Engineer, Trend Micro

    Scarlett Menendez is a cybersecurity professional with a specialization in cyber threat intelligence and programming in Seattle. Holding a distinguished position at Trend Micro, she has dedicated herself to providing insights on the evolving landscape of cyber threats, and offers strategic counsel on fortifying organizational infrastructures ...

  • speaker photo
    Chris Corde
    Director, Product Management, Security, Google
  • speaker photo
    David Pier
    Solution Engineer, Red Canary

    David is a Security and Privacy evangelist with over a decade of experience working in the industry. Prior to his work directly on Security, David was an IT Analyst for multiple large enterprise organizations and has experience working in the NOC of a 24/7 environment. When not at his computer, David loves the outdoors, taking any chance to k...

  • speaker photo
    Kevin Pentecost
    Information Security Director, Standard Motor Products, Inc.

    CISSP | CISM | CEH | CPT | MCSE+I | CCA

  • speaker photo
    Dan Whalen
    Principal Researcher Engineer, Expel

    Dan is a Principal Research Engineer at Expel, a 24x7 security operations platform. With nearly a decade of experience in security operations at scale, he's been exposed to a ton of different environments, unusual attacks, and challenging security problems. Lately, he's been focused on helping organizations protect their cloud and containeriz...

  • speaker photo
    Asher Bergman
    Threat Intelligence Consultant, North America West, Recorded Future

    Asher is a consultant with a broad set of expertise in SaaS customer success, intelligence analysis and strategy, and stakeholder management. Before his current role, he was an analyst working within this ambiguous, expansive idea of risk: financial risk, security and cyber risks, reputational risks, etc. He's fully embraced this concept in h...

  • speaker photo
    Adam Pike
    Solutions Architect, 1Password

    Adam Pike is a solutions architect at 1Password (and former 1Password account administrator in a previous life) with two decades of IT experience focused on privacy and security, working at the intersection of people and technology. He spends most of his workdays helping customers integrate 1Password into their tech stack. When he’s not at hi...

  • speaker photo
    Frank Simorjay, Moderator
    Distinguished Fellow, ISSA

    Frank Simorjay (CISSP, ISSA Distinguished Fellow) is a cloud security and compliance subject matter expert. Frank works for Microsoft Azure global ecosystem organization as the Lead PM of the Azure automation Blueprint program, that includes the PCI automation blueprint. Frank has written an extensive library of papers, and blogs (http://clou...

  • speaker photo
    Greg MacPherson, Moderator
    Principal Member of Technical Staff, AT&T
  • speaker photo
    Moderator Peter Gregory
    Sr. Director, Cyber GRC, General Communications, Inc. (GCI)
  • speaker photo
    Ran Hinrichs
    Lead Instructor, Certificate in Risk Management, University of Washington
  • speaker photo
    Greg MacPherson
    Principal Member of Technical Staff, AT&T

    Greg MacPherson spends his days protecting computer systems, evangelizing and implementing computer security, and striving to improve the information security situation in an environment full of competent adversaries and skeptical business people. Greg is a vocal advocate for greater security visibility and a regular advisor to industry leade...

  • speaker photo
    Chris Staley
    MDR Specialist, Open Systems

    Chris Staley is a cybersecurity specialist at Open Systems and advisor to enterprise security and technology leaders. He has over a decade of experience in enterprise technology, secure networking and emerging security services like SASE and XDR. His experience ranges from working with small and medium businesses to large global enterprises, ...

  • speaker photo
    Rachelle
    Threat Research Analyst, Team Cymru

    Rachelle joined the S2 Team having been a senior threat intelligence researcher analyst at one of the world's biggest retail brands, Nike. She specializes in e-crime and Russian threat actor tracking. In her free time, she enjoys frustrating baddies as a member of the Cryptolaemus group.

  • speaker photo
    Moderator Eric Yancy
    Information Security Officer, City of Denton, Texas

    Eric Yancy is the Information Security Officer for the City of Denton. Eric's contribution combines the experience of securing the broad range of risk profiles and regulatory considerations within the public sector with over 20 years supporting multiple verticals in the private sector. Eric retains multiple information security credential,s i...

  • speaker photo
    Bill White
    DevOps Revolutionary - Information Security, State Farm

    Bill is an Information Security professional with 30 years’ experience in IT, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for Information Security architectural at a Fortune 50 company. He started as a bench technician while learning his way up to Information Security Manage...

  • speaker photo
    Dan Mihaylov
    Solutions Engineering Manager, Proofpoint
  • speaker photo
    William Lidster, Moderator
    CISO, AAA Washington

    William serves as the leader of AAA Washington’s information security and compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.  William has been with AAA Washington since August of 20...

  • speaker photo
    Varsha Agarwal
    Head of Information Security, Prosper Marketplace
  • speaker photo
    Jay Beale
    CEO & CTO, InGuardians, Inc.

    Jay Beale is CTO and CEO for InGuardians. He works on Kubernetes, Linux, and Cloud-Native security, both as a professional threat actor and as an Open Source maintainer and contributor. Jay is a member of the Kubernetes project and previously co-led the project’s Security Audit Working Group. He's the architect of the Peirates attack tool for...

  • speaker photo
    Jonathon Mayor
    Technical Director & Security Solutions Architect, Cohesity

    Jonathon Mayor leads the Security Solutions Architecture program for Cohesity. His 20+ years of experience in the IT industry have involved both offensive and defensive security activities. He also has a BS in IT with a focus on computer forensics, and he is a locksport hobbyist. This blend of skills and background is valuable in bringing cus...

  • speaker photo
    Craig Spiezle, Moderator
    Founder & President, AgeLight Advisory & Research Group

    Craig Spiezle is the Founder and President of AgeLight Advisory & Research Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mind...

  • speaker photo
    Dale 'Dr. Z' Zabriskie, CISSP CCSK
    Field CISO, Cohesity

    Known for his ability to communicate both technically and conceptually in an authoritative yet entertaining style, Dale “Dr. Z” Zabriskie has consulted with IT professionals across the globe, advising on implementing effective cyber security strategies. He is a CISSP (Certified Information Systems Security Professional), and certified in Clou...

  • speaker photo
    Matthew Berg
    Director, Sales Engineering North America, Open Systems
  • speaker photo
    Kathleen Moriarty
    CTO, Center for Internet Security

    Kathleen Moriarty, Chief Technology Officer, Center for Internet Security, has over two decades of experience. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appoi...

  • speaker photo
    Marlowe Cochran, Moderator
    CISO, New York State Department of Education

    Marlowe Cochran has been working in the IT field for over 30 years, with 20 plus years in information security roles. He has worked in a multitude of sectors from government to health care. In his current role at the New York State Department of Education, he is the Chief Information Security Officer. Marlowe currently collaborates with inter...

  • speaker photo
    Jacob Brown
    Sr. Solutions Architect, Expel

    Jacob Brown is a Senior Solutions Architect with five+ years of experience in the security space working with clients ranging from from small startups to Fortune 50 corporations. With a background in data center, network, and cloud security, he is motivated by helping organizations implement security right where they are and streamlining that...

  • speaker photo
    Moderator David A. Wallace
    Americas Engagement Lead - Security, Risk, and Compliance, Hewlett Packard Enterprise (HPE)

    MBA, CISA, CISM, CISSP

    With four decades of experience in Information Technology and 25 years of Information Security and Compliance leadership experience, David Wallace serves as the Engagement Lead for the Americas in Hewlett Packard Enterprise Pointnext Security, Risk, and Compliance practice. In his role, Wallace is the responsible...

  • speaker photo
    Michael Nikitin
    CTO & CISO, AIDA Healthcare

    Passionate product leader with the focus on solving real-life problems with smart technology. An advocate of the user-friendly, a simple intuitive interface and UX-driven design approach.

  • speaker photo
    Tony Steffe, CISSP
    Regional Systems Engineer, Illumio

    Tony is a trusted technical advisor with more than two decades engaged in network and Internet security, with an emphasis on increasing business interconnectedness for enterprise customers.

  • speaker photo
    James Stroud
    Sr. Sales Engineering Manager, Proofpoint

    James Stroud is the Sr. Sales Engineering Manager for Proofpoint’s South and East Mid Market teams. He has 25+ years of experience in cybersecurity, providing leadership and expertise for companies in various sectors, including Federal, State and Local Government, Healthcare, and Education. James joined Proofpoint this year after serving as t...

  • speaker photo
    Jane E. Petoskey, Esq.
    Associate - Data Protection, Privacy & Security Group, K&L Gates LLP

    Jane E. Petoskey is an associate at the firm's Seattle office. She is a member of the Technology Transactions practice group, and primarily services clients under the Data Protection, Privacy, and Security focus area. Jane is also a Certified Information Privacy Professional in the United States (CIPP/US) and Certified Information Privacy Man...

  • speaker photo
    Timothy Rohrbaugh
    CISO, JetBlue Airways
  • speaker photo
    Jeffrey R. Wells
    Co-Chair, Cybersecurity, Data Protection & Privacy Team, Clark Hill Law

    Jeffrey R. Wells is the Co-chair of the Cybersecurity, Data Protection & Privacy team, and is a cybersecurity professional responsible for keeping organizations safe and protecting the privacy of employees around the world.

    With over 25 years of global experience leading cybersecurity engagement, Jeffrey engages clients by leveraging e...

  • speaker photo
    David Oaxaca
    Director, Integral Partners

    David leads the Cloud Identity Governance and Administration practice at Integral Partners. He brings over 20 years of software development, cybersecurity, access enforcement, IAM, and IGA consulting expertise. David is focused on establishing emerging technology partnerships and delivering evolving and innovative cloud-based IGA solutions an...

  • speaker photo
    Brent Andrewsen
    Director, Integral Partners

    Brent is the Director of the Privileged Access Management (PAM) practice at Integral Partners focusing on implementing CyberArk, BeyondTrust, Delinea, and other solutions. He has over 20 years of experience across a variety of IT disciplines including web infrastructure implementation and maintenance, ERP applications deployment and support, ...

  • speaker photo
    Ryan Cluff
    Director, Integral Partners

    Ryan is a multifaceted technical leader with 20+ years of information security and governance experience. Throughout his career, Ryan has led and created dozens of strategic initiatives from the ground up, built successful teams and delivered quality results with consistency. His. extensive experience delivering complex regulatory and techn...

  • speaker photo
    Moderator: David Cox
    VP of Services, Integral Partners

    David is a co-founder of Integral Partners, bringing over 25 years of technical and leadership experience in the cybersecurity consulting industry. He is responsible for strategic client and partner relationships and leads service delivery for all Integral Partners’ offerings. David has worked with organizations in many industry verticals and...

  • speaker photo
    Cecil Pineda
    SVP & CISO, R1 RCM

    Cecil Pineda is Senior Vice President and CISO for R1 RCM, Inc. He was previously the Senior Director and Program Leader for the VCISO and Consulting Practice at Critical Start. He also served as the CISO of DFW International Airport and also held leadership positions at GameStop, TXU Energy, Boeing and CVS Health.

    He is an active memb...

  • speaker photo
    Jason Ellis
    Director of Advisory, Integral Partners

    Jason Ellis is the Director of the Advisory Services. With more than 20 years of experience in IT, Jason has managed multimillion cybersecurity and IAM programs, overseeing the development of the strategy, product roadmap, and delivery. His deep understanding of the IAM technical landscape (IGA, PAM, Access Management, Customer Identity, Zero...

  • speaker photo
    Jordan Elbaum
    Sr. Customer Engineer, Security, Google
  • speaker photo
    Cameron Joyce
    Sr. Solution Engineer, Arctic Wolf

    Cameron Joyce is a self proclaimed "full stack" engineer. Having spent close to a decade in Managed Services Cameron Joyce has implemented or managed just about every enterprise technology on the market. With a background in security, messaging, and datacenter architecture, Cameron Joyce now helps businesses select emerging technology solutio...

  • speaker photo
    Rick Salimov
    Security Strategist, Mimecast
  • speaker photo
    Janet Rae
    Sr. Sales Engineer, Pentera

    Janet joined Pentera in 2022 and has been in sales engineering roles with various network and data security vendors for the last 20 years.

  • speaker photo
    Jason Silva
    Sr. Solutions Architect, BeyondTrust

    Jason Silva is a Senior Solutions Architect focused on Privilege Access Management (PAM), Identity and Access Management (IAM), and Least Privilege. Jason brings over 25 years of experience in solutions management to BeyondTrust's Privileged Access Management Solutions enforcing Privileged Password Management and Privileged Session Management...

  • speaker photo
    Aryan Taheri
    Certified Ethical Hacker & Principal Architect, Cybersecurity

    Aryan is highly unorthodox and has been a key contributor on multiple disruptive efforts at T-Mobile USA, including BI Retail Dashboards, Managing & Security Mobile Point of Sale Tablets, and SLT devices. He's created T-Mobile's Zero Trust Strategy, and more recently has been tapped to join a select tiger team to deliver MFA Everywhere for Re...

  • speaker photo
    Michael Bray
    CISO, Vancouver Clinic
  • speaker photo
    Jamison Utter
    Cyber Security Specialist, Infoblox

    Jamison brings 25+ years of IT/Security experience spanning large organizations like Sprint, SUN Microsystems and Palo Alto Networks where he led the OT/IoT business development unit and startups like Infoblox where he was the security evangelist for many years. His deep desire to understand a customer’s internal and external problem set make...

  • speaker photo
    Bill Jessen
    Federal Government Director of Sales, Prophecy Americas, Inc.

    As an accomplished technology and public sector sales leader, Bill Jessen has worked with large Fortune 500 companies like AT&T, Verizon, and Motorola as well as small to medium business throughout the US. Throughout his career, he has worked with notable municipalities and enterprise organizations including the Executive Office of the Presid...

  • speaker photo
    Jared Peck
    Sr. Threat Researcher, Proofpoint

    Jared Peck is a Senior Threat Researcher for the Field Facing Threat Research Team at Proofpoint where he focuses on phishing kit research and phishing campaign creation as well as communicating specific threats and the threat landscape to customers. Prior to joining Proofpoint, Jared spent eight years at a Fortune 500 financial services com...

  • speaker photo
    Mark Galpin
    Head of Solutions Architecture, Tidelift

    As a developer, architect and product manager, Mark Galpin has a passion for making the release process better.

  • speaker photo
    Chad Knipschild
    Sr. Product Marketing Manager, Recorded Future

    Chad is a senior product marketing manager at Recorded Future working on intelligence-based solutions. Before joining Recorded Future, he served as a U.S. Naval Intelligence Officer with an extensive background in special operations and cyber threat intelligence.

  • speaker photo
    Moderator Brittany George
    Partner, IT Advisory, Weaver
  • speaker photo
    Austin Smith
    Director, Systems Engineering, Code42

    Austin has been in security focused sales roles for the past 15 years with over 30 years of combined experience between IT and Sales. In that time, he has been fortunate to work with organizations of all sizes to help them reduce their risk, whether those efforts were focused on external threats or internal risks to their organization.

  • speaker photo
    Muli Motola
    Co-Founder & CEO, accSenSe
  • speaker photo
    Derek Washburn
    Security Solutions Advisor, Illumio
  • speaker photo
    Dwayne Collier
    Sr. Sales Engineer, Open Systems

    For most people, cybersecurity doesn't sound very interesting. For me, cybersecurity is a passion I’ve been chasing for 10+ years. Most recently, my work has landed me a position as a Sales Engineer with Open Systems where I’m focused on solving client security requirements.

  • speaker photo
    Brad LaPorte
    Evangelist, Team Cymru

    One of the most influential voices in cybersecurity and is credited with inventing the term ASM at Gartner. Brad is a former top-rated Gartner analyst for cybersecurity and threat intelligence, veteran of U.S. Cyber Intelligence, Dell, IBM, Kasada evangelist and product leader.

  • speaker photo
    Danielle Good
    Channel Account Manager, Thales

    Danielle is an innovative channel account manager with a deep background in delivering effective partner and customer experiences in high-growth and fast-paced environments. She is passionate about helping organizations reach peak security performance through customer-focused leadership, people development, team collaboration, and data-driven...

  • speaker photo
    Alex Henkes
    Enterprise Director, Northeast, Pentera
  • speaker photo
    Dave M. Collins
    Manager, Risk Consulting, RSM US LLP

    Dave brings over 30 years of IT, governance, risk, security/privacy, and compliance experience and consultation services to a variety of businesses and industries. Areas of focus include financial, insurance, retail, and healthcare. Dave has worked with organizations from small business to Fortune 100.

    A former CISO/director in the pri...

  • speaker photo
    Barbara Hiemstra, Moderator
    Privacy Engineer, IT Security and Compliance, Steelcase Inc.

    Barbara leads the Global Security Awareness/Phishing program to reduce risk and improve the cybersecurity culture at Steelcase. This includes creating content for employee awareness articles, training classes, and conducting multi-language phishing simulation and reporting.

    Prior to joining Steelcase, Barb was the Information Security-...

  • speaker photo
    Peter Starceski
    Sr. Sales Engineer, Axonius

    Peter is a sales and systems engineering professional with more than 37 years experience with a solid track record. Dedicated to the success of the organization and extended account teams and driving continuous customer satisfaction. Maintained a track record of excellence by going above and beyond to provide goal oriented solutions to busine...

  • speaker photo
    Stefan Hare
    Network Intrusion Forensic Analyst (NIFA), United States Secret Service
  • speaker photo
    William Smarr
    Special Agent in Charge, Dallas Field Office District, United States Secret Service
  • speaker photo
    Tyler Fornes
    Principal Solutions Architect, Expel

    Tyler Fornes is a Principal Solutions Architect at Expel. Tyler formally led Expel's Global Response Team in performing incident response for both Expel's enterprise and cloud offerings. Prior to Expel, Tyler worked at FireEye after receiving a M.S. in Computing Security at the Rochester Institute of Technology.

  • speaker photo
    Coover Chinoy
    CEO, CISO & Founder, Strategic Security Advisors, LLC
  • speaker photo
    Tom Grimes
    Director of Cybersecurity Sales, Infoblox
  • speaker photo
    James Herbst
    Principal Sales Engineer, Exabeam
  • speaker photo
    Chris Tyrrell
    Director of Sales Engineering, Qush Security
  • speaker photo
    Victor Mendoza
    Principal Solutions Architect, Thales

    Victor Mendoza, Principal Solutions Architect for Thales, is a member of the Cloud Protection and Licensing Solutions teams with 15+ years of experience in IT and cybersecurity. Today he works with companies in finance, healthcare, and oil & gas to streamline data security operations, accelerate growth and reduce risk to their most critical d...

  • speaker photo
    Kurt Hagerman
    Field CISO, Oracle

    Kurt Hagerman is a Field CISO in the North American Cloud Engineering group for Oracle. In this role, he provides cloud security advisory services in support Oracle Cloud Infrastructure and other Oracle cloud-based solutions and applications to C-level executives across multiple industry verticals.

    Prior to Oracle, Kurt served as a CxO...

  • speaker photo
    Sam Straka
    Sr. Product Manager, Red Canary
  • speaker photo
    Dean Agron
    CEO & Co-Founder, Oxeye

    Dean Agron is a cybersecurity expert with over 15 years of experience in the industry. He’s known for his expertise in identifying market gaps, and in being able to clearly articulate complex and highly technical topics. Prior to co-founding Oxeye, Dean led the strategic consulting group at Kayhut, a cyber-security service provider, and held ...

  • speaker photo
    Will Woodson
    Staff Security Engineer, Fastly

    Will has spent the past decade in various cybersecurity roles, most recently at Fastly building web security and anti-fraud products. Prior to Fastly, he worked to develop security operations teams and capabilities for government, financial services, and security product companies. When not working you can find Will spending time with the ans...

  • speaker photo
    Sean Leach
    Chief Product Architect, Fastly

    Sean is the Chief Product Architect at Fastly, where he focuses on building and scaling products around large scale, mission critical infrastructure. He was previously VP, Technology for Verisign, where he provided strategic direction along with product and technical architecture and was a primary company spokesperson. Sean was previously CTO...

  • speaker photo
    Kathleen Kuczma
    Sr. Solutions Consultant, Recorded Future

    Kathleen Kuczma (she/her) is a Senior Solutions Consultant with Recorded Future. Her prior experience includes 3.5 years as an Intelligence Analyst within the U.S. Department of Defense where she specialized in counterterrorism, digital forensics, and nation-state cyber threats. In her current role, Kathleen uses her intelligence background t...

  • speaker photo
    Donald Ikhtiari
    Principal Security Architect, Insight

    Don possesses over 30 years of technical, executive, and team leadership contributions in information security and IT Infrastructure. He is an ethical and trusted security advisor who builds and fosters positive working relationships with clients while delivering innovative value-driven security solutions that improve the security maturity of...

  • speaker photo
    Elvis Moreland
    Board Director, Cyber Bytes Foundation

    Elvis is an award-winning senior executive in the field of information security and privacy risk management. He ranks among the top 5% of these risk management experts in the world, with 30 years’ experience plus elite level credentials including certifications from the National Security Agency, the ISC2 Certified Information Systems Security...

  • speaker photo
    David Ellis
    VP, Forensic Investigations, SecurityMetrics
  • speaker photo
    Micki Boland
    Global Cybersecurity Architect & Check Point Evangelist, Check Point

    Micki Boland is a cybersecurity warrior and evangelist with Check Point Software Technologies Office of the CTO. A practitioner with 20 years in IT, cybersecurity, emerging technology innovation, Micki holds ISC2 CISSP, Master of Science in Technology Commercialization from the University of Texas at Austin, MBA with Global Security concentra...

  • speaker photo
    Chris Hills
    Chief Security Strategist, BeyondTrust

    Christopher L. Hills has more than 20 years’ experience as a Technical Director, Senior Solutions Architect, and Security Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Tech...

  • speaker photo
    Karla Thomas
    Threat Detection, Investigation & Incident Response Leader, Lear Corporation

    IT executive with over 20 years of achievement in collaborating closely with business leadership, leveraging technology to support business initiatives and in leading, developing and mentoring IT colleagues in multiple disciplines. Diverse background encompasses leadership roles across training, support, infrastructure, audit and security dom...

  • speaker photo
    Dan Adcock
    Chief Operating Officer, Binary Defense

    As Binary Defense Chief Operating Officer, Dan Adcock leads all client service delivery organizations, ensuring the company evolves and maintains industry-leading cybersecurity capabilities to defend clients. He is responsible for top and bottom-line performance of the company while ensuring that clients’ business objectives in partnering wi...

  • speaker photo
    Moderator: Tracy Caudill
    Chief Commercial Officer, Binary Defense

    As Binary Defense Chief Commercial Officer, Tracy Caudill, brings her experience leading complex cybersecurity engagements and building collaborative teams that create customer value and enable long-lasting partnerships across the customer journey. She is responsible for leading Binary Defense’s marketing, sales and customer success strategy ...

  • speaker photo
    Neil Christie
    Incident Response/Channel Sales Engineer, Cybereason

    Neil is a 25+ year veteran of the information technology and cybersecurity field. Forging technology environments that support security to protect business is Neil’s passion. Currently Neil is working with Cybereason to enable customers and partners to use industry leading tooling in incident response engagements and ongoing production enviro...

  • speaker photo
    Kristen Spaeth
    Sr. Investigator, Global Intelligence, Coinbase

    Kristen Spaeth is a Senior Investigator on the Global Intelligence team at Coinbase, where she works on investigations involving criminal matters in coordination with law enforcement partners. Prior to joining Coinbase, she was a Senior Cybercrime Analyst in the Cybercrime and Identity Theft Bureau at the Manhattan District Attorney’s Office....

  • speaker photo
    Greg Dunlavey
    Supervising Investigator, New York County District Attorney's Office

    Greg Dunlavey is a Supervising Investigator for the New York County District Attorney. Assigned to the Cybercrime and Identity Theft Bureau, his squad investigates sim swaps, DeFi exploits, and NFT thefts, as well as identity theft, business email compromise schemes and cyberstalking. He has been an Investigator for 12 years, previously servi...

  • speaker photo
    Josh Hopkins
    Senior Analyst, Team Cymru

    Now leading the internal S2 research team, Josh has been an analyst with Team Cymru for the past five years leading him to become an expert in counting to 10 and recommencing his work. He specializes in the tracking of infrastructure for a diverse target set that includes both nation state and criminal threat actors. Josh has an extensive bac...

  • speaker photo
    Michelle Sickbert
    Sr. Director, BISO, Equifax

    Michelle is the Business Information Security Officer.

  • speaker photo
    Tony Hadfield
    Sr. Director, Solution Architects, Venafi
  • speaker photo
    Brad Andersen
    Sr. MDR Security Consultant, Critical Start
  • speaker photo
    Cary Spearman
    Sr. Security Consultant, Critical Start

    Cary Spearman is a strong advocate for implementing real security and avoiding “security theater. As a graduate of Charleston Southern, Cary started his career in the IT world as a network administrator for a healthcare provider. His initial foray into the world as security was as a firewall admin with a large MSSP. Currently he is Security C...

  • speaker photo
    Michael Anderson, Moderator
    Deputy CTO & CISO, Dallas Independent School District

    Michael Anderson is an accomplished corporate executive, entrepreneur, and business consultant. In January 2022, he was named BUiLT 2021 Speaker of the Year! With over 25 years of IT Management experience, he applies innovative methods to leverage his expertise for extraordinary outcomes. His specialties are risk management, cybersecurity, co...

  • speaker photo
    Askia Howell
    Systems Engineer, https://www.linkedin.com/in/askiahowell/

    Before joining Palo Alto Networks, Askia graduated from MIT with a Bachelor's in Electrical Engineering in 2004. Since then, Askia has executed roles as an Account Manager, Sales Engineer, Systems Engineer, and a Consultant. Askia is an IEEE Member, CISSP certified since 2015, and has earned several technical certifications from multiple manu...

  • speaker photo
    Samatha Harish
    Emerging Technology Product Owner, Advanced Infrastructure Technologies, Ford Motor Company

    Samatha has 19+ years of experience in Enterprise technology with proven expertise in architecting, delivering, and maintaining complex projects in distributed environments.

  • speaker photo
    Brian Lourie, Moderator
    Sr. Lead, Global Cybersecurity Services, Mars

    Brian Lourie is a Business Information Security Senior Lead for Mars. He supports a wide variety of business units like Mars Wrigley, Kind, VetSource and Blue Pearl to name a few. Prior to joining Mars, Brian spent 20 years with General Electric as the Global DR Leader for GE Capital RE and running their VM program. He spent five years as a b...

  • speaker photo
    Adam Gavish
    Co-Founder & CEO, DoControl

    Adam Gavish is the Co-Founder and Chief Executive Officer of DoControl. Adam brings 15 years of experience in product management, software engineering, and network security. Prior to founding DoControl, Adam was a Product Manager at Google Cloud, where he led ideation, execution, and strategy of Assured Workloads (GovCloud) customer experienc...

  • speaker photo
    Peter Silberman
    CTO, Expel

    Peter Silberman is the Chief Technology Officer (CTO) at Expel, where he splits his time between the practicalities of building software to scale security professionals and being mayor of crazy-town. Before joining Expel, Peter was the senior director of Innovation and Customer Engineering (ICE) at FireEye, and he has presented his original r...

  • speaker photo
    Laura Thomson
    SVP of Engineering, Fastly

    Laura Thomson is the vice president of engineering at Fastly, makers of an edge cloud platform. She ended up in this position after a 12-plus-year stint at Mozilla, where she rose through the ranks and ended up as the senior director of engineering for Firefox engineering operations. She also worked as a lecturer at RMIT University and co-fou...

  • speaker photo
    Yanek Korff
    Chief of Staff and Co-Founder, Expel

    Yanek Korff has served in information technology or security roles for over 20 years. Starting out as a student help desk tech in a musty library basement in college he is now co-founder and Chief of Staff at Expel, a DC-area cybersecurity company that makes security easy to understand, use, and continuously improve.

    Yanek began his pr...

  • speaker photo
    Ryan Wakeham
    Senior Sales Engineer, Checkmarx

    Experienced leader with a demonstrated history of expertise in risk, compliance, and security. Strong builder, collaborator, and mentor who applies security fundamentals in the context of business objectives and requirements.

  • speaker photo
    Arun DeSouza
    CISO & CPO, Nexteer Automotive

    Arun DeSouza is currently Chief Information Security & Privacy Officer at Nexteer Automotive Corporation. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), security analytics, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk managem...

  • speaker photo
    William Floyd, Moderator
    CIO/CISO, FUTU US Inc.
  • speaker photo
    Derek Booth
    Special Agent, U.S. Secret Service
  • speaker photo
    Suess Beyer, Special Guest
    Network Intrusion Forensic Analyst, U.S. Secret Service
  • speaker photo
    Montez Fitzpatrick
    CISO, Navvis Healthcare

    Montez is Chief Information Security Officer at Navvis Healthcare. With nearly two decades of cybersecurity experience, Montez has worked across numerous industries including healthcare, finance, gaming, and non-profit. Montez also helps shape young minds coming up as the next generation of cybersecurity experts through public speaking and co...

  • speaker photo
    Christopher Beier
    Sr. Product Marketing Manager, Exabeam
  • speaker photo
    Moderator: Christine Pelione
    Cybersecurity Strategic Risk Manager, General Motors

    Experienced Cybersecurity Specialist with a demonstrated history of working in the automotive industry. Skilled in Business Process, Analytical Skills, Operations Management, Management, and Continuous Improvement. Strong program and project management professional with a Bachelor of Business Administration (BBA) focused in Business Administr...

  • speaker photo
    Karl Heimer
    Principal, Heimer & Associates LLC

    Leader of Training & Development for the Auto-ISAC ACT program. Owner/Principal of Heimer & Associates LLC. Senior Technical Advisor for Cybersecurity to Michigan Economic Development Corporation (MEDC) Auto Office and Michigan Defense Center. Founder of CyberAuto, CyberTruck, CyberBoat Challenges; assisted in the creation of the CyberTractor...

  • speaker photo
    Tim Myers
    CISO | Manager, IT Operations, Missouri Employers Mutual

    Tim is currently serving as the CISO and IT Operations Manager at Missouri Employers Mutual. He is a seasoned professional with over 25 years’ experience in the Security and IT Operations space. His experience includes roles in the energy sector, consulting, wholesale/retail, and the insurance industry. Tim is a proponent of a defense in d...

  • speaker photo
    Moderator: Jericho Simmons, CISM
    VP, Chief Information Security Officer, Sound Physicians

    Jericho has provided technology and security services within the education, government and healthcare industries for the last 19 years.

    His aspiration is to shift the mindsets of people to “Security in Practice”. Which in turn will significantly reduce the distraction of malicious actors so the organization may focus on positive busine...

  • speaker photo
    Joshua Seney
    Network Intrusion Forensic Analyst (NIFA), Michigan Field Office, United States Secret Service

    Joshua Seney is a Network Intrusion Forensic Analyst with the U.S. Secret Service Criminal Investigative Division. Joshua has over 27 years of law enforcement experience and retired as the Sergeant of Detectives from a local agency. He has conducted forensic examinations for criminal, civil, and insurance related matters, while serving in bot...

  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader...

  • speaker photo
    Doug Menendez, Moderator
    Instructor - Cybersecurity, Webster University

    After retiring in 2019 with nearly 40 years of industry experience, Doug joined the faculty at Webster University as a fulltime instructor in Webster’s National Center of Academic Excellence in Cyber Defense (CAE-CD).

    Doug is a dedicated teaching professional with demonstrated success in on-line, hybrid and in-person classroom techniqu...

  • speaker photo
    Patrick Sullivan
    VP, CTO of Security Strategy, Akamai

    Patrick Sullivan is VP, CTO of Security Strategy for Akamai and a Contributing Author for Information-Security magazine. Patrick joined Akamai's Security Team in 2005 and has been a leader working with leading enterprises to design security architectures and thwart evolving threats. Patrick is a frequent speaker at Security Conferences includ...

  • speaker photo
    Angela Robinson
    Cybersecurity Specialist, Missouri Information Analysis Center, Missouri Office of Homeland Security
  • speaker photo
    Brian Cockrill
    Assistant to the Special Agent in Charge, United States Secret Service - St. Louis Field Office

    I have been with the Secret Service for 20 years and am currently assigned to the St. Louis Field Office where I manage our cyber-enabled financial crime investigations and Gateway Cyber Fraud Task Force (CFTF). CFTFs are the focal point of Secret Service cyber-investigative efforts and were developed to increase the resources, skills, and v...

  • speaker photo
    Matt Fagala, Moderator
    Director, Security Operations, NTP

    Matt Fagala has over 20 years of experience in IT Operations. The majority of his career has been spent working for financial institutions and small to medium sized businesses in the St. Louis region. Like many, his career started at an early age with an interest in computer games and tinkering with computer hardware. After starting his firs...

  • speaker photo
    Andy Brush
    Program Director, Michigan Cyber Partners, Michigan DTMB

    Andy Brush is the program director for Michigan Cyber Partners. In this role, Andy seeks to improve the cybersecurity posture of governments across the state by finding innovative ways of working together across sectors both locally and nationally. Prior to joining the State of Michigan, Andy served Washtenaw County for 17 years in various ro...

  • speaker photo
    Larci Robertson
    Solutions Engineer, Cybereason

    Larci Robertson is a Sales Engineer in the TOLA region at Cybereason. She began her cyber career in the United States Navy as a Signals Intelligence Analyst. She had many different opportunities in the intelligence community at sea and shore. She is a proud plank owner of the Navy Cyber Defense Operations Command (NCDOC) where she was one of ...

  • speaker photo
    Brad Allen
    Senior Sales Engineer, Mimecast

    Brad has been married to his wife Mary for 17 years, and they have three boys: Carter age 15, Sam age 13, and Miles age 11. Brad and his family are an adventurous bunch, having flown and camped all over the US and several other countries as they love to travel and experience other cultures. Brad’s love for travel started when he joined the U....

  • speaker photo
    Taylor Milligan Crotty, Moderator
    Global Head of Cyber Resilience & Data Protection, BlackRock

    Taylor M. Crotty leads BlackRock Information Security’s Cyber Wargames team and is responsible for education, training and process development related to Cyber Incident Response & Recovery, measuring and managing cyber risks across the organization and Third Party Security for BlackRock’s critical service providers.

    Taylor is focused o...

  • speaker photo
    Jeff Wichman
    Director, Incident Response, Semperis

    Jeff Wichman has over 20 years of experience in information security, primarily focused on the Digital Forensics and Incident Response (DFIR) lifecycle. He has worked hundreds of incident response investigations, from relatively small business email compromises (BEC) to large-scale ransomware incidents.

  • speaker photo
    Amna Awan
    Director, Security Development & Engineering, Charles Schwab

    Amna Awan is Director, Security Development and Engineering, within the Technology Risk Management function of a major financial institution in the Dallas-Fort Worth area. She has an extensive technology background, including in development, and has held cybersecurity roles in the past with program ownership of multiple domains.

    Amna i...

  • speaker photo
    Paul Rapier
    Vice President of Information Technology, Detroit Pistons
  • speaker photo
    Dave Trader
    Field CISO, Presidio
  • speaker photo
    Annamaria Szakonyi
    Director of Cybersecurity, Saint Louis University
  • speaker photo
    Tomás Maldonado, Moderator
    CISO, NFL

    Tomás Maldonado is the Chief Information Security Officer (CISO) at the National Football League (NFL).  He is globally responsible for leading the information security program for the League and its entities.  Maldonado has over 23 years of experience in this area, having led global information security teams and programs at several large in...

  • speaker photo
    Bob Bacigal, Moderator
    AVP, Information Security Services, Amerisure Mutual Insurance

    Bob Bacigal is the Assistant Vice President of Information Security at Amerisure Insurance. He has over 30 years of experience in information security management, risk management, incident response, disaster recovery, and business continuity planning. Prior to joining Amerisure, he held security management positions with Great Lakes BanCorp, ...

  • speaker photo
    Steven Aiello, Moderator
    vCISO, AHEAD

    Mr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance. Currently, he is a Security & Compliance Practice Director with AHEAD, a consulting firm based in Chicago. Steven works closely with clients working across storage, virtualization and security silos.

  • speaker photo
    Mary Rowley, Moderator
    Sr. Manager, Third-Party Risk, Raytheon Technologies

    Mary’s several years of leadership experience encompasses many areas of cybersecurity with a focus on IT risk management, IT audit, security awareness training, vulnerability management and incident response. Her extensive information security background includes working at Henry Ford Health System, Comerica Bank, WorkForce Software, Learning...

  • speaker photo
    Nicole Dove
    Head of Security, Riot Games

    Nicole Dove is an award-winning cybersecurity leader, university lecturer & host of the Urban Girl Corporate World podcast.

    As Head of Security for Riot Games, she is responsible for building a scalable security program including a team of BISOs to support the company’s expansion into entertainment, music and esports.
    Nicole perf...

  • speaker photo
    Chahak Mittal
    Governance, Risk, and Compliance Manager, Universal Logistics Holdings

    Chahak Mittal is a Certified Information Systems Security Professional (CISSP) and Cybersecurity Governance, Risk and Compliance Manager at Universal Logistics. Chahak is deeply committed to knowledge sharing and community engagement. She has actively contributed to the cybersecurity ecosystem through her roles as a Judge at Major League Hack...

  • speaker photo
    Jaclyn Miller
    VP of IT & InfoSec, Chief Security Officer, DispatchHealth

    Jaclyn is a strategic security leader and advisor working with companies who are building and scaling their security programs in the tech and healthcare industries. With 19 years of experience, she has dedicated her career to building sustainable and secure digital transformations. Additionally, she specializes in building teams to meet the c...

  • speaker photo
    Gina Geisel
    Sr. Product Marketing Manager, Automox

    Gina is a Product Marketing Manager at Automox with over 20 years' experience in cybersecurity, endpoint management, and data storage. Gina develops messaging and content that resonates directly with our customers' challenges and is constantly seeking new ways to communicate how technology can make their lives easier.

  • speaker photo
    Brian Roye
    Sr. Security Consultant, Critical Start

    Cybersecurity professional with 20+ years of experience in solutioning and supporting across operations, client delivery, architecture, sales engineering, and management. Focus has been around security services, especially managed services and consulting as delivered from the provider. Experiences in working with clients from all industries a...

  • speaker photo
    Patrick Massey
    Director, Region 10, DHS Cybersecurity and Infrastructure Security Agency (CISA)

    Patrick Massey serves as the Regional Director of the DHS Cybersecurity and Infrastructure Security Agency (CISA) Region 10 office in Seattle where he is responsible for assisting private and public sector stakeholders enhance the security and resiliency of critical infrastructure facilities in the states of Alaska, Idaho, Oregon, and Washing...

  • speaker photo
    Nick Schappacher
    SVP & Deputy CISO, KeyBank

    Head of Information Security Governance

  • speaker photo
    Jennifer Dukarski
    The Geek Lawyer, Butzel Long

    Emerging Tech, Media, IP, Privacy & Cyber Shareholder

  • speaker photo
    Louis-David (LD) Mangin
    CEO & Co-Founder, Confiant Inc.

    Louis-David ("LD") is CEO and Co-Founder of Confiant, a cybersecurity startup specialized in threats that use digital ads as a cyber-attack vector. With 130+ custom ad tech integrations, Confiant has a unique vantage point to track credential phishing, malware infected software, investment scams, and more! Confiant is the sixth startup LD has...

  • speaker photo
    Raj Patel
    Senior Field Sales Engineer, WithSecure

    Raj Patel is a Senior Field Sales Engineer with Finland-based cybersecurity firm, WithSecure. His 20 years of experience leading IT projects has focused on analyzing business requirements and customer goals to deliver enterprise solutions with a focus on cloud and cybersecurity technologies.

  • speaker photo
    Or Katz
    Security Research, Principal Lead, Akamai

    Or Katz is a security veteran, with years of experience at industry leading vendors, currently serves as principal lead security researcher for Akamai. Katz is a frequent Speaker in security conferences such as SecTor, OWASP global events and various BSides events. Katz also published numerous articles, blogs and white papers on threat intell...

  • speaker photo
    Kim Albarella
    Interim Head of Global Security, TikTok
  • speaker photo
    Patterson Cake
    DFIR Principal Consultant, Avertium

    Patterson has worked in information-technology for more than two decades, focusing on information-security for the past several years, specializing in the development of incident-response teams, programs and processes. Before joining Avertium, he was a Senior Security Consultant for Haven Information Security, a Senior Security Engineer for A...

  • speaker photo
    Jason Miller
    Chief Security Officer, Paper Excellence

    Jason is the Chief Security Officer (North America) for Paper Excellence, where he manages all aspects of physical security. His diverse career spans over 25 years in US Special Operations and Corporate Enterprise, including roles as the Vice President of the Risk division for the largest security company in the world and Board of Directors o...

  • speaker photo
    Moderator: Kurtis Holland
    Sr. Principal, IT Security Architect, Sabre Corporation

    Kurtis Holland, CISSP, ISSAP, CISM is an executive security practitioner specializing in numerous cyber security domains involving Network and Application Security Architecture, Identity and Access Management, System Engineering and Operations, Vulnerability Threat Hunting, Hybrid Cloud, and Regulatory Compliance. Kurtis has worked for seve...

  • speaker photo
    Mark Hickey
    Senior Regional Security Principal, Insight
  • speaker photo
    Thomas Stone
    Cyber Security Advisor, Check Point Security

    Tom Stone is a seasoned cyber security advisor with more than 20 years of experience across the industry with a specialized focus on email and collaboration. Currently, Tom leads business development for Avanan, a Check Point Company, the world’s leading provider of advanced cyber security solutions. In his role, Tom works closely with custom...

  • speaker photo
    Naomi Buckwalter
    Founder & Executive Director, Cybersecurity Gatebreakers Foundation

    Naomi Buckwalter, CISSP CISM, is the Director of Product Security for Contrast Security and author of the LinkedIn course: “Training today for tomorrow's solutions - Building the Next Generation of Cybersecurity Professionals”. She is also the founder and Executive Director of Cybersecurity Gatebreakers Foundation, a nonprofit dedicated to cl...

  • speaker photo
    Juman Doleh-Alomary
    Director of Cybersecurity, Little Caesars Enterprises

    Juman Doleh-Alomary is the Director of Cybersecurity GRC at Little Caesar's Enterprises and an active volunteer board member of the ISACA Detroit and the CSA-Detroit Boards.  With over 15 years of experience in audit, security, investigation, compliance, and privacy policy/standards, Juman most recently held the position of Director of IT Aud...

  • speaker photo
    Afzal Khan
    Global CISO, OPKO Health, Inc.

    Afzal Khan is a distinguished leader in the field of technology security and risk management, bringing over 26 years of expertise to his role. Currently serving at OPKO, he provides strategic direction and guidance on technology risk management, IT, OT, and cybersecurity, ensuring compliance with IT regulatory standards across domestic and in...

  • speaker photo
    Gregg Yurchak
    Service Sales Manager, BlackBerry
  • speaker photo
    Solomon
    Security, Cyral

    Solomon has over 20 years' experience as a security leader at such companies as Microsoft, IBM, VMware, and Facebook.

  • speaker photo
    Blake Penn
    CISO, Colgate University
  • speaker photo
    Wesley Drone
    Director, Threat Research & Intelligence, Proofpoint
  • speaker photo
    Diego Maldonado
    Manager, Cybersecurity Engineering, Leonardo DRS

    Cybersecurity professional with over 30 years of experience with the U.S. Naval Service, Federal Civil Service serving in several roles as an IT Specialist, Information Systems Security Program Manager, Chief Information Security Officer (CISO) and Privacy Officer; In the Commercial space with IBM, The Newberry Group and other technology rela...

  • speaker photo
    Chris LaFleur
    Manager, Threat IR & Forensic, Trend Micro

    Chris LaFleur has spent the last three years working to prevent and eradicate threat actors such as Ryuk, Conti, and Lockbit. Chris began his career at Trend Micro in Threat Support, and is now running the Incident Response team. He was a key part of the making a method on how to predict customer attacks with the Smart Protection Early warnin...

  • speaker photo
    Andrew Wilder, Moderator
    Adjunct Professor, Cybersecurity, Washington University in St. Louis

    Andrew Wilder is currently the Vice President and Chief Information Security Officer at Hillenbrand. Prior to this role, he spent 18 years at Nestle where his last role was Regional CISO for Americas, Asia, and Europe. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University’s Information Security E...

  • speaker photo
    Shawn Heckmaster
    CISO, Forrest T. Jones & Company

    Shawn Heckmaster, Chief Information Security Officer for Forrest T. Jones & Company in Kansas City, MO has over 30 years of progressive information technology and security experience. He has worked across multiple private and government sectors, from the Department of the Army, Department of Defense, Black & Veatch and the Jones family of co...

  • speaker photo
    Tami Spellman, Moderator
    Director, IT Security, Caleres, Inc.

    Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.

  • speaker photo
    Chad Alvarado
    Special Agent, FBI
  • speaker photo
    Marc Rogers
    Sr. Director, Cybersecurity Strategy, Okta

    Marc Rogers is Senior Director of Cybersecurity Strategy at Okta. With a career that spans more than twenty years, he has been hacking since the 80’s and is now a white-hat hacker renowned for hacking technology like Apple's TouchID and the Tesla Model S. Prior to Okta, Marc served as the Head of Security for Cloudflare and spent a decade man...

  • speaker photo
    Severin Simko
    Engineer, Google Cloud Security

    Severin worked at Siemplify for nearly 3 years, 2.5 years of which were spent at TIP where he was team led for a team that was responsible for all integrations that Siemplify had. Nowadays he is focusing his work on Sales Engineering at Google Cloud Security and has been doing so for nearly half a year. Prior to that, Severin was working for ...

  • speaker photo
    Moderator: Karly Tarsia
    Content Strategist, SecureWorld

    Karly Tarsia is a Content Strategist at SecureWorld. Her focus is on bringing smart minds together to discuss challenges and insights the InfoSec community finds helpful and informative. Karly’s career began after she graduated from the University of Oregon in public relations where she worked with clients in technology, financial and consume...

  • speaker photo
    Mark Majewski
    Information Security Team Leader, Rocket Central
  • speaker photo
    Robert "Teall" Rist
    Security Engineer, Cybereason

    With over 34 years of industry experience, Robert “Teall” Rist has been immersed in all things security since originally beginning his career in law enforcement. In the 27 years since, he has joined multiple start ups and enterprise companies such as Verizon, CA Technologies, NetIQ, and IBM. While at IBM, Robert was a black-belt level subject...

  • speaker photo
    Faye Francy
    Executive Director, The Automotive Information Sharing and Analysis Center (Auto-ISAC)
  • speaker photo
    Tamara Shoemaker
    Cybersecurity Training Leader, The Automotive Information Sharing and Analysis Center (Auto-ISAC)

    Tamara Shoemaker is a diligent and self-motivated Cyber Security Specialist offering 25 years of combined experience in cybersecurity and administrative management for large and small corporations aiming to amplify the use and knowledge of security. Relentless dedication to leading teams to balance meticulous attention to quality with a sense...

  • speaker photo
    Tammi Lopez
    Sr. Director, Information Protection Assurance, Cigna
  • speaker photo
    Felicia Hedgebeth
    CISO, Georgia Department of Banking and Finance
  • speaker photo
    Scott Matsumoto
    CISO, Robinhood Crypto

    Scott Matsumoto joined Robinhood in 2021 and is responsible for building and maintaining the cybersecurity program for Robinhood Crypto. He brings extensive experience in both the cryptocurrency and cybersecurity spaces having previously served as the CISO for Circle Internet Financial and the Poloniex cryptocurrency exchange.

  • speaker photo
    Michael Roytman
    Chief Data Scientist, Kenna Security (a Cisco company)

    Michael Roytman is a recognized expert in cybersecurity data science. At Kenna Security, Michael is responsible for building the company's core analytics functionality focusing on security metrics, risk measurement, and vulnerability measurement.

    Named one of Forbes' 30 Under 30, Michael's strong entrepreneurship skills include foundin...

  • speaker photo
    Roger Brassard
    Sr. Product Manager – Email Threat Protection, OpenText Cybersecurity

    Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he ...

  • speaker photo
    Mike Wilkinson
    Director, Digital Forensics & Incident Response, Avertium

    Michael leads the Digital Forensics and Incident Response team at Avertium. The team is dedicated to helping clients investigate and recover from IT security incidents on a daily basis.

    Michael has over 20 years’ experience in the IT industry and has been conducting digital investigations since joining the NSW Police State Electronic E...

  • speaker photo
    Ray Yepes
    CISO, State of Colorado

    Yepes is the Chief Information Security Officer for the State of Colorado Governor's Office of Information Technology. Before his current role, Ray served as the CISO for the Texas Department of Family and Protective Services, the third largest agency in the Lone Star State. Ray holds a Master of Science in criminal justice and a Bachelor of ...

  • speaker photo
    Jaimin Shah
    CISO, American First Finance

    Jaimin Shah is an experienced security and technology leader in developing global information security and privacy program with diverse experience in various industries including Real Estate, Airline, Retail, Banking and Hospitality. Jaimin has over 25 years of extensive, strategic leadership experience in being a trusted advisor in the field...

  • speaker photo
    Sonja Hammond
    VP & CISO, National Veterinary Associates

    Sonja Hammond is the Vice President, Chief Information Security Officer at National Veterinary Associates. As an information and cyber security leader, Sonja brings experience from the financial, healthcare, manufacturing, and computing industries. An additional benefit that Sonja possesses is an information technology (IT) background with ha...

  • speaker photo
    Moderator David Belanger
    CSO, Bestow

    Dave Belanger has over 25 years of experience in Security and Technology Leadership roles. Dave is the Chief Security Officer for Bestow. In his prior roles, he served as Information Security Officer for a Technology Company operating in the corrections and public safety industry and as CISO for Maxor National Pharmacy Services. He was also t...

  • speaker photo
    Chad Rienerth
    Special Agent, Chicago Field Office, U.S. Secret Service

    SA Rienerth serves on the Cyber Fraud Task Force (CFTF).

  • speaker photo
    Joe Dabrowski
    Director, Strategy & GTM, Rubrik

    Joe leads America's Sales Strategy at Rubrik, working with enterprise customers and federal agencies on leveraging the Rubrik Data Security platform to drive cyber resiliency. Joe is an accomplished technology executive with 20 years’ experience. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Joe resides ...

  • speaker photo
    Paul Hammons
    Principal Sales Engineer, Imperva

    Paul has been working at Imperva for 10 years and he has seen it all. He started in IT Security roles in the mid-90s helping customers visualize, protect, and secure their environments. Having previously worked at companies like e-Security, Novell, Varonis, and various other startups, Paul has personally implemented security solutions on five...

  • speaker photo
    David Creed
    VP, Business Development, MSSP & GSI, Armis
  • speaker photo
    Mike Martin
    Sales Engineer Manager, Imperva
  • speaker photo
    Bryant Schuck
    Sr. Product Manager, Checkmarx

    Bryant Schuck is a Senior Product Manager for Checkmarx, where he is responsible for both the API Security and IAST products. Bryant has several years of experience in product management, software engineering, and agile ranging from being a co-founder of a startup to running teams for Fortune 500 companies. In his free time, Bryant enjoys tin...

  • speaker photo
    Derek J. Mayer
    Assistant Special Agent in Charge, Chicago Field Office, U.S. Secret Service

    Assistant Special Agent in Charge

  • speaker photo
    Ryan Leirvik
    Cybersecurity Author

    CEO of Neuvik and author of the book “Understand, Manage, and Measure Cyber Risk”. Past adventures include growing a cyber research and development company, serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, and sparking a fondness for technology problem-solving at IBM.

  • speaker photo
    Katherine Mowen-Matz
    VP, Information Security, Guaranteed Rate
  • speaker photo
    Nathan Zimmerman
    Cyber Security Engineer, Feeding America
  • speaker photo
    Alex Berger
    Sr. Director, Product Marketing, Open Systems

    With nearly a decade of experience in the cybersecurity industry, Alex Berger joined Open Systems to lead Product Marketing in 2021. Throughout his career, he has worked on a wide range of solutions spanning identity and access management, network security, cloud workload protection, data access governance and more. In his spare time, he enjo...

  • speaker photo
    Rebecca Rakoski, Moderator
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski, Esq., is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the ...

  • speaker photo
    Glenn Kapetansky, Moderator
    Chief Security Officer & Technology Lead, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...

  • speaker photo
    Dr. Srini Vadlamani
    CTO & Co-Founder, Cyral

    Dr. Srinivas Vadlamani is a hands-on expert in designing databases, big data management systems, and security solutions. He is the cofounder and CTO of Cyral, a venture-backed data security startup. He was most recently the founder and chief architect at Imanis Data, a big data protection pioneer that was acquired by Cohesity. He was previous...

  • speaker photo
    Peter Doggart
    Chief Strategy Officer, Armis
  • speaker photo
    Bob Skinner
    Security Principal, Insight

    Bob Skinner has worked for over 30 years in Information Technology and Security in highly complex and regulated industries such Financial Services & Banking, Defense, Telecommunications, and Airline Transportation. His technical experience includes Systems Administration, Database Design, Application Development, and IT Auditing. As a consu...

  • speaker photo
    Dan Clark
    Sales Engineer, Abnormal Security
  • speaker photo
    Ben Nicholson
    Global Practice Leader, Prisma Cloud, Palo Alto Networks
  • speaker photo
    Chad Maskill
    Cyber Hero, ThreatLocker

    Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infi...

  • speaker photo
    Dan Janiczek
    Solutions Director, Deepwatch

    Dan Janiczek is a seasoned Solutions Architect who takes a unique approach to engaging with customers on complex security problems. Coming from a background in Psychology he brings a fresh perspective to the unique challenges faced by organizations today, understanding the people and technology components of a successful security program. As ...

  • speaker photo
    Dr. Nate Brady
    Executive Board Member, Chicago Chapter, (ISC)2
  • speaker photo
    Brian Myers, Esq.
    Litigation Attorney, Octillo Law

    Brian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throu...

  • speaker photo
    Michael Stone
    Senior Solutions Engineer, Automox

    Michael Stone is a Senior Solutions Engineer and joined Automox in 2021. His passion is helping organizations reduce their potential attack surfaces beginning with a simple philosophy: Start by Locking the Front Door! Michael has focused on the field of cybersecurity with a focus on endpoint management for over 15 years with a number of indus...

  • speaker photo
    Christopher Fielder
    Field CTO, Arctic Wolf

    Christopher Fielder has been in the cybersecurity world for over 20 years with experience from a range of military, government, and corporate environments. Christopher holds 18 industry certifications including the CISSP, GPEN, GISP, GCFE, GSEC, GCIH, CEH, and more; along with a Master’s Degree in Information Security. Today he is the Field C...

  • speaker photo
    Rodrique Boutros
    Global Telco/SI Architects, Americas Sales, Check Point

    Rodrique has been with Check Point Software for nine years. He has more than 18 years of industry experience in IT networking and network security. The past four years, he has been focused on cloud security, supporting the Check Point field as a Data Center Virtualization and Cloud Security Solution Architect within the Americas.

  • speaker photo
    Mark Scrano
    Information Security Manager, Cobalt

    Mark Scrano is an information security manager at Cobalt, the leading pentest as a service company, where he focuses on maintaining network security, threat management and mitigation, vulnerability assessments, amongst other responsibilities. With over 15 years of experience he’s worked at notable companies including Vimeo, Paxos, and General...

  • speaker photo
    Laura D. Pfister
    Assistant U.S. Attorney, Northern District of Georgia, United States Attorneys' Offices

    As a federal prosecutor in the United States Attorney’s Office for the Northern District of Georgia, Laura is a member of the Cyber and Intellectual Property Section. She has investigated and prosecuted a variety of cyber-enabled crimes, including ransomware attacks, corporate sabotage, and computer hacking, as well as cyber fraud schemes, su...

  • speaker photo
    Terry McGraw
    Executive Consultant CTU/IR, Secureworks

    Terrence "Terry" McGraw is a retired Lieutenant Colonel from the United States Army and now serves as a senior executive Incident Response Consultant. He has more than 20 years of experience providing expertise in cybersecurity architectural design and operations in both commercial and government sectors.

    Terry previously served as pre...

  • speaker photo
    Antonio Andrews
    Chief Information Security & Privacy Officer, Bed Bath & Beyond
  • speaker photo
    Ivan Righi
    Senior Cyber Threat Intelligence Analyst, Digital Shadows

    Ivan Righi is a Senior Cyber Threat Intelligence Analyst at Digital Shadows, where he conducts research on cyber-threats affecting Digital Shadows' customers. Ivan earned his Master of Science degree in Cybersecurity from the University of Dallas, and holds a Bachelor of Science degree from Abilene Christian University. He also has a graduate...

  • speaker photo
    Zach Bulliner
    Sr. Special Agent, Digital Evidence Forensic Laboratory, United States Secret Service

    Zach Bulliner has been a Special Agent with the Secret Service since 2002, when he started in the Nashville Field Office. In 2008, he was transferred to Washington D.C., where he spent three years in the Cyber Intelligence Section (CIS) at Secret Service Headquarters before spending six years on Presidential Protection. He served on President...

  • speaker photo
    Dana K. Motley
    Founder & Owner, Motley Matrix LLC

    Motley Matrix is a unique digital marketing, social media and cyber intelligence small business. Current contracts support defense community collaborations, organizations within the CVE space, law enforcement and homeland security directives. Presentations and products leverage social media intelligence, cyber-social threat investigation, ope...

  • speaker photo
    Peter Clark
    Director, Solutions Engineering, Authomize
  • speaker photo
    Sam McHugh
    Sr. Sales Executive, Open Systems
  • speaker photo
    Jim Doggett
    Chief Security Officer, Semperis

    Jim Doggett is high energy leader focused on embedding risk management, security, and compliance into the business fabric to efficiently manage risks. Retired partner from EY where he spent 27 years helping clients through financial audits and building and sustaining security, risk and controls. Served as global leader of Information Risk and...

  • speaker photo
    Bob Reny
    Sales CTO & Principal Systems Engineer, Exabeam

    Bob Reny is a recent addition to the CTO team at Exabeam. His 27 years of experience in information technology starting in systems administration and security in the US Air Force. This started a path for all things security, focusing on computer and networks. Bob has done network security design, firewall architecture, IPS deployment, network...

  • speaker photo
    Tim Davis
    Head of Solutions Consulting, DoControl
  • speaker photo
    Jonathan Knudsen
    Technical Evangelist, Synopsys
  • speaker photo
    Joshua Reed
    Network Intrusion Forensic Analyst, United States Secret Service

    Josh Reed has over 15 years law enforcement experience and began working with the USSS in 2013. He is a certified computer, mobile device, skimming device examiner, and holds several professional certifications. He is an instructor at the National Computer Forensic Institute (NCFI) and has testified multiple times in state, local, and federal...

  • speaker photo
    Husnain Bajwa
    VP, Global Sales Engineering, Beyond Identity
  • speaker photo
    Lynn Dohm
    Executive Director, Women in CyberSecurity (WiCyS)

    Lynn Dohm brings more than 25 years of organizational and leadership experience to the WiCyS team as the Executive Director. She has long been committed to cybersecurity education and for the last 14 years held active roles in grant-funded programs and nonprofits that assist in providing educational solutions for the cybersecurity workforce. ...

  • speaker photo
    Jordan Fischer, Moderator
    Cyber Attorney, Partner, Constangy, Brooks, Smith & Prophete, LLP

    Jordan Fischer represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts,...

  • speaker photo
    Matthew Eddins
    Special Agent, Charlotte Field Office, U.S. Secret Service; North Carolina Cyber Fraud Task Force (CFTF)
  • speaker photo
    Mike Muscatell, Moderator
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Com...

  • speaker photo
    MJ Knudsen
    Global Director, Sales Engineering, Digital Shadows
  • speaker photo
    Sean Deuby
    Director of Services, Semperis
  • speaker photo
    Ran Barth
    Director of Security Engineering, Salt Security

    Ran is an Enterprise Security Expert with many years of experience helping Fortune 500 companies secure their data and applications. Ran has detailed knowledge of Enterprise Security best practices and technologies and has been focused on the creation and deployment of solutions protecting networks, systems, and information assets with focus ...

  • speaker photo
    Chad Barr
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group

    Chad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.

    As a visionary leader in the re...

  • speaker photo
    Moderator: Mike Hillhouse
    CIO / CISO, Cadrillion Capital
  • speaker photo
    Moderator: Frank DePaola
    VP, CISO, Enpro

    Frank is the CISO at EnPro Industries (NPO). He is passionate about striking balance between the responsible use of technology and effective risk management. In his role, Frank is responsible for defining, championing, and executing the cybersecurity and regulatory compliance strategies, programs, and initiatives globally, in deep collaborati...

  • speaker photo
    Vitaliy Shtym
    Manager, Cloud Architect, Trend Micro

    Vitaliy Shtym is a Cybersecurity Practitioner with over 10 years of experience, 5 of which have been at Trend Micro. Vitaliy has been in multiple customer facing roles to address cybersecurity challenges in organization of all sizes. He focuses on architecting optimal security solutions for customers leveraging Public and Hybrid Cloud. With p...

  • speaker photo
    Jovonni Pharr
    Engineer, Scientist, Founder of GACWR, Georgia Cyber Warfare Range (GACWR)

    Jovonni Pharr is a software/hardware engineer with a focus on Research & Development (R&D) in emerging technologies. He enjoys building solutions in Electronics, Materials Science, and Intelligent Systems. Some of his research focuses on areas in Computer Science, Human Behavioral Psychology, and Artificial Intelligence. He Graduated from Gor...

  • speaker photo
    Aaron Rose
    Security Architect, US Public Sector, Office of the CTO, Check Point Software Technologies

    Aaron Rose is a Cyber Security Evangelist, Security Architect & Member of the Office of the CTO at Check Point Software Technologies. A subject matter expert in Cloud, Internet of Things, and Application security; Aaron has focused his career on securing organizations & their resources beyond the perimeter of the traditional network firewall...

  • speaker photo
    Jeff Hardee
    Security Solutions Architect, Qualys
  • speaker photo
    Rob Vanderberry
    Regional Sales Manager, Thales

    Rob Vanderberry is celebrating his 26th year of technology sales and consultation, experienced in selling solutions to businesses and public sector organizations as manufacturer rep, distributor and reseller. Rob has a passion for helping organizations achieve successful business outcomes through optimized blends of technology, knowledge and...

  • speaker photo
    Leo Howell
    CISO, Georgia Institute of Technology

    Leo Howell is a visionary information security leader who is passionate about the "I" in IT as he believes that data leveraged as a strategic asset is a major competitive benefit to any organization. Leo has over 24 years of service in IT and currently serves as the chief information security officer for Georgia Institute of Technology where ...

  • speaker photo
    Brett Price, CISSP, CISM
    Lead Cybersecurity Consultant, vCISO, AccessIT Group

    Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. Brett’s skills range ...

  • speaker photo
    David Ortega
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security

    David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expe...

  • speaker photo
    Iván Hernández
    Sales Engineering Manager, CISSP, C|EH, Proofpoint
  • speaker photo
    Amber Cole
    Sr. Special Agent, Cyber Crime Unit, United States Secret Service
  • speaker photo
    Moderator: Shawn Knaebel
    Director of Information Security | CISO, Uniti Group Inc.
  • speaker photo
    Simon Hill
    Head of Legal & Compliance, Certes Networks

    As VP of Legal and Compliance for Certes Networks, Simon assists with Regulatory and Compliance matters, Intellectual Property and interpretation of Security and Compliance Framework requirements. Simon has extensive international experience as a technology lawyer, working in multiple jurisdictions including the European Union, Japan, India ...

  • speaker photo
    Justin Harris
    Director of Product Management, Delinea

    Justin Harris is a 20+ year technology veteran with a wide range of vertical industry exposure that has a knack for understanding how market trends introduce market needs. In his role as Director of Product at Delinea he leads the Vault portfolio of products such as Secret Server and DevOps Secure Vault. Justin’s area of expertise includes br...

  • speaker photo
    Scott Deluke
    Enterprise Sr. SE Manager, Abnormal Security
  • speaker photo
    Eric Walters
    Director, Cybersecurity & IT Infrastructure, Burns & McDonnell

    A seasoned information technology leader with over 25 years of information security experience. Capable of translating low level security details into executive level business decisions. Believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. Experience inclu...

  • speaker photo
    Rodney Pattison
    Sr. Security Architect, Capgemini

    Executive with multi-industry and multi-national IT service delivery experience. Global consulting background with expert level understanding and experience in IT strategy & governance, directing large, complex change initiatives. Business advisor developing lasting relationships by taking responsibility for customer satisfaction and conveyin...

  • speaker photo
    Moderator: Jennifer Harmon
    Information Security Analyst, Ascend Learning

    Superior problem-solving skills and experience securing complex systems. A skilled Incident Manager of hosted systems with an emphasis on supporting both Linux and Windows Operating Systems secure availability.

  • speaker photo
    Moderator: Maria Singh
    Women in Security KC, President

    With more than 10 years of experience in the telecommunications industry & specifically 6 years in the Cybersecurity space. Experienced, thought leader, cybersecurity professional with operational experience in building successful processes and leading projects in vulnerability scanning, vulnerability management, access management, privacy an...

  • speaker photo
    Neil Watkins
    CISO, i3 Verticals
  • speaker photo
    Moderator: Cory Kennedy
    Threat Researcher
  • speaker photo
    Stan Shollenbarger
    Sr. Information Security Analyst, Veterans United Home Loans
  • speaker photo
    Josh Bryant
    Network Intrusion Forensic Analyst, United States Secret Service
  • speaker photo
    John Seubert
    Supervisory Agent, Kansas City Field Office, United States Secret Service
  • speaker photo
    Wally Bitout
    VP Global Business Development, Seclore

    Wally Bitaut has worked in the content and collaboration industry for over 30 years, starting with FileNet Corporation (now an IBM Company) in Executive Leadership roles across Marketing, Sales, Product Management, Professional Services, and as a Board member. Today, Wally is the Global VP of Business Development at Seclore. His focus is to c...

  • speaker photo
    McClellan 'Mac' Plihcik
    Senior Special Agent, U.S. Secret Service, North Carolina Cyber Fraud Task Force (CFTF), Charlotte Field Office
  • speaker photo
    Rueben Rodriguez
    Sr. Director, Product Marketing , Recorded Future
  • speaker photo
    Jose Ferreira
    Sr. Director, Security Solutions, East, Sirius, a CDW Company

    Ferreira helps enterprises develop and maintain proactive security programs. He has over two decades of IT security experience and works with organizations to understand their assets, identify security gaps, and define the people, processes and technology that can facilitate mitigation and support business goals. He focuses on the development...

  • speaker photo
    Christopher Martin
    Sr. Security Specialist, Google Cloud
  • speaker photo
    Jaron Shaul
    Sales Engineer, Major Accounts, Netskope
  • speaker photo
    Jonathan Brito
    Manager, Third-Party Risk Management, Synctera

    Jonathan Brito oversees Third-Party Risk Management at Synctera. Synctera connects community banks with FinTechs, allowing the bank to grow and the FinTech to launch quickly. Our processes streamline day-to-day processes like reconciliation, operations, and regulatory compliance for FinTech Banking. Jonathan Brito possesses over a decade of e...

  • speaker photo
    Carraig Stanwyck
    VP / Global CISO, Avnet
  • speaker photo
    Isaac Hannagan
    Sr. Solutions Architect, ReliaQuest

    Isaac Hannagan is a security professional with nearly a decade of experience spanning SIEM and the security industry supporting, architecting, and scaling solutions and services. Isaac has spent several years working in the SIEM vendor space supporting LogRhythm’s strategic enterprise environments as a Technical Account Manager before helping...

  • speaker photo
    Nick Wormser
    Managing Director, Palatin Group SK

    Mr. Wormser has over 20 years of military and international security experience. He spent a decade in the French military where he was deployed to a host of foreign countries, serving as a team leader of a long-range reconnaissance and patrol unit (LRRP), conducting counter-narcotics and anti-terrorism operations, and training of host-country...

  • speaker photo
    Christopher Sanders
    President, The Palatin Group LTD

    Mr. Sanders is currently the President of The Palatin Group LTD, an intelligence and corporate security advisory headquartered in Arlington, VA with offices in Bratislava, Slovakia and Zurich, Switzerland with partner offices around the globe. A seasoned security management consultant and executive with over 25 years of domestic and internati...

  • speaker photo
    Daniel Reardon
    Sr. Solutions Architect, Securonix
  • speaker photo
    Moderator: Avishai Avivi
    CISO, SafeBreach
  • speaker photo
    Scott Sweren
    Security Principal, Insight
  • speaker photo
    Moderator: Tracey Brand-Sanders
    CISO, UGI Corporation
  • speaker photo
    Allen Sautter
    Principal Security Advisor, AWS; Former CISO, Federal Reserve Bank of Atlanta
  • speaker photo
    David Barrish
    Senior Solutions Engineer, Okta

    David is an Information Technology professional with over 20 years of experience in pre-sales engineering and software deployment in the Identity Access Management space. He has worked for many of the top IAM companies over his career and enjoys sharing his deep knowledge and experience to make customers successful.

  • speaker photo
    Moderator: Phread Cichowski
    Sr. Security Architect, SecureWorks

    Phread Cichowski has over 35 years of experience ranging from software development to data center management. Having worked for some of the leading technology companies in the world, his broad range of experience allows him to provide a well-balanced perspective leveraging bleeding-edge technology in critical high-availability IT environments...

  • speaker photo
    Kara L. Hilburger, Esq.
    Privacy Compliance & Digital Accessibility Team Leader, Beckage Law

    Kara advises and counsels clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state and international privacy laws, including the European Union’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), Virginia Consumer Dat...

  • speaker photo
    Winston Lalgee
    Security Engineering Manager, Check Point

    Winston has almost 20 years of experience in the ICT industry; designing and implementing network security solutions for large enterprise environments. Today, he is a Security Engineering Manager with Check Point Software and is currently supporting a unique set of strategic accounts. He provides thought leadership; helping his customers unde...

  • speaker photo
    Mike Roman
    Sr. Sales Engineer, Orca Security

    Mike is a Senior Sales Engineer at Orca Security who is responsible for helping organizations identify risks in their cloud environments and enhance their cloud security posture. Prior to joining Orca, Mike spent five years at Splunk where he partnered with organizations on their cloud journey in areas that included Security and Observability...

  • speaker photo
    Jon Poon
    VP of Security Services, Novacoast

    Jon's background is in Computer Science and was a software developer building web and mobile applications before moving into the security industry. He has been working with SIEM technologies for over a decade and has worked with hundreds of customers over that time building out SOC and SOC teams.

  • speaker photo
    Steve Boone
    Head of Product, Checkmarx

    Over the last decade, Steve Boone has helped hundreds of global clients with their strategic adoption of secure DevOps best practices. A frequent speaker at DevOps Enterprise Summit, and DevOps World, Steve has shared his expertise on Secure Continuous Delivery, Value Stream Management, and Agile best practices. Today, Steve is the Head of Pr...

  • speaker photo
    Jake Munroe
    Platform Marketing & Strategy Director, Recorded Future

    Jake has held various roles across the security space in consulting, marketing, and sales. Prior to joining the private sector, Jake served as a Navy Intelligence Analyst with an extensive background in counterterrorism, cyber threat intelligence, and open-source intelligence investigations.

  • speaker photo
    Tony Allegrati
    Cloud Systems Engineer, Fortinet

    Tony Allegrati is an experienced Sales Engineer with over 15 years of sales in both medium and enterprise accounts. Specialties: Presales demonstrations, evaluation, installations, training and support of IT security technology. 3+ years of work experience with Cloud Technologies and security for Cloud.

  • speaker photo
    Dave Klein
    Director, Cyber Evangelist, Cymulate

    21+ year veteran high tech leader with a proven track record of revenue generation in sales and demand generation in marketing. Successful in creating and conveying solution messaging for business and technical decision makers, analysts and channel partners. Energized teacher for field enablement.

  • speaker photo
    Carlton Jones
    Regional Vice President, Qualys

    Carlton Jones is Vice President of Northeast Enterprise Field Team. Over 20 years of Security leadership experience, in Fusion Centers, Incident Response, Insider Threat, and Attack Surface Management. Carlton designs solutions at scale for the largest brands and technology providers in the world. His background as a practitioner and consulta...

  • speaker photo
    Mick Leach
    Head of Security Operations, Abnormal Security

    Mick Leach is the Head of Security Operations at Abnormal Security. Prior to joining Abnormal, he held several security positions with Fortune 500 organizations, including Alliance Data and Nationwide Insurance and served in the United States Army for over 8 years.

    Mick is a seasoned IT security leader with an extensive background in...

  • speaker photo
    Vijaya Rao
    Enterprise Cloud Security — Product Lead, UnitedHealth Group

    Vijaya Rao is a Senior executive with over 25 plus years of experience in the Engineering and Cybersecurity space. She has worked for different fortune 100 companies such as CenturyLink, AOL, JP Morgan Chase, and Google. She also founded the last mile Technology enabled platform called DeliveryCircle, raised multiple rounds of funding and cu...

  • speaker photo
    Nick Dulavitz
    Global Director, Channel Solutions Engineering, CyberArk

    Nick Dulavitz, Global Director of Channel Solutions Engineering, has been with CyberArk for the past 8 years. Nick has worked with some of the largest global organizations helping them to achieve their identity security goals. In his current role, he is responsible for leading a global team that focuses on technical go to market enablement f...

  • speaker photo
    Mike McKeown
    National Sales Executive, BTB Security, LLC

    A 1980 graduate of St. Joseph's University, Mike has a 30+ year career of marketing and selling technology goods and services to SMB and Fortune 500 clients. While resident in the Great Philadelphia area, Mike has sold services nationwide. After owning his own business for 18+ year in technology services, Mike has been selling incident respon...

  • speaker photo
    Elizabeth Sylves
    Sr. Consultant, North America, CSC

    Elizabeth Sylve is Senior Business Consultant for Enterprise Businesses at CSC where she helps and advises Senior IT and Cyber Security Professionals mitigate risk in front of the firewall. She is also a speaker for Global Antifraud and Phishing Solutions, former 8-year VP of IT Technology consultant at FuturTech Consulting, LLC, and has 24 y...

  • speaker photo
    Krista Arndt
    CISO, United Musculoskeletal Partners

    Krista Arndt is the Chief Information Security Officer (CISO) at United Musculoskeletal Partners. As the CISO, Krista is responsible for the safety and security of all UMP and its practices' patients and employees. Krista accomplishes this by ensuring continued maturation and providing strategic direction for UMP's information security progra...

  • speaker photo
    Valentina Flores
    CEO, Red Sentry

    Valentina Flores is CEO of Red Sentry, a vulnerability scanning and penetration testing company that keeps organizations secure 24/7/365 by actually mimicking hackers. Formerly a cybercrime detective on a federal task force, Valentina fought against these criminals her whole career, and has unique insight into the minds and tactics of attacke...

  • speaker photo
    Jim Bearce
    VP, Professional Services, AccessIT Group

    James Bearce is Vice President of Professional Services at AccessIT Group. Jim brings more than 20 years of information technology and cybersecurity development, operations and leadership experience in the financial services industry, and in cybersecurity advisory and managed services.

    Prior to joining AccessIT Group, Jim was responsib...

  • speaker photo
    Jim Chrisos
    Principal Engineer, Exabeam

    Jim officially started working in security as an analyst at a large MSSP. This experience enabled him to gain employment at large global organizations as an analyst before becoming an incident handler. It was in his capacity as an incident handler where he witnessed, first hand, nation state attacks. This left such a profound impact on Jim th...

  • speaker photo
    Sean Boulter
    Principal Security Engineer, Salt Security

    Sean Boulter is a technical leader with Salt Security where he helps his customers protect their APIs from abuse and keep their customers’ data secure. His career in IT and consulting spans three decades and covers a wide variety of infrastructure platforms and several industries including fintech, finserv, insurance, healthcare, medtech, and...

  • speaker photo
    Krishna Vishnubhotla
    VP, Product Strategy, Zimperium
  • speaker photo
    Matt Barnett
    CEO, SEVN-X

    Matt is the Chief Executive Officer at SEVN-X. As a certified forensic analyst, former Law Enforcement Officer, and expert field operator, Matt lead's SEVN-X's Incident Response, Forensics, and Physical Security practices.

  • speaker photo
    Nick Rago
    Principal Security Engineer, Salt Security

    Nick is a startup veteran and Internet technology entrepreneur with over 25 years of application development, testing, and cyber security experience. He is recognized as an industry expert in API development, API management, and API security. At Salt, Nick is helping guide and positively influence how organizations protect themselves from tod...

  • speaker photo
    Moderator: Gus Chiarello
    Director, Security Architecture, AccessIT Group

    Gus Chiarello is the Director of Security Architecture and part of the technology consulting leadership team at AccessIT Group (AITG). Gus has over 10 years of experience in risk management and 16 years in IT professional services leading the development of AppSec MDR, MSP, and MSSP service practices. Through leveraging his background in both...

  • speaker photo
    Luke Babarinde
    Principal Architect, Sales Engineering, Imperva

    Luke Babarinde is a Principal Solutions Architect at Imperva with over 15 years of experience in cybersecurity. He is passionate about building effective solutions to assist organizations seeking to holistically address data challenges of which security is critical.

  • speaker photo
    Ray Canzanese
    Director of Netskope Threat Labs, Netskope

    Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.

  • speaker photo
    Stephen Fitzgerald
    Sr. Sales Engineer, Orca Security

    From writing detection rules and automations for SOC teams to assisting with compliance initiatives, cloud security has always been the focus of Stephen's career. Currently Stephen serves as a Senior Solutions Engineer at Orca helping customers architect and operationalize the Orca platform, as well as providing risk assessment reviews and gu...

  • speaker photo
    Trenton Ivey
    Counter Threat Unit Researcher, Secureworks

    Trenton has had the privilege of working with teams of skilled hackers to legally compromise some of the largest organizations in the world. Trenton has also worked on several high-profile incident-response engagements to help provide the adversarial mindset as organizations respond and recover. While his focus is currently offensive research...

  • speaker photo
    Brian Haugli, Moderator
    Managing Partner, SideChannel
  • speaker photo
    Eric Gauthier
    VP, Infrastructure & Security, Emsi Burning Glass

    Eric Gauthier, CISSP, is a technology leader with 20 years’ experience working at the intersection of Information Security, IT, and DevOps. Eric is both a technical architecture and security leader having held positions in various settings including the corporate, academic, and service provider spaces building security programs, leading secur...

  • speaker photo
    Selva Vinothe Mahimaidas
    CISO, Houghton Mifflin Harcourt

    Selva Vinothe Mahimaidas is an Information Security Leader with more than 20 years of experience in all phases of information security. Selva currently serves as Chief Information Security Officer (CISO) at Houghton Mifflin Harcourt, an American publisher of textbooks, instructional technology materials, assessments, reference works, and fict...

  • speaker photo
    Andrew Smeaton
    CISO, Afiniti

    Andrew holds over 22 years of experience in the banking, financial services, and healthcare industries. He is experienced in all facets of IT/IS Security & Risk Management including acquisitions and disaffiliations, and has a track record of developing and implementing security strategies from inception through execution. In addition to his c...

  • speaker photo
    Stan Fromhold
    Senior Security Solutions Architect, Securonix
  • speaker photo
    Sandra Cavazos
    VP, Product Security and Privacy, Comcast

    Sandra Cavazos serves as VP, Product Security and Privacy at Comcast. She leads Secure Development Lifecycle (SDL), including threat modeling, pen testing, SDL coaching, DevSecOps tooling, security developer training, and executive reporting. Sandra began her career as an engineer at Intel’s largest wafer manufacturing facility, improving qua...

  • speaker photo
    Tal Kollender
    Co-Founder & CEO, CISO, Gytpol

    Tal is the CEO and co-founder of Gytpol. In her teenage years, she was a professional hacker, always on the hunt to crack open what seemed impossible, always on the lookout for IT challenges. As part of her army service, she was recruited to the Israel Air-Force having her sights set on becoming a fighter pilot. Later, the IDF re-assigned her...

  • speaker photo
    Michael Howden
    Director of Security Services, Novacost

    Michael Howden brings broad and deep experience in technology, strategy, and security with almost 30 years of experience focusing on global upgrades, migrations, and consolidations for several hundred large enterprises. He is a transformational change agent, leading teams of top tier consultants, building world-class cybersecurity programs fo...

  • speaker photo
    Moderator: Peter Kurek
    Cybersecurity Threat Hunter and Incident Responder, Eversource Energy
  • speaker photo
    Terry Olaes, Moderator
    Director, North America Systems Engineering, Skybox Security

    Terry Olaes is director of North America systems engineering at Skybox Security. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. Working on the ground floor at a manufacturing plant, serving as a systems engineer, and managing large security t...

  • speaker photo
    Sean Raffetto
    Sr. Account Executive, Hoxhunt

    Sean works with organizations across the globe partnering with them to provide tailored Consulting security services enabling security teams to keep up with the rapid pace of change in the cyber threat landscape. With over a decade of experience working with enterprise level solutions, Sean specializes in implementing proactive and defense cy...

  • speaker photo
    Trevor Welsh
    Global Security Strategist, Google Cloud Security

    Trevor is a Global Security Strategist with Google Cloud Security. Trevor leverages extensive experience in public sector, financials, retail / logistics, manufacturing, healthcare, and high tech to solve complex security analytics challenges. A former leader with Anomali, and companies like Splunk, ArcSight, and Fortinet, Trevor brings insig...

  • speaker photo
    Stephen Clark
    Director of Cloud Security Sales, Fortinet

    Stephen Clark has over 25 years experience in the information security space having spent time at Check Point, Cisco, and Palo Alto Networks. Stephen also spent time working in the security consulting field working primarily with the Fortune 1000.

    He is presently the Director of Cloud Security Sales for Fortinet. Today he helps manag...

  • speaker photo
    Jeffrey Morissette
    Technical Staff Assistant (Special Agent), Boston Field Office, United States Secret Service

    Prior Federal Employment
    United States Border Patrol (USBP) – Casa Granda Station, AZ
    Employed as an agent of the U.S. Border Patrol, July 1997 – January 2000
    Training: US Border Patrol Academy (6 months), Charlestown, SC

    Current Federal Employment
    United States Secret Service (USSS) – Boston Field Office

  • speaker photo
    Monsurat Ottun
    Cybersecurity Advisor (CSA), Integrated Operations Division | Region 1, CISA
  • speaker photo
    Jonathan Trull
    SVP, Customer Solutions Architecture and Engineering, Qualys

    Jonathan Trull is a longtime security practitioner and CISO with over 18 years of experience in the cybersecurity industry and is currently the Senior Vice President of Customer Solutions Architecture and Engineering at Qualys. His career has spanned operational CISO and infosec roles with the State of Colorado, Qualys, Optiv, and Microsoft....

  • speaker photo
    Kevin Burns
    CISO, Draper
  • speaker photo
    Michael Meltz
    Senior Sales Engineer, Open Systems

    Mike Meltz has worked in the IT Security and infrastructure space for over 25 years and he specializes in the design and implementation of enterprise-level Cybersecurity technologies and business process improvements. His goal is to remain focused on creating a secure and quality-driven user experience while helping the organization grow and ...

  • speaker photo
    Abel Morales
    Principal Security Engineer, Exabeam

    Abel Morales is a Senior Security Engineer based in Atlanta, GA. Prior to Exabeam, Abel has over ten years of experience in information security in companies such as Verizon, Syniverse, McKesson and InterContinental Exchange (NYSE). In his previous role, he was responsible for managing incidents, performing technical analysis, and communicati...

  • speaker photo
    Darren Carroll
    Managing Principal - Security Services, Insight

    Darren is a risk management and information security leader with diverse global experience in operational, technical, management, and presales roles. He has had the pleasure to build and lead multiple diverse, dynamic, high-performing teams. Throughout his career, he has provided consultative thought leadership, strategic direction, and tacti...

  • speaker photo
    Joseph Crehan
    Sr. Systems Engineer, Abnormal Security
  • speaker photo
    Eoin Hinchy
    Founder, Tines

    Before founding Tines in early-2018, Eoin worked in various enterprise security teams. He was a senior engineer in eBay Inc.’s Global Threat Management team, and most recently as DocuSign’s senior director of security operations, he led the company’s incident response, security tooling, threat intel/hunting, and forensics programs. Eoin has t...

  • speaker photo
    Ryan McGill
    Senior Solution Stragegist, ConnectWise
  • speaker photo
    Brian Black
    Director of Sales Engineering, Deep Instinct

    Brian is a Philadelphia based Distinguished Sales Engineer with 20+ years of experience in Cybersecurity and Intelligence. Brian leads Deep Instinct’s security engineering team, overseeing North and South American territories. He is a thought leader and technology evangelist with a wealth of knowledge on AI, Deep Learning, and Machine Learnin...

  • speaker photo
    Lokesh Aggarwal
    CEO & President, Apexa IQ

    Lokesh Aggarwal has over 20+ years of hands-on experience in developing technology plans, prioritizing IT initiatives and coordinating the evaluation, deployment, and management of current and future technologies. He has a track record of guiding large scale transformations and projects through the development of IT capability roadmaps, deplo...

  • speaker photo
    Rich Schofield
    Principal Security Architect, Sysdig

    Rich Schofield is a Principal Security Architect at Sysdig. Based in Boston. Rich has over 25 years experience in DevOps and Security at companies large and small, including HPE, Opsware and BBN. Over the past 4 years at Sysdig he has focused on security and visibility for Cloud and Kubernetes environments.

  • speaker photo
    Greg McCarthy
    CISO, City of Boston

    Greg McCarthy is the first Chief Information Security Officer for the City of Boston and career public servant. Since joining the City of Boston’s Cybersecurity Team in 2010, Greg has managed the implementation of numerous information security solutions, developed the City's first cybersecurity awareness program for employees and successfully...

  • speaker photo
    Franklin Edwards
    Director, Solutions Architect, Deepwatch
  • speaker photo
    Chris Gray
    Area Vice President, Security Strategy, Deepwatch
  • speaker photo
    April Boyd-Noronha
    Lead, Security Awareness; Sr. Engineer, Information Security & Risk, Cardinal Health

    April, also known as The STEM Broker, is currently the Global Diversity & Inclusion Advisor and Board Member of the XR Safety Initiative (XRSI), the first global non-profit with the mission of helping build safe and inclusive realities. In her role, she continues to advise the CyberXR Coalition, launched by XRSI, where she helped lead the lau...

  • speaker photo
    Christine Gordon
    Director, Global Cyber Governance Center, Cboe Global Markets

    Christine is an Information Security leader with experience in the security, governance, and technology domains. Christine is currently the Director of the Global Cyber Governance Center at Cboe Global Markets, one of the world’s largest exchange holding companies. Christine holds a Master's in Management and Leadership from Webster Universit...

  • speaker photo
    Dr. Margery Sendze
    Technology Leader, I/O Psychologist

    Dr. Sendze is a technology leader with more than 20 years of delivering business value by enabling high-performing teams. Dr. Sendze currently serves as a technology manager and leverages organizational psychology to drive organizational change and talent engagement and retention strategies in the technology workforce. She holds a B.A and an ...

  • speaker photo
    Moderator: Kennetra Pulliams
    Communications Specialist, Big 12 Now / ESPN+

    Kennetra Pulliams has more than 20 years of experience as a broadcast journalist. She graduated from The University of Texas at Austin. Her career has taken her from Texas to Virginia to Kansas City. Kennetra spent more than a decade working at Spectrum Sports, a regional broadcast network. There, she had to opportunity to cover the Kansas Ci...

  • speaker photo
    Dr. Cheryl Cooper, CISSP
    WiCys Kansas City Metroplex, President

    Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solu...

  • speaker photo
    Keith Daly
    Senior Principal Engineer, ForgeRock

    Keith Daly is currently a Senior Principal Sales Engineer for ForgeRock.

    Over the past 20 years, Keith has been on all sides of the Identity Management space in numerous industries, with roles ranging from systems architect within leading corporations, to developer and team lead at systems integrators, to technical sales and engineerin...

  • speaker photo
    David Monnier
    Chief Evangelist, Team Cymru

    David has been with Team Cymru since 2007. Prior, he served in the U.S. Marine Corps as a Non-Commissioned Officer. He then worked at Indiana University where he helped to build some of the most powerful computational systems of their day. He transitioned to cybersecurity and helped launch the Research and Education Networking ISAC. At Team C...

  • speaker photo
    Rick Rutledge
    Sales Engineer, Armis

    Rick Rutledge has been in the Security space for more than 15 years. He has moved from working in the N.O.C. of a fortune 500 company to designing network and security infrastructure of a fortune 20 company to selling security solutions to hundreds of companies across all verticals and sizes. His previous experience with both support and de...

  • speaker photo
    Jared Ablon
    President & Co-Founder, HackEDU

    Jared Ablon is the President and co-founder of HackEDU. His experience includes serving as a CISO, leading cybersecurity teams at the Department of Defense, and founding two companies. Jared has a CISSP, MBA and an MS in Applied and Computational Mathematics focusing on computer/cyber security, and was named CISO of the Year by the Los Angele...

  • speaker photo
    George Sandford
    Sr. Manager, Customer Success Security Team, Gigamon
  • speaker photo
    James Cusson
    Secretariat Security Liason, Massachusetts Executive Office of Health and Human Services
  • speaker photo
    Justin Quinn
    Enterprise Solutions Engineer, Wiz
  • speaker photo
    Mason Brayman
    Acting SAIC of the Boston Field Office, United States Secret Service
  • speaker photo
    Casey McGee
    Assistant to the Special Agent in Charge, New York Field Office, U.S. Secret Service

    Casey McGee is an Assistant to the Special Agent in Charge in the New York Field Office of the U.S. Secret Service. He leads efforts to increase public and private partnership in the investigation of complex transnational criminal investigations involving the use of digital assets. In an executive developmental role, ATSAIC McGee served as th...

  • speaker photo
    Bob Adams
    Security Strategist, Mimecast

    Bob Adams is a Cyber Security Strategist at Mimecast. Originally joining Mimecast nearly 7 years ago as a Sales Engineer, Bob was recruited to Product Management after developing various unique ways of investigating cyber-attacks and highlighting Mimecast’s services. Bob now continues to use his time to help educate companies on protecting th...

  • speaker photo
    Delbert A. Roll
    Retired U.S. Army, former member of the Intelligence Community

    Del is a recently retired, senior leader with 20 years of Federal Government service having served in Washington, D.C. and internationally. Concurrently, he served 23 years as a commissioned Army officer in austere and hostile environments around the globe. Command assignments in both conventional and special operations forces. He is recogniz...

  • speaker photo
    Derek Melber
    Chief Technology & Security Strategist, Tenable

    Derek Melber is an accomplished Chief Technology and Security Strategist, Advisor, and Professional Speaker with more than 25 years of success across the computer & network security industries. As a 17X Microsoft MVP, leveraging extensive experience in unifying products, marketing, sales, and content, he is a valuable advisor for any organiza...

  • speaker photo
    Neal Humphrey
    Area VP - Security Strategist, Deepwatch

    Neal Humphrey has been active in the security industry for nearly 20 years. He has reviewed Security from the Application layer, to the Transport Layer, to Cyber Threat Intelligence, and finally to the Human. Over the last 20 years he has worked with customers from the Global 100 down to the SMB market to identify and solve Cyber Security O...

  • speaker photo
    Jarret Wright
    Director of Cybersecurity, Massachusetts Port Authority

    Prior to his role as Director of Cybersecurity at MassPort, Jarret has served as Deputy Director of Corporate Security for over 2 years where he focused on maintaining a
    safe and secure environment at all Massport facilities while working with departments, law enforcement partners, and stakeholders to strengthen our capabilities to prev...

  • speaker photo
    Dr. Caroline McGroary, PhD, FCA
    Fulbright Scholar, Boston College Cybersecurity Graduate Programs

    Dr. Caroline McGroary is a Chartered Accountant and an Assistant Professor of Accounting at Dublin City University (DCU), Ireland. She has a Ph.D. in Professional Accounting Education and was recently awarded a Fulbright Scholarship by the Fulbright Commission of Ireland. Caroline will spend the coming year at Boston College as a Fulbright Sc...

  • speaker photo
    Simon Taylor
    CEO & Founder, HYCU, Inc.

    Simon Taylor is the CEO of HYCU where he creates and executes on the vision and strategy for one of the world's leading multi-cloud backup and recovery SaaS businesses. Prior to HYCU, Simon held senior executive positions at Comtrade Software including President and CEO as well as Chief Strategy Officer of The Comtrade Group where he evaluate...

  • speaker photo
    Wesley Spencer
    VP, External CSO, ConnectWise
  • speaker photo
    Kwan Lin
    Principal Data Scientist, Rapid7

    Kwan is the Principal Data Scientist on the Rapid7 Labs Research and Advocacy team. He routinely monitors and analyzes large-scale honeypot and Internet-scan data using statistical and machine learning methods. Recently, Kwan helped Rapid7 launch Project Doppler, a platform tool that enables customers to assess their public internet exposure....

  • speaker photo
    Peter Steyaert
    Sr. Sales Engineer Manager, Gigamon
  • speaker photo
    Professor Kevin R. Powers, J.D.
    Founder and Director, Master of Science in Cybersecurity Policy & Governance Program, Boston College

    Kevin is the founder and director of the Master of Science in Cybersecurity Policy and Governance Program at Boston College, and an Assistant Professor of the Practice at Boston College Law School and in Boston College’s Carroll School of Management’s Business Law and Society Department. Along with his teaching at Boston College, Kevin is a C...

  • speaker photo
    Chris A. Quintanilla, CISSP
    Board President/Strategic Development Committee Chair, Philadelphia InfraGard

    Chris has over 25 years’ experience in the IT field and is a Certified Information Systems Security Professional (CISSP). He has served as a senior project manager and engineer for several federal and municipal governments’ IT projects, as a network and systems engineer for IBM's Education and Training Division, and as an adjunct faculty mem...

  • speaker photo
    Jon Fredrickson
    VP, CISO, Surgery Partners, Inc.

    Jon Fredrickson is Vice President & Chief Information Security Officer for Surgery Partners. Prior to Surgery Partners, Jon has held various leadership & CISO positions across healthcare in both the provider and payor markets. Jon has developed a pragmatic approach to implementing cyber security solutions and assisting his organizations in ...

  • speaker photo
    Danny Jenkins
    CEO & Co-Founder, ThreatLocker

    Danny Jenkins is the CEO and Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security. Danny is a leading expert in cybersecurity with over two decades of experience in building and securing corporate networks, including many roles on red teams and blue teams. He is dedicated to educating industry professionals ...

  • speaker photo
    Bill Bowman
    CISO & Data Privacy Officer, Emburse

    Bill Bowman has been the first CISO at five different organizations over the last 20 years. He has been in Educational Technology, Financial Technology, and B2B Growth companies. He was the founding President for the (ISC)2 Eastern Massachusetts organization 10 years ago. Bill lives in Framingham with his wife and five children.

    As CIS...

  • speaker photo
    Katherine Chipdey
    Director, Solutions Engineering and Alliances, Automox

    Katherine Chipdey has spent her career in Cybersecurity, consulting on how to simplify our understanding of the threat landscape and building programs for thousands of customers around EDR, SOAR, and MDR. At Automox, she helped build out the Solutions Engineer Team, where she focused on automating IT operations, reducing risk, and bridging t...

  • speaker photo
    Stephen Frethem
    Senior Director of Sales Enablement, Varonis

    Stephen has worked in the IT Industry since 2000 and in the security industry for the previous eight. Based out of the Twin Cities, Stephen has spent time at some of the largest organizations including Target, US Bank, Honeywell, and United Health Group. In his current role at Varonis, Stephen works with organizations around the US helping or...

  • speaker photo
    Cerena Coughlin
    Special Agent, FBI

    FBI Special Agent Cerena Coughlin is the Employment Recruiter and Applicant Coordinator for the Philadelphia Field Office and local Private Sector Coordinator overseeing InfraGard, a public/private partnership between the FBI and representatives of critical infrastructure. She was a member of the Los Angeles Innocent Images SAFE Team, where s...

  • speaker photo
    Tim Hennessey
    Sr. Director of SOC Services, Novacoast

    10+ years of managed security expertise.

  • speaker photo
    Jamie Zajac
    Vice President, Product, Recorded Future

    Jamie Zajac has over 10 years of experience in security and data protection roles and is currently the Vice President of Product Management for Recorded Future, an advanced security intelligence company. Jamie holds a B.S. in Meteorology and Computer Science from Embry-Riddle Aeronautical University and a MBA from UMass.

  • speaker photo
    Michael Meis
    Associate CISO, The University of Kansas Health System

    Michael is an Army veteran with over 13 years' experience and has a passion for architecting security programs, leading people, and developing world-class security teams. During his career, Michael previously partnered with the USDA CISO to develop one of the largest consolidations of security services in the federal government. Michael also ...

  • speaker photo
    Ashley Bull
    Solutions Engineer, Tessian

    Ashley is a Solutions Engineer at Tessian, providing customers with solutions to address their email security objectives. She is responsible for leading technical product demonstrations and evaluations, and is an expert in email security, endpoint security, insider threats, and behavior analytics and Human Layer Security. Prior to joining Tes...

  • speaker photo
    Chris Griffith
    VP of Product, Balbix

    Chris Griffith leads product management for Balbix. Chris brings over 15 years as a product, business development and strategy leader in security and technology. Prior to Balbix, Chris led tech alliances for Hewlett Packard Enterprise’s (HPE) security portfolio. Chris also ran product management for HPE’s Data Security business and drove stra...

  • speaker photo
    Lisa Britt
    SVP & Chief Human Resources Officer, Thermo Fisher Scientific
  • speaker photo
    Ryan Snyder
    SVP & CIO, Thermo Fisher Scientific
  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t b...

  • speaker photo
    David Barker
    Director of Application Security, GoodLeap LLC

    David Barker is Director of Application Security for GoodLeap LLC, a Fintech company providing a point-of-sale platform for sustainable home solutions. GoodLeap marks David’s fourth creation of a Code-to-Cloud Application Security program. His pedigree includes companies like Dell EMC, Stanley Black & Decker, and PTC. David has both an MBA an...

  • speaker photo
    Richard Berthao
    Director, Cybersecurity Architecture, Draper Labs; Colonel, U.S. Army Reserve; President, New England Chapter, MCPA

    Richard Berthao is the Director of Cybersecurity Architecture for Draper Laboratory. He previously served more than 20 years in the federal government. This service began with over 19 years as an IT Director in the Massachusetts National Guard, Department of Defense (DoD). He continued as a Cybersecurity Advisor for Connecticut & Massachusett...

  • speaker photo
    Christopher Zell
    VP, Cyber Operations and Analysis, Dell Technologies

    Chris is currently Vice President, Cyber Operations and Analysis, for Dell Technologies. In this role, Chris leads the strategy and optimization of Dell's Cyber Security Operations (CSIRT, eFI, Security Assurance and Vulnerability Management) globally. Prior to joining Dell, Chris served at the first CISO for the Wendy's company, where he spe...

  • speaker photo
    Margaret White
    SVP & BISO, Wells Fargo

    Margaret White is currently Senior Vice President, Business Information Security Officer (BISO) for Wells Fargo’s Enterprise Functions. In this role, Margaret leads execution of cybersecurity posture and strategy for enterprise-wide cybersecurity engagements and provides bi-directional transparency to Enterprise Functions CEOs and CIOs. Prior...

  • speaker photo
    Peter Liu
    Technical Account Manager, Qualys

    Peter Liu has been with Qualys in the Pre-Sales TAM role for over four years. He loves helping customers evaluate Qualys to make the decision to adopt Qualys as a security platform that allows you to tackle current security challenges such as vulnerability management or global IT asset management. Prior to Qualys, he spent six years in the di...

  • speaker photo
    Kevin Brennan
    Special Agent, FBI, Seattle Field Office

    FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.

  • speaker photo
    Loris Degioanni
    CTO & Founder, Sysdig

    Loris Degioanni is the Chief Technology Officer (CTO) and founder of Sysdig, the secure DevOps leader. He is also the creator of the popular open source troubleshooting tool, sysdig, and the open source container security tool, Falco. Prior to founding Sysdig, Loris co-created Wireshark, the open source network analyzer, which today has 20+ m...

  • speaker photo
    Evan Tegethoff
    VP of Solutions Consulting, BitSight

    Evan Tegethoff is Vice President of Solutions Consulting at BitSight. He previously held leadership roles in Risk and Compliance Practice Management at Optiv, Accuvant, and Forsythe Technologies. He has developed Third Party Risk approaches for numerous large organizations. Additionally, he led consulting teams focused on compliance, risk man...

  • speaker photo
    Justin Henkel
    Head of CISO Center of Excellence, OneTrust

    Justin Henkel is an information security thought leader, subject matter expert, and Head of OneTrust's Security Center of Excellence. Justin has a proven track record planning, developing, building, and monitoring portfolios of work to secure IT infrastructure to meet federal and state cybersecurity standards, guidelines, and best practices. ...

  • speaker photo
    Chuck Brooks
    Cybersecurity influencer, author, presidential appointee, and Georgetown University cyber faculty

    Named Top Tech Person To Follow by LinkedIn, Named Top 5 Cybersecurity Exec to Watch, Georgetown U Faculty, 2X Presidential Appointee, FORBES Contributor, Cybersecurity, Emerging Tech SME, Influencer

  • speaker photo
    Alexandra Heckler
    CISO / Executive Director, Cybersecurity, Collins Aerospace
  • speaker photo
    Nick Olmsted
    Sr. Systems Engineer, Arctic Wolf

    Nick Olmsted is a senior systems engineer with Arctic Wolf who brings 19 years of experience architecting, implementing, and developing secure technology solutions for enterprises. Nick started his career as a developer learning how to develop secure applications for clients around the globe. He then moved into a systems engineer role to help...

  • speaker photo
    Michael Johns
    Assistant Special Agent in Charge, United States Secret Service

    Michael brings over 24 years of experience with the Secret Service that includes leadership roles both in the protective arena and investigative front. Currently, he leads the Secret Service's Outreach Program, focusing on private and public sector partner growth. He is also the Executive Director for the Secret Service's Cyber Investigative ...

  • speaker photo
    Curtis Barker
    Field CTO; VP, Product and Solution Architecture, Rezilion

    Curtis has spent the past 10 years in technical sales and product management. Prior to Rezilion, Curtis spent 6 years at Symantec to manage their emerging mobile security products and went on to lead the Symantec product portfolio in their Asia Pacific region based in Singapore. Curtis transferred to Symantec HQ in Mountain View, California i...

  • speaker photo
    Michael Gorelik
    CTO, Morphisec

    Michael Gorelik is CTO of Morphisec, where he leads the malware research operation and sets technology strategy. He has extensive experience leading diverse cybersecurity software development projects and experience in the software industry in general. Prior to Morphisec, Michael was the VP R&D at MotionLogic GmbH and before that served in se...

  • speaker photo
    Tom Bowyer
    DevSecOps Engineer, Automox

    Tom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaki...

  • speaker photo
    Greg Maples
    Principal Security Architect, Gigamon

    Greg Maples, CISSP, is Principal Security Architect for Gigamon. He has been involved in computer networking since his involvement in the original ARPANet project that became the Internet. He has been specializing in security protocols and web/DDOS issues for many years, and has more recently been focusing on threat detection in a Zero-Trust ...

  • speaker photo
    Tim Williams
    Director, Information Security & Cyber Risk, ZOLL Medical Corporation
  • speaker photo
    Tung Nguyen
    Director of Cyber Security, Denver Water
  • speaker photo
    Sue Lapierre
    Vice President, Information Security Officer, Prologis
  • speaker photo
    Richard Bakos
    Director, Sales Engineering, LogRhythm
  • speaker photo
    Tim Keeler
    Founder & CEO, Remediant, Inc.

    Tim Keeler worked at Genentech/Roche from 2000 to 2012 and was a leader on the Security Incident Response Team. After this experience, Tim moved deeper into the Enterprise Security realm, leaving Roche in 2012 to focus on security consulting. His clients included UCSF, Genentech/Roche, Gilead Sciences, and CardioDX. Tim is a GX-certified Secu...

  • speaker photo
    Troy Kitch
    VP of Product Management, Solutions, 1Password
  • speaker photo
    Tom Dixon
    Security Engineer, Corelight

    Tom has 15 years of experience in the security industry, beginning his career as an Analyst at what is now the U.K. MOD Joint Cyber Unit. After seven years in the military, he left to join Sourcefire as a Security Engineer. Cisco acquired Sourcefire in 2013, and he joined a small global team working with Cisco's top 28 accounts, ultimately le...

  • speaker photo
    Dan Kaplan
    Solutions Engineer, Okta

    Dan is a Solutions Engineer for Okta and aligns identity-related technical requirements to business outcomes for Okta US West commercial customers and prospects. He is an Okta-certified consultant and developer familiar with Zero Trust methods used by Okta's ecosystem of customers, partners, and prospects.

  • speaker photo
    Jim Johnson
    Director of Systems Engineering, Arctic Wolf

    Jim Johnson has been working to end cybercrime for the past two decades. His career started at Blue Coat, where he helped customers with their struggles to mitigate risk in the early days of web filtering. Since then, he has worked with customers of all sizes and verticals providing solutions from F5, Forescout, and now Arctic Wolf. As the Di...

  • speaker photo
    Bobby Mazzotti
    Sr. Solutions Engineer, Red Canary
  • speaker photo
    Jim Mandelbaum
    Field CTO, Gigamon
  • speaker photo
    Maggie MacAlpine
    Security Strategist, Cybereason

    Maggie MacAlpine is a security strategist at Cybereason and one of the co-founders of the DEF CON Voting Village. Over the course of 10 years spent in the field of cybersecurity, MacAlpine has been a contributing researcher on the "Security Analysis of the Estonian Internet Voting System" in partnership with the University of Michigan, co-aut...

  • speaker photo
    Steven H. Anderson
    Director, Cyber Underwriting, Safety National

    Steve is a cyber liability product leader and underwriter with almost 30 years of experience in both the insurance and technology sectors. In his current role Steve helps drive premium growth through leading operations, product development and underwriting at Safety National. Steve previously served as Chief Underwriting Officer at Measured I...

  • speaker photo
    Sean Scranton
    Consultant, Cyber Risk Solutions Team, WTW

    Cyber Liability National Practice Leader (current). IT Security / IT Auditor at RLI for eight years. Network / security consulting / auditor for financial institutions, government for nine years. Network / firewall administrator in healthcare for seven years. Designations: CPCU, RPLU+, CISSP, CISM, CISA, CRISC, CSXF, MBA.

  • speaker photo
    Akshay Kumar
    Product Manager, Partners, PKWARE

    Akshay Kumar serves as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid de...

  • speaker photo
    Sonya Wickel
    Director, Cybersecurity & Risk Compliance, Triumph Group
  • speaker photo
    Steve Kinman
    Field CISO, Snyk

    Steve Kinman is a dedicated technology leader, with 20+ years of innovative, compliance-driven security strategy knowledge and the ability to deliver scalable, principle-based security and privacy programs focused on business requirements. Most recently, he led a security program transformation at Zalando SE in Berlin, Germany, joining as the...

  • speaker photo
    Keith Chapman
    Cybersecurity Specialist, Infoscitex Corporation

    Keith has been a team lead for a security operations center, where he was a mentor and an incident response and threat intelligence subject matter expert and facilitated tabletop exercises. He currently works in a GRC role. He has the CISSP and Certified Threat Intelligence Analyst certifications. He also serves as a Cyber Teen Education chai...

  • speaker photo
    Jasmine Noel
    Sr. Product Marketing Manager, ReversingLabs

    Jasmine Noel is Senior Product Marketing Manager at ReversingLabs. Her career began as an industry analyst covering IT technologies. She then founded Ptak, Noel & Associates to provide research and marketing services to Fortune500 and startup technology firms. Prior to ReversingLabs, Noel also held product marketing roles in growth companies,...

  • speaker photo
    Mike Davis
    CISO, ExactlyIT Inc.; former CISO, alliantgroup
  • speaker photo
    Travis Dye
    Principal Solutions Architect, Armis

    Travis Dye is a Principal Solutions Architect for Armis focusing on strategic customers with challenging security projects. His passion is to help organizations with large and complex network environments find effective, real-world approaches to improve their network security programs. Prior to his current role he worked with security teams t...

  • speaker photo
    Eve Maler
    CTO, ForgeRock

    Eve Maler is ForgeRock's CTO. She is a globally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and h...

  • speaker photo
    Adam Meyers
    SVP, Counter Adversary Operations, CrowdStrike

    As CrowdStrike’s Senior Vice President of Counter Adversary Operations, Adam Meyers leads the Threat Intelligence line of business for the company. Meyers directs a geographically dispersed team of cyber threat experts tracking criminal, state-sponsored, and nationalist cyber adversary groups across the globe and producing actionable intellig...

  • speaker photo
    Sean McKay
    CISO, Portland State University
  • speaker photo
    Krishna Ksheerabdhi
    VP, Product Marketing, Encryption, Thales Group

    Krishna has more than 25 years of experience leading Engineering and Business Strategy teams, including evaluating and integrating several key Thales acquisitions. Krishna has a Ph.D. in Computer Science and has worked on various topics, from compilers for supercomputers to operating systems for smart cards, leading skunkworks innovation proj...

  • speaker photo
    Matt Downing
    Director, Threat Hunting Operations, ReversingLabs

    Matt is Director of Threat Hunting Operations at ReversingLabs where he helps to operationalize the implementation of ReversingLabs tools and massive dataset to help make networks more secure. Matt is a dedicated blue teamer and threat hunter. Prior to his role at ReversingLabs, Matt held many roles supporting threat research and security ope...

  • speaker photo
    Nathan Faith
    Manager, Cyber Security Nuclear Fleet, Exelon Generation
  • speaker photo
    Michael R. Glennon
    Special Agent and Private Sector Coordinator, FBI
  • speaker photo
    Earl Duby
    VP & CISO, Lear Corporation; Board Member, Michigan InfraGard Members Alliance
  • speaker photo
    Toby Zimmerer
    Sr. Demand and Delivery Director, Data Protection

    Toby Zimmerer is a Senior Demand and Delivery Director in Optiv’s Data Governance, Privacy, and Protection practice, where he assists organizations with building programs and implementing solutions focused on protecting high value information and assets. He has more than 24 years of professional experience developing information security stra...

  • speaker photo
    John M. Wilke
    Sr. Product Marketing Manager, Okta

    John Wilke is a Senior Product Marketing Manager at Okta who is currently focused on aligning the impact of Okta's SaaS solutions with the core business goals of Okta's most strategic customers. He was previously responsible for the expansion of Okta's Business Value team for the West Coast and Asia Pacific regions.

  • speaker photo
    Cory Sutliff
    Technical Director, AttackIQ

    Practice Lead for Technical Account Management at AttackIQ. Cory has 20+ years' experience in IT focusing on security, seven+ years with the DoD. He has spent the last two years at AttackIQ delivering Security Optimization (BAS).

  • speaker photo
    John Prewett
    Principal Engineer - Enterprise Security, UnitedHealth Group

    John Prewett is a security technologist with over 20 years’ experience helping private sector, government agencies, and educational institutions identify risk and improve their security postures. John's latest passion is code writing, software engineering best practice, and otherwise improving the overall relationship between security practit...

  • speaker photo
    Joey Peloquin
    Principal Cloud Architect, Sales Engineering, Gigamon

    Joey Peloquin is an information and cyber security veteran, evolving over the years to specialize in multiple domains, including network, application, mobile, and for the last seven years, cloud security and architecture. Joey has held a variety of leadership roles over his career including security product ownership, head of consulting servi...

  • speaker photo
    Matthew Alec Alvarado
    Solutions Architect, Digital Shadows

    Alec Alvarado has a unique blend of both private and public sector cyber threat intelligence (CTI) experience with 10 years serving in multiple all-source intelligence positions with the United States Army Reserve and 5 years in varying CTI positions with Digital Shadows. A career sparked by a discovered passion for intelligence analysis and ...

  • speaker photo
    Bridget Kravchenko
    CISO, Meritor

    Bridget Kravchenko is the Senior Director, Chief Information Security Officer for Meritor, responsible for information security, IT risk, and compliance globally. She has responsibility for developing a strategic security plan, security metrics, security programs, risk management, and incident response.

    Bridget has served in a CISO or...

  • speaker photo
    Adam Ford
    CISO, Illinois Department of Innovation & Technology (DoIT)
  • speaker photo
    Laura Clark
    CSO, State of Michigan - Department of Technology, Management and Budget

    Chief Security Officer for the Michigan Department of Technology, Management & Budget, Laura Clark brings a unique blend of strengths that include leadership, vision, and strategic and tactical planning, along with the ability to promote collaboration at all levels to support high-level, critical state-wide projects to successful completion.<...

  • speaker photo
    Karl Bernard
    IT Security Architect, University of Texas Health Science Center at Houston (UTHealth)

    Karl Bernard, CISSP, is an IT Security Architect at UTHealth with 30 years of IT experience, with 20 years in Information Security. His experience runs the full gamut of IT Security: he has implemented new technologies, such as network monitoring products and web application firewalls; performed risk assessments; coordinated large DR tests; l...

  • speaker photo
    Shafia Zubair
    Manager, Information Security, Morningstar

    Shafia is a Manager of Information Security at Morningstar, where she is responsible for the Information Security program management and governance. This requires working across security operations, threat intel, application security, compliance, and with the product teams to ensure secure, resilient, and recoverable applications. Prior to Mo...

  • speaker photo
    Tim Mackey
    Principal Security Strategist, Synopsys

    Tim Mackey is a principal security strategist within the Synopsys CyRC (Cybersecurity Research Center). He joined Synopsys as part of the Black Duck Software acquisition where he worked to bring integrated security scanning technology to Red Hat OpenShift and the Kubernetes container orchestration platforms. As a security strategist, Tim appl...

  • speaker photo
    Sam Curry
    VP & CISO, Zscaler

    Sam Curry has over 25 years of IT security industry experience. Curry served as CTO and CSO at Arbor Networks, where he was responsible for the development and implementation of Arbor’s technology, security, and innovation roadmap. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior manageme...

  • speaker photo
    Alex Jones
    Information Security Manager, Cobalt.io

    Alex Jones is an Information Security professional with eight plus years of direct security and compliance experience. He also has an extensive background in media, audio, and communications prior to working in the security field. He is currently the Information Security Manager for the leading Pentest as a Service Company, Cobalt.io. Prior t...

  • speaker photo
    Michael Boucher
    Americas CISO, JLL
  • speaker photo
    Jason Rivera
    Director, Strategic Threat Advisory Group, CrowdStrike

    Jason Rivera has over 15 years of experience innovating at the intersection of security operations and technology. He was a former Intelligence Officer/Captain in the U.S. Army, had assignments with the National Security Agency (NSA) and U.S. Cyber Command (USCYBERCOM), and served in combat tours overseas. He has experience in the private sec...

  • speaker photo
    Jeremy C. Sheridan
    Assistant Director, Office of Investigations, United States Secret Service

    Jeremy Sheridan is the Assistant Director of the Office of Investigations at the United States Secret Service. In this role, he leads more than 160 Secret Service field offices and directs the Secret Service's network of Cyber Fraud Task Forces (CFTFs) in their investigations of sophisticated computer and financial crimes. He also works to en...

  • speaker photo
    Pascal Geenens
    Global Director, Threat Intelligence, Radware

    Pascal Geenens helps execute Radware's thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of IT. As part of the Radware Security Research team, he develops and maintains the IoT honeypots and actively researches IoT malware. Pascal discovered and reported on BrickerBot, perfor...

  • speaker photo
    Michael Schladt
    Principal Cybersecurity Researcher, General Electric Gas Power

    Mike Schladt, CISSP, GREM, is an information security researcher and engineer with over 12 years' experience performing malware analysis, reverse engineering, digital forensics, and incident response. Previous roles include leading malware analysis at the USAF National Air and Space Intelligence Center, as well as heading the development of e...

  • speaker photo
    Deepthi Menon
    Director of Information Security, Ambra Health

    Deepthi Menon serves as Director of Information Security at Ambra Health. Ambra Health is an innovative software company that provides solutions for medical image sharing of DICOM and non-DICOM data between patients, physicians, and hospitals. Deepthi has more than 12 years of experience in information security. She has her Masters in Informa...

  • speaker photo
    Rob Ellis
    Vice President, Reciprocity, Inc
  • speaker photo
    Scott McCormick
    CISO, Reciprocity, Inc
  • speaker photo
    Eric C. Botts
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a cours...

  • speaker photo
    Andrew Jarrett
    Program Manager, Cyber Readiness Center, Texas A&M Engineering Extension Service

    Andrew Jarrett of the TEEX Cyber Readiness Center is a former firefighter, current member of a Type II/Type III Incident Management Team (IMT) and has recently been deployed as a member of Texas Division of Emergency Management (TDEM) Incident Support Teams (ISTs) for COVID response. As the Cyber Enterprise Program Manager at the TEEX CRC, he...

  • speaker photo
    Russell Dowdell
    Director, Sales Engineering, SecureLink

    For nearly a decade, Russell has worked with SecureLink customers and organizations looking to improve third-party security. He has been an integral part of the implementation, support, and solution engineering for customers ranging from large healthcare vendors to small towns. In his current role, Russell and his team help organizations iden...

  • speaker photo
    Eric Monteith
    Director, US Public Sector Engineering, CrowdStrike
  • speaker photo
    Adam Hastings
    Sr. Sales Engineer, iboss
  • speaker photo
    Marcus Gwyn
    Sr. Federal Sales Engineer, SonicWall

    Marcus Gwyn has worked in cybersecurity sales for 10 years and in the Federal space for five of those years. He is the lead Sales Engineer on the SonicWall Federal team and has worked with Federal customers in Civilian, DOD, and Intel spaces. Marcus enjoys following trends in the threat landscape and learning more about cybersecurity. In his ...

  • speaker photo
    Wes Knight
    CISO, Needling Worldwide
  • speaker photo
    Ryan Witt
    Sr. Director, Industry Solutions Group, Proofpoint
  • speaker photo
    Marina Liang
    Sr. Security Engineer, Automox

    Marina is a Security Engineer on the Automox SecOps team where she is passionate about all things security. Previously, she worked as a Threat Researcher, focusing on detections and prevention rules for commodity threats and common living off the land attacks (LOLbins). Before that, Marina served as a Sr. Threat Analyst on a managed SOC, tria...

  • speaker photo
    James McGril
    Security Solutions Architect, Radware

    James is a Security Solutions Architect and one of Radware’s thought leaders in Network and Application Security. He's been with Radware for nearly 10 years. James is a self-described geek and enjoys learning about application security and building web applications using the latest technologies. In his off time, James enjoys hiking, surfing, ...

  • speaker photo
    Kevin Wilson
    Sr. Product Manager, Area 1 Security

    Throughout his 14 years in cybersecurity, Kevin has been an Analyst and Engineer in various organizations, such as the U.S. Navy, First Data, and Lowe’s. Previously, he served as the Global Information Security Officer at Guess? Inc. and a Product Manager for McAfee.

  • speaker photo
    Baseer Balazadeh
    Sr. Technical Marketing Engineer, Gigamon

    Baseer Balazadeh has worked in IT management and implementation for more than 15 years. His experiences range from hands-on work on application architectures to development with DevOps best practices to network security and application migration into the public cloud IaaS. He has a bachelor's degree in computer system networking engineering f...

  • speaker photo
    Nancy Rainosek
    CISO, State of Texas
  • speaker photo
    Ed Lopez
    Solutions Engineer, Bitglass
  • speaker photo
    Moderator: Joel Caminer
    Sr. Director of Cybersecurity Education, NYU Tandon

    Joel Caminer is the Director of Cybersecurity Education at NYU Tandon. Joel has 20+ years of experience in Financial Services, IT, and Consulting, and has led many strategic initiatives across the IT Risk and cybersecurity spectrum. He previously served as the Global Head of Technology Risk Management at TD Securities; VP of Information Risk ...

  • speaker photo
    Liat Krawczyk
    AVP, Emerging Tech, Cyber NYC, New York City Economic Development Corporation

    Liat Krawczyk is Assistant Vice President for Emerging Tech at the NYCEDC where she led the workforce arm of Cyber NYC, NYC's signature program to grow its cybersecurity ecosystem. She is also the founder and head of the women.nyc Childcare Innovation Lab. Prior to joining NYCEDC, Liat grew startups, social-enterprises, and innovation ecosyst...

  • speaker photo
    Jim Routh
    Private Sector Security & Risk Advisor and Board Member; Former Risk Leader, Mass Mutual and Aetna

    Jim Routh serves as a security & risk advisor and Board member for several companies, and is the former CISO for MassMutual, CSO at Aetna, and Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and info...

  • speaker photo
    Geoff Brown
    CISO, City of New York; Head of NYC Cyber Command

    Geoff Brown was appointed Chief Information Security Officer for the City of New York in 2016, a position focused on cybersecurity and aggregate information risk across all 100+ NYC departments and agencies. In July 2017, Mayor de Blasio established New York City Cyber Command, led by Geoff and charged with setting Citywide cybersecurity poli...

  • speaker photo
    Nasir Memon
    Vice Dean for Academics & Student Affairs; Head of Tandon Online, New York University Tandon School of Engineering

    Nasir Memon is Vice Dean for Academics & Student Affairs, Head of Tandon Online, and a Professor of Computer Science at NYU Tandon. He introduced cybersecurity studies to NYU Tandon in 1999. He is co-founder of NYU's Center for Cyber Security (CCS) & the founder of the OSIRIS Lab, CSAW, and NYU Tandon Bridge & Cyber Fellows programs at NYU. H...

  • speaker photo
    Tom Roeh
    Director, Systems Engineering - Public Sector Technical Practice, ExtraHop

    Tom currently leads the ExtraHop Public Sector technical practice as Director of Systems Engineering. He has spent most of his 20-year career looking at networks, protocols, and packets in one way or another. Tom has a passion for utilizing data-driven techniques to solve the complex problems faced by modern IT practitioners. When he's not wo...

  • speaker photo
    Moderator - Tina Thorstenson
    Executive Public Sector Strategist, CrowdStrike

    Tina Thorstenson, Public Sector Strategist, sits on the Public Sector Industry Business Unit at CrowdStrike, where she provides strategic advisory services related to enterprise cybersecurity solutions for Public Sector organizations across Federal, State and Local, Higher Education, and Healthcare. Just prior to joining CrowdStrike, she serv...

  • speaker photo
    Joel Burleson-Davis
    CTO, SecureLink
  • speaker photo
    Jonathan Ehret
    Vice President, Strategy & Risk, RiskRecon, a Mastercard company

    Jonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.

  • speaker photo
    Deborah Watson
    Resident CISO, Proofpoint

    Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah led cybersecurity strategy programs for public and private sector organizations across the Fortune 1000....

  • speaker photo
    Dave Lewis
    Global Advisory CISO, Cisco
  • speaker photo
    Brian Wasko, Moderator
    Principal Security Program Manager, Microsoft
  • speaker photo
    Terrence Davis
    Solutions Architect, Armis
  • speaker photo
    Keval Shah
    Sr. Sales Engineer, Gigamon

    With over 12 years of technical consulting and solution engineering experience in the field of Enterprise Networking & Security, Keval has enjoyed architecting and transforming businesses. Prior to Gigamon, Keval spent a decade at Cisco. He holds a Masters in Science, Electrical Engineering, from University of Southern California and a Master...

  • speaker photo
    Maria Thompson
    Chief Risk Officer, State of North Carolina
  • speaker photo
    Deborah Blyth
    CISO, State of Colorado
  • speaker photo
    Vinod Brahmapuram
    CISO, State of Washington
  • speaker photo
    Sowmya Karmali
    Director, Product Management, CrowdStrike

    Sowmya Karmali is a Director of Product Management at CrowdStrike and is responsible for Falcon Horizon (CSPM) and Falcon Discover for Cloud. She has over 20 years of product development and management experience covering cloud, data, and IoT, and has worked in startups and large organizations. Prior to CrowdStrike, Sowmya held product leader...

  • speaker photo
    Spencer Parker
    Sr. Director, Product Management, CrowdStrike

    With over 20 years of product management experience at Cisco, Websense, and most recently Sophos before joining CrowdStrike in 2017, Spencer has been instrumental in leading the Intel/Falcon X and Mobile solutions. Spencer holds a B.S. in Molecular Biology from the University of Portsmouth.

  • speaker photo
    Naeem Babri
    President, ISSA KC Chapter

    Naeem Babri is a cybersecurity practitioner who works at T-Mobile, focusing on cyber risk assessments, information security, and cyber security controls. Naeem has worked in IT and cybersecurity for the last 20+ years. His expertise in information security, IT operations, and support has led to various roles at T-Mobile, formerly Sprint. His ...

  • speaker photo
    Michael Rasmussen
    Director, ISSA International

    Michael Rasmussen is an internationally recognized pundit on governance, risk management, and compliance (GRC). With 27+ years of experience, he helps organizations improve risk and compliance processes, design and implement GRC architecture, and select technologies that are effective, efficient, and agile. As a sought-after keynote speaker, ...

  • speaker photo
    Justin Fier
    Director for Cyber Intelligence and Analysis, Darktrace
  • speaker photo
    Vito Ferrante
    Presales Engineer, Arctic Wolf
  • speaker photo
    Igor Sorkin
    Sr. Solutions Engineer, Okta

    Igor is a 25-year Kansas City IT professional with background across Telecom, Fin-Tech, and Security Technology companies focusing on Software Development, Enterprise Architecture, Security, and Identity and Access Management. A member of Okta's Enterprise Solutions team since 2019, Igor has been helping companies in the Central region to vis...

  • speaker photo
    Rich Guth
    CMO, CloudPassage

    Rich has built a 25-year career in Silicon Valley bringing new B2B software technologies to market including Big Data, Analytics, Business Intelligence, Java development tools, interactive development environments. and web application servers. He has held sales, product management, product marketing, solutions marketing, partner marketing, GM...

  • speaker photo
    Bob Gilbert
    Chief Evangelist, Netskope
  • speaker photo
    Mike Asaro
    Sr. Named Account Manager, Proofpoint

    Mike Asaro is an Insider Threat Management and DLP Specialist at Proofpoint. Before joining Proofpoint earlier this year, he spent almost 10 years with an industry leading traditional DLP vendor. Throughout his career in cybersecurity, he’s managed and supported many organizations in the Southwest region across multiple verticals. As a San Di...

  • speaker photo
    Damian Chung
    Business Information Security Officer, Netskope
  • speaker photo
    Prakash Nagpal
    VP of Marketing, Appaegis

    Prakash Nagpal is VP of Marketing at Appaegis, where he is responsible for bringing the next generation of Zero Trust Secure Application Access solutions to market. His mission is to help customers realize the vision of securing applications and data without compromising user experience, with a Zero Trust application centric approach to secur...

  • speaker photo
    Joel Hollenbeck
    Regional Director, Security Engineering, Check Point Evangelist, Check Point Software Technologies

    Joel Hollenbeck is a Cyber Security Visionary with the Office of the CTO at Check Point Software Technologies Inc., the worldwide leader in securing the internet. His background includes over 20 years of experience deploying application protection and network-based security. Joel has been securing networks and systems since 1994, including de...

  • speaker photo
    Steve Velazquez, CISSP, CISM
    Sr. Solutions Engineer, Okta

    Steve is a Sr. Solutions Engineer at Okta helping enterprise customers with their identity and access management needs. In his previous life, Steve has served as a CISO / VP of Information Security, Data Center Manager, and held various Security, Windows, and Network Engineering roles.

  • speaker photo
    Donovan Stevens
    Solutions Engineer, SpyCloud

    Donovan is a Solutions Engineer at SpyCloud and has been in the tech industry since the mid nineties. He has worked in various industries and for companies ranging from start-ups to those listed in the Fortune 50. His career has taken him all over the world, including a four-year stint in South-Africa where he worked for the South-African gov...

  • speaker photo
    Brian Linder
    Emerging Threats Cybersecurity Evangelist, Office of the CTO, Check Point Software Technologies

    Brian Linder is an Emerging Threats Expert and Evangelist in Check Point’s Office of the CTO, specializing in the Modern Secured Workforce. Brian has appeared multiple times on CNBC, FOX, ABC, NBC, CBS, and NPR Radio, and hosts Check Point’s CoffeeTalk Podcast and Weaponizers Underground, and has teamed on keynote CyberTalks at Check Point’s ...

  • speaker photo
    Michael McGinnis
    Sr. Sales Engineer, LogRhythm

    A Senior Sales Engineer for LogRhythm, Michael McGinnis has worked in IT Security for over 15 years, specializing in SIEM technology for the past 10. Michael’s experience began as a Security Architect for the largest hospital network in the Midwest where he developed and matured a security posture that is the framework used by many hospital s...

  • speaker photo
    Kristen Cooper
    Director of Product Marketing, Siemplify

    Product marketing specialist with over 15 years of experience at emerging and growing cybersecurity and SaaS companies. Currently heading up product marketing at Siemplify. SecOps solution specialist. Remote work advocate.

  • speaker photo
    Tim Chang
    VP, Global Sales Engineering, Imperva
  • speaker photo
    Brad Tompkins
    Sales Engineer, LogRhythm
  • speaker photo
    Matthew Norwood
    Solutions Engineer, Bitglass, Inc.
  • speaker photo
    Timothy Lee
    CISO, City of Los Angeles, Information Technology Agency
  • speaker photo
    Pedro Vazquez
    Director of Cybersecurity, Waddell & Reed

    As the Director of Cyber Security for Waddell & Reed, Pedro is tasked with leading IR, SECOPS, Vulnerability Management, Security Automation, and IAM. Pedro has previously provided security services for the DoD, IRS, DST, and SS&C.

  • speaker photo
    Jay Bivens
    Sr. Systems Engineer - GA, Gigamon

    Jay Bivens started his technology career working in IT stationed aboard the USS WASP (LHD-1) back in 1993. With a background expertise in email security and Advanced Threat Protection, his career spans several areas including Cloud Access Security Brokers, Web Application Firewalls, and Application Delivery Controllers. Jay has earned GIAC Ce...

  • speaker photo
    Dave Gold
    Field CTO, Americas, SentinelOne

    Dave has more than 15 years experience in enterprise information security and brings a strong track record of innovation and customer focus to SentinelOne. Prior to SentinelOne, he was the VP of Product and VP of Solutions Architecture at ProtectWise and helped launch and build the company from stealth to a successful exit to Verizon. Dave he...

  • speaker photo
    John Weiler
    Chairman of the Board, CMMC Center of Excellence

    John Weiler is currently the CEO and CIO of a congressionally charted IT "do tank" called IT-AAC. He has forged partnerships with two dozen leading non-profits and federal agencies committed to the Digital Transformation of the federal IT sector.

    He has 40 years of IT Management, Solution Engineering, and Architecture experiences, cove...

  • speaker photo
    Vladimir Svidesskis
    Director, Head of Security, Compliance and Risk, Vaco
  • speaker photo
    Ray Griffin
    Director and Head of Information Security, Cox Media Group
  • speaker photo
    Michelle Stewart
    CISO, Safe-Guard Products
  • speaker photo
    Ryan Aleman
    Director, Solution Architect , Armis

    Ryan Aleman is a Director of Solutions Architect at Armis. In this role, Ryan is at the forefront of the developing landscape of unagentable devices. With an extensive background in security and technical environment management, Ryan has worked extensively to find passive, agentless security solutions in the medical, industrial, and IoT space...

  • speaker photo
    Kevin Santarina
    Sr. Presales Systems Engineer, Arctic Wolf Networks
  • speaker photo
    Tony Lee
    VP, Global Services Technical Operations, BlackBerry
  • speaker photo
    Jason LeDuc
    Director, Risk Management Services, AccessIT Group
  • speaker photo
    Paul Kitor
    Application Security Solution Architect, Contrast Security
  • speaker photo
    John Swensson
    Enterprise Customer Success Manager, CloudPassage

    John Swensson is the Customer Success Manager at CloudPassage and is responsible for all customer support initiatives. John’s information security career spans two decades and includes a broad number of business environments. John and the CloudPassage teams have worked together creating groundbreaking security solutions across a range of indu...

  • speaker photo
    Harrison Parker
    Solutions Architect, Siemplify

    Harrison holds a Bachelor's in Computer Science from Harvard University.

  • speaker photo
    Chris Pin
    VP, Security and Privacy, PKWARE

    Chris Pin serves as PKWARE’s VP, Security and Privacy. In this role, Chris drives value and awareness for all PKWARE customers regarding the various challenges that both privacy and security regulations bring to the data-driven world. He works closely with all customers and potential customers to help them better understand how PKWARE solutio...

  • speaker photo
    Jose Barajas
    Technical Director of NA, Sales Engineering, AttackIQ

    Jose Barajas is Technical Director, NA Sales Engineering AttackIQ. He has over a decade of experience as a security researcher reverse-engineering malware and developing security controls and analytics. At AttackIQ, he now focuses on improving security control efficacy through attacker behavior emulation and establishing continuous security v...

  • speaker photo
    Christopher A. Hart
    Former Chairman, National Transportation Safety Board; Founder, Hart Solutions LLP

    Christopher A. Hart is the founder of Hart Solutions LLP, which specializes in improving safety in a variety of contexts, including the safety of automation in motor vehicles, workplace safety, and process safety in potentially hazardous industries.

    Mr. Hart is also Chairman of the Washington Metrorail Safety Commission, a three-jurisd...

  • speaker photo
    Bruno Almeida
    Cloud Overlay Sales Engineer, Gigamon

    Bruno Almeida is a Sales Engineer at Gigamon, where he partners with customers to help them ensure continuous security and monitoring of cloud and data center services during their digital transformation journeys. He has over a decade of experience in the IT infrastructure space. Before joining Gigamon, Bruno worked for several firms in the m...

  • speaker photo
    Jay Venkatraj
    Sr. Solutions Engineer, Okta
  • speaker photo
    Crane Hassold
    Director of Threat Intelligence, Abnormal Security

    Crane Hassold is the Director of Threat Intelligence at Abnormal Security, where he leads a team responsible for researching enterprise-focused cyber threats. Prior to joining the private sector in 2015, Crane served as an Analyst at the Federal Bureau of Investigation for more than 11 years, providing strategic and tactical analytical suppor...

  • speaker photo
    Larry Chinski
    Vice President, Global IAM Strategy and Customer Advocacy, One Identity

    Larry Chinski has over 20 years in the Identity and Access Management industry and travels globally to help complex organizations understand emerging trends, the current threat landscape, and how to leverage technology platforms to resolve issues related to cybersecurity as well as operational efficiency.

  • speaker photo
    Todd Bearman
    VP, CISO, TE Connectivity

    Todd Bearman is the Chief Information Security Officer for TE Connectivity with responsibility for Information Security globally across nearly 150 countries with 75,000 employees.

    Todd is responsible for ensuring collaboration and risk management across the corporate functions and business units where he leverages his leadership, techn...

  • speaker photo
    Nick Falcone
    CISO, University of Pennsylvania
  • speaker photo
    Mariana Pereira
    Director, Email Security Products, Darktrace

    Mariana is the Director of Email Security Products at Darktrace, with a primary focus on the capabilities of AI cyber defenses against email-borne attacks. Mariana works closely with the development, analyst, and marketing teams to advise technical and non-technical audiences on how best to augment cyber resilience within the email domain, an...

  • speaker photo
    Chris Christensen
    Sr. Business Consultant, Cybersecurity, Honeywell Building Solutions

    Chris Christensen is the Cybersecurity Business Consultant for Honeywell Building Solutions (Americas) and specializes in securing Operational Technology (OT) and Industrial Control Systems (ICS) Chris passionately believes that cybersecurity is everyone's shared responsibility and through awareness, education, accountability and positive rei...

  • speaker photo
    Alex Kirk
    Global Principal Engineer, Corelight

    Alex Kirk is an open source security veteran, with a combined 17 years at Sourcefire, Cisco, Tenable, and now Corelight, where he serves as Global Principal for Suricata. Formerly a malware zookeeper and IDS signature writer, today he spends his time helping SOC analysts and advising on security policy for government agencies, universities, a...

  • speaker photo
    Prashanth Ram
    Solutions Architect, Okta
  • speaker photo
    Stephen Gates
    Principal Security SME, Horizon3.ai

    Stephen Gates brings more than 15 years of information security experience to his role as Principal Security SME at Horizon3.ai. He is a subject matter expert with an extensive hands-on background in security and is a well-known writer, blogger, presenter, and published author who is dedicated to conveying facts, figures, and information that...

  • speaker photo
    Tommy Todd
    Vice President of Security, Code42

    Tommy Todd is Vice President of Security at Code42 with over 20 years of cybersecurity experience, primarily focused on data privacy and data protection strategies. Prior to Code42, Tommy served in security roles at Symantec, Ionic Security, and Optiv, as well as many other firms. Throughout his career, he has acted as a leader, mentor, engin...

  • speaker photo
    C. Michael Tracy
    Director, Sales Engineering, SpyCloud

    An experienced security architect, specializing in Identity Governance, Access Management, and Multi-Factor Authentication, C. Michael Tracy has over 20 years of diverse technology experience with roles at Microsoft, Wells Fargo Bank, HID Global, and DigitalPersona. At SpyCloud, C. Michael helps clients safeguard the identities of their emplo...

  • speaker photo
    Scott Shackelford
    Cybersecurity Program Chair, Indiana University

    Professor Scott J. Shackelford serves on the faculty of Indiana University where he is Cybersecurity Program Chair along with being the Executive Director of the Ostrom Workshop. He is also an Affiliated Scholar at both the Harvard Kennedy School’s Belfer Center for Science and International Affairs and Stanford’s Center for Internet and Soci...

  • speaker photo
    Tina Meeker
    Sr. Director, Information Security, Sleep Number

    Tina is currently the Sr. Director of Information Security at Sleep Number Corporation and has held executive cybersecurity leadership positions at Best Buy, Shutterfly, and Target Corporation. Tina holds a B.A. in Organizational Behavior from St. Scholastica and an MBA from Augsburg University. Tina also maintains active CISSP and CIPP/US ce...

  • speaker photo
    Theodore Peterson
    Director, Information Security, Datasite

    Theodore Peterson, CISSP, has over 30 years of IT and Information Security experience. He has a BA from the University of Minnesota and an MBA from Augsburg College. He currently is the Director Information Security for Datasite.

  • speaker photo
    Joseph Carson
    Chief Security Scientist & Advisory CISO, Delinea

    Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical i...

  • speaker photo
    Dave Armlin
    VP, Solution Architecture, ChaosSearch
  • speaker photo
    Piyali Das
    Sr. Director, Information Security Risk Management, The College Board

    Piyali Das has a proven 16-year track record of leading Information Security and Information Technology enterprise-wide initiatives. This includes success in risk-based prioritization of security initiatives and the resolution of complex issues cost effectively. She has also directed complex cross-functional projects across the enterprise res...

  • speaker photo
    Augusto Barros
    VP of Solutions, Securonix
  • speaker photo
    David Swift
    Sr. Cybersecurity Solutions Architect, Securonix
  • speaker photo
    Todd Maillet
    Sr. Presales Systems Engineer, Arctic Wolf Networks
  • speaker photo
    Brian Coulson
    Principal Threat Research Engineer, LogRhythm

    As Principal Threat Research Engineer in LogRhythm Labs, Brian works to keep abreast of current cyberthreats and news, develop threat detection and response content, and demonstrate how we detect and respond to threats. In this role, he regularly engages with the LogRhythm Community and offers advice and solutions to remediate common security...

  • speaker photo
    Lynne Fistori
    Field & Channel Marketing Manager, Palo Alto Networks
  • speaker photo
    Sajed Naseem
    CISO, New Jersey Courts

    Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters...

  • speaker photo
    Chandler Howell
    Director of Engineering Services, Nexum, Inc.
  • speaker photo
    Erich Kron
    Security Awareness Advocate, KnowBe4

    Erich Kron is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical i...

  • speaker photo
    Mike Stacy
    Sr. Director, Enterprise Security Strategy, Proofpoint

    Mike works with customers and oversees technical strategy for areas which include cloud security, advanced email defense, SOAR, browsing security, and SDP. Prior to joining Proofpoint, Mike held numerous technical leadership and product strategy roles across a variety of solutions.

  • speaker photo
    Chris Poulin
    Director, Technology & Strategy / Deputy CTO, BitSight

    Chris is Director of Technology & Strategy, as well as the Deputy CTO, at BitSight Technologies, guiding enterprises in assessing risk metrics and managing third-party relationships. He's been in cybersecurity for over 35 years, in both technical roles as a developer for the DoD intelligence community, and in executive positions, such as CSO ...

  • speaker photo
    Terry Ray
    SVP, Strategy and Imperva Fellow, Imperva

    Terry Ray is the SVP and Imperva Fellow for Imperva Inc. As a technology fellow, Terry supports all of Imperva’s business functions with his years of industry experience and expertise. Previously he served as Chief Technology Officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well ...

  • speaker photo
    Sudeep Venkatesh
    Chief Product Officer, Egress Software Technologies Ltd

    Sudeep Venkatesh is a noted expert on data protection, bringing two decades of industry and technology experience in this area. His expertise spans the protection of data in both structured and unstructured data ecosystems, with an emphasis on solving real-world business problems through encryption, authentication and key management. He has a...

  • speaker photo
    Allyn Crowe
    Sr. Security Engineer, Nexum, Inc
  • speaker photo
    Jayson Salazar
    Sr. Security Automation Engineer, GitLab Inc.

    Former software engineer and penetration tester, nowadays Sr. Security Automation Engineer at GitLab.

  • speaker photo
    George J. Smith
    Sr. Security Consultant, Gigamon

    George has 35 years of industry experience planning, designing, installing, and analyzing LAN, WAN infrastructures, peripherals, and tools for wired and wireless infrastructures. An enthusiast for technology and customers alike, he keeps his skills sharp by looking around corners to see what technology and business challenges are coming down ...

  • speaker photo
    Meera Rao
    Sr. Director, Product Management, Synopsys

    Ms. Meera Rao is a Senior Director of Product Management, focusing on DevOps solutions at Synopsys, Inc. Ms. Meera has over 20 years of experience in software development organizations in a variety of roles including Architect, Lead Developer, and Project Manager, and Security Architect. Ms. Meera has been working as a trusted adviser to Fort...

  • speaker photo
    Brendan Miles
    Sr. Sales Engineer - New England & Upstate NY, SentinelOne
  • speaker photo
    Brad Thompson
    Regional Sales Manager, SentinelOne
  • speaker photo
    Morgan Wright
    Chief Security Advisor, SentinelOne

    Morgan is an internationally recognized expert on cybersecurity strategy, cyberterrorism, national security and intelligence. He currently serves as Chief Security Advisor for SentinelOne, Senior Fellow at The Center for Digital Government, and is the chief technology analyst for Fox News and Fox Business. Morgan's landmark testimony before C...

  • speaker photo
    Gary Buonacorsi
    SLED CTO & Chief IT Architect, Tanium
  • speaker photo
    Belinda Enoma, CIPP/US
    Privacy and Cybersecurity Specialist, Author, Speaker, and Strategist

    Belinda Enoma is a privacy and cybersecurity consultant with a legal and technology background. She offers virtual privacy and cybersecurity services including risk mitigation solutions and building privacy programs from scratch. She is a writer, corporate trainer, lifestyle strategist, mentor, and coach to women in the cybersecurity and data...

  • speaker photo
    Roger Grimes
    Data-Driven Defense Evangelist, KnowBe4

    Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bach...

  • speaker photo
    Nimmy Reichenberg
    CMO, Siemplify

    Nimmy Reichenberg oversees strategy and marketing for Siemplify, the leading independent provider of Security Orchestration, Automation, and Response (SOAR). A cybersecurity industry veteran, Nimmy has more than 15 years of experience helping enterprises around the world tackle their security challenges. Nimmy started his careers as a securit...

  • speaker photo
    Riley Bruce
    Security Community Evangelist, Manager, Code42

    Riley is a Security Community Evangelist at Code42, where he enjoys educating Security and IT teams through engaging technical content and presentation. Previously, Riley served in both customer support and customer education roles at Code42. In his spare time, he enjoys photography, travel, and relaxing at the lake in northern Wisconsin with...

  • speaker photo
    Justin Wynn
    Sr. Security Consultant, Coalfire

    As a Senior Security Consultant, Justin Wynn is responsible for actively compromising and reporting on virtual environments typically encountered at Fortune 500 companies. Justin performs wireless, physical, red team and social engineering engagements. Justin also conducts research to include the production of open-source models for printing/...

  • speaker photo
    Gary DeMercurio
    Directing, Center of Excellence for Red Team, Social Engineering, and Physical Penetration Testing, Coalfire

    Gary DeMercurio runs one of the largest groups in Coalfire Labs as a Director, where he leads Coalfire’s “Center of Excellence” for Red Teaming, Social Engineering and Physical Penetration. At Coalfire, Gary manages day-to-day business involved with FedRAMP, PCI, HIPPA, and penetration testing, while helping to spearhead the physical and soci...

  • speaker photo
    Matt Smith
    Director of Solutions Engineering, BeyondTrust
  • speaker photo
    Amber Vanderburg
    Founder, The Pathwayz Group

    Amber Vanderburg is a multi award winning international businessperson, keynote speaker, and founder of The Pathwayz Group. In 2016, she left her job in corporate HR to become the only female, only American, and only blonde Academy elite football coach for the Adidas Gameday Academy/Paris Saint Germain Academy in Bangalore, India. She worked ...

  • speaker photo
    Brian Vecci
    Field CTO, Varonis

    As Field CTO at Varonis, Brian supports a wide range of security and technology initiatives by helping Varonis’ customers and partner get the most out of the company’s products. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecuri...

  • speaker photo
    Dave Presuhn
    Sr. Security Engineer, Boston Scientific

    Dave has been working in IT since the last millennium. In his current role, he manages the device management system for medical devices. He has worked primarily in healthcare throughout his IT career.

  • speaker photo
    Anthony Baer
    Solution Architect, Sonatype
  • speaker photo
    Sam Gillespie
    Offering Manager, OneTrust DataGovernance, OneTrust
  • speaker photo
    Keith Buswell
    Sr. Sales Engineer, Exabeam
  • speaker photo
    Brian Anderson
    Director of Technology, Office of the CTO, Imperva

    Brian Anderson has over 16 years' experience in technology, working with networks, systems, application development, and security specializing in automation. Brian has worked to architect, attack, integrate, and secure networks and applications for emergency notification systems, government environments, healthcare organizations, transactiona...

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serve...

  • speaker photo
    Mark Sangster
    Vice President and Industry Security Strategist, eSentire

    Mark Sangster is the author of "NO SAFE HARBOR: The Inside Truth About Cybercrime and How to Protect Your Business." He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference, and author on various subjects related to cybersecurity. His thought provoking work and per...

  • speaker photo
    Jason Georgi
    Global Field CTO, Prisma Access, Palo Alto Networks

    Jason is an accomplished technology executive with over 25 years of experience driving innovation and transformation initiatives across global organizations. Jason collaborates with CIOs, CTOs, and other technology leaders on strategies aimed at enabling business outcomes.

    Jason is currently the Global Field Chief Technology Officer fo...

  • speaker photo
    Eric Bodkin
    Director, Endpoint Recovery Services, CrowdStrike

    Eric Bodkin leads the delivery of Endpoint Recovery Services for CrowdStrike. Based out of the greater Denver area, Eric leads service engagements focused on the rapid recovery and remediation of endpoints in response to a cyber incident. Eric has more than 15 years of experience in incident response, forensic investigation, cybersecurity ope...

  • speaker photo
    Jonathan Echavarria
    Enterprise Architect, ReliaQuest

    Jonathan Echavarria is an Enterprise Architect at ReliaQuest that has spent his career building and breaking a variety of environments. In his current role, Echavarria leverages this experience to orchestrate business strategy alignment with technological enablement. During his time at ReliaQuest, Jonathan has held various positions with resp...

  • speaker photo
    Chris Pittman
    Senior Manager, Sales Engineering, BlackBerry

    Chris Pittman has worked in enterprise information technology since 1993 and has specialized in cyber security for the last 14 years. He worked in security and controls and incident response for the Ford Motor Company before moving to the security vendor space in 2008. As a sales engineer at BlackBerry Cylance, he provides technical and secur...

  • speaker photo
    Rori Perkins
    Senior Manager, InfoSec Awareness and Analytics, Columbia Sportswear

    Rori is an expert in organizational change management with a focus on security awareness and driving human behavior.

  • speaker photo
    Lonnie Benavides
    Head of Infrastructure and Application Security, OneLogin

    Lonnie Benavides is an accomplished cybersecurity leader with more than 20 years' industry experience, and is currently the Head of Infrastructure and Application Security at OneLogin. Lonnie began his career as a communications encryption specialist in the U.S. Air Force, and went on to conclude his military service as a Technical Lead of th...

  • speaker photo
    Alex Sorokunov
    Sr. Presales System Engineer, Arctic Wolf Networks
  • speaker photo
    Brennan O'Brien
    Director, Information Security, Risk & Compliance, Columbia Sportswear

    Brennan is the head of Information Security for Columbia Sportswear Company and a 20-year veteran of cybersecurity in verticals including apparel, logistics, healthcare, and financial services.

  • speaker photo
    Paul Rich
    Executive Director, Data Management & Protection, JPMorgan Chase

    Paul Rich joined JPMorgan Chase & Co. in 2019 as Executive Director, Data Management & Protection, with the mission of tackling the management of all unstructured data within the company. Paul is passionate about data security, privacy, principle-based design and goal-setting, and has over thirty years of technology experience. During the mor...

  • speaker photo
    Mike DeNapoli
    Sr. Solution Architect, Cymulate

    Mike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations;advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation;helping customers and partners k...

  • speaker photo
    Nigel Thompson
    Vice President, Solutions Marketing, BlackBerry

    Nigel Thompson is responsible for the product position and messaging of BlackBerry® Spark. He is a regular thought leadership speaker, experienced on topics impacting governments and businesses worldwide, including cybersecurity trends, workflow reformation and harnessing IoT to accelerate digital transformation.

    As BlackBerry has tr...

  • speaker photo
    Jeremiah Sahlberg
    Managing Director - Federal, Third Party Risk, Tevora

    Jeremiah Sahlberg has more than 20 years of security experience. Sahlberg is an executive security consultant and advises clients on establishing security programs and compliance management. He holds CISSP, CISM, PCI QSA and HITRUST certifications.

    Previously, Sahlberg held the Senior Director of Protect Operations at NBCUniversal a...

  • speaker photo
    David Hawkins
    Director, Consulting Engineer, BitSight

    David Hawkins has been in the security industry for just over 20 years. His background includes both IT security as well as physical security. David has served as the Technical Vice Chair of the Open Security Exchange, co-authoring the PHISBITs security protocol which was intended to help integrate physical and IT security.

    On the Info...

  • speaker photo
    Bryan Magoffin
    Sr. Security Architect, Check Point Software Technologies
  • speaker photo
    Sherry Callahan
    CISO, Dairy Farmers of America

    Sherry's management career over the last 20 years has spanned multiple IT service areas including information security, infrastructure support, customer support, and disaster recovery\continuity. Perhaps her proudest accomplishments are the programs and teams that she has built from the ground up and the large-scale projects that she has mana...

  • speaker photo
    Brian Robison
    Chief Evangelist & Sr. Director, Product Marketing, BlackBerry

    Brian Robison is the Senior Director, Product Marketing and Chief Evangelist at BlackBerry (formerly Cylance), where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after an attack. With over 20 years' of cybersecurity experience, Robison is a regular sp...

  • speaker photo
    Zuri Cortez
    Principal Solutions Engineer at Alert Logic, Alert Logic
  • speaker photo
    Israel Barak
    CISO, Cybereason

    Israel Barak, Chief Information Security Officer at Cybereason, is a cyber defense and warfare expert with a background developing cyber warfare infrastructure and proprietary technologies, including that of proprietary cryptographic solutions, research and analysis of security vulnerabilities. Israel has spent years training new personnel, p...

  • speaker photo
    Kevin Bocek
    VP, Security Strategy & Threat Intelligence, Venafi

    Kevin Bocek is a leading subject matter expert in machine identity protection. With more than 16 years in the IT security industry, Kevin has been featured in The Wall Street Journal, The New York Times and The Washington Post, among many others. Before joining Venafi in 2012, Kevin spent almost two decades working for several leading IT secu...

  • speaker photo
    Tom Watson
    Regional Sales Manager, Mailprotector
  • speaker photo
    Renee Tarun
    Deputy CISO, Fortinet
  • speaker photo
    Peter Klimek
    Director of Technology - Office of the CTO, Imperva
  • speaker photo
    Katrina Watts
    Cyber Security Threat Analyst, Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC)

    Katrina Watts works as a Threat Analyst with the ONG-ISAC and focuses on curating and sharing qualitative intelligence related to cyber threats to the oil and natural gas supply chain. Prior to joining the ONG-ISAC, Katrina worked as an Incident Response Analyst for a mid-size corporation and separately as a contractor. Additionally, Katrina ...

  • speaker photo
    Travis Herrmann
    Information Security Advisor, Devon Energy Corporation

    Travis has been with Devon Energy for 20 years, being a pioneering member of the Information Security team. Currently, Travis supports the Incident Response, Hunt, and Intelligence functions at Devon, serves on the ONG-ISAC Information Sharing committee, and holds multiple industry security certifications.

  • speaker photo
    Dr. Shaneé Dawkins
    Computer Scientist, Visualization and Usability Group, National Institute of Standards and Technology (NIST)

    Dr. Shaneé Dawkins is a Computer Scientist in the Visualization and Usability Group at the National Institute of Standards and Technology (NIST). She performs research focusing on human centered design and leads the NIST Phish Scale research effort. Shaneé received her M.S. and Ph.D. in Computer Science at Auburn University, and B.S. in Compu...

  • speaker photo
    Ansh Patnaik
    Chief Product Officer, CyCognito

    Ansh Patnaik, Chief Product Officer, has over 20 years of cross functional experience in cybersecurity and data analytics. Most recently, Ansh was Director, Cloud Security Products for Google Cloud Platform, and Chief Product Officer for Chronicle, prior to the acquisition of Chronicle by Google. Previously, he was VP of Product Management at...

  • speaker photo
    Svetla Yankova
    Head of Customer Experience Engineering, Chronicle
  • speaker photo
    Adam Gates
    Channel Sales Engineer, Cybereason

    With over 25 years of experience in technology, Adam Gates serves as a technical member of Cybereason Sales Engineering Team providing support for customers and partners in North America. Prior to Cybereason, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, Malwarebytes, and Mimecas...

  • speaker photo
    Mitch Spaulding
    Solutions Engineer, Okta
  • speaker photo
    Lisa Wallace
    Sales Engineer, FireMon
  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy l...

  • speaker photo
    Stuart Wagner
    Sr. Director, IT Security & Compliance at Enterprise Products, Chairman, ONG-ISAC

    Stuart served as a Board Member of ONG-ISAC for over five years and became Chairman in June 2018. He has attended the FBI CISO Academy, has served as President of the award-winning South Texas Chapter of the Information Systems Security Association (ISSA), and is a member of ISACA and InfraGard. Stuart has developed and led information securi...

  • speaker photo
    Angela Haun
    Executive Director, ONG-ISAC

    Angela Haun became the Executive Director of the Oil and Natural Gas Information Sharing and Analysis Center (ONG-ISAC) in September 2018. Ms. Haun joined the ISAC after a 20-year career as a Special Agent with the FBI. She brought extensive experience in cybersecurity and protecting critical assets from her work at the FBI, along with her le...

  • speaker photo
    Brad Beutlich
    Vice President, Western and LATAM Sales, Entrust

    Brad Beutlich is an information security professional who has worked with numerous U.S. based companies over the past 20 years, providing security solutions ranging from end-point to data security. The last 13 years, he has worked for Entrust providing security solutions that protect customer data, financial transactions, and IoT device manuf...

  • speaker photo
    Matt Hubbard
    Sr. Technical Product Manager, Armis
  • speaker photo
    Karen Lancon
    Business Information Security Manager, Wood.
  • speaker photo
    Sivan Tehila
    Director of Solution Architecture, Perimeter 81

    Sivan Tehila is the Director of Solution Architecture at Perimeter 81, a leading Secure Access Service Edge (SASE) provider, and a cybersecurity expert with over 14 years of industry experience. Sivan served in the IDF as an Intelligence Officer and then in various field positions, including Information Security Officer, CISO of the Research ...

  • speaker photo
    Chase Massar
    Professional Sales Engineer, Alert Logic
  • speaker photo
    Ryan Archer
    Sr. Sales Engineer, Arctic Wolf Networks
  • speaker photo
    Christopher Hass
    Director of Information Security and Research, Automox

    Chris Hass is an extremely driven and proven information security professional with extensive experience in Malware Reverse Engineering, Threat Intelligence, and Offensive Security Operations. In his current role, Chris serves as Director of Information Security and Research at Automox. In addition to being a former cybersecurity analyst for ...

  • speaker photo
    Julia Voo
    Cyber Fellow, Harvard Kennedy School, Belfer Center for Science and International Affairs

    Julia Voo is a Cyber Fellow and leads the team behind Belfer's National Cyber Power Index. She was formerly the Research Director for the China Cyber Policy Initiative.

    Her areas of research concern geotech strategy including the Digital Silk Road, industrial policy, and technical standards for strategic technologies.

    Voo has re...

  • speaker photo
    Tony Anscombe
    Chief Security Evangelist, ESET

    Tony Anscombe is Global Security Evangelist and Industry Partnerships Ambassador for EST, where he serves to increase ESET’s public awareness initiatives and strengthen relationships with new and existing partners.

    Anscombe joined ESET from Avast (which acquired his former employer AVG) where he held the title of Senior Security Evange...

  • speaker photo
    Tom Utley
    Sr. Presales Systems Engineer, Arctic Wolf

    Tom Utley is a senior presales systems engineer with Arctic Wolf Networks based out of the Charlotte area. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer and solution archite...

  • speaker photo
    Allan Liska
    Sr. Security Architect, Recorded Future

    Allan Liska is a senior security architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security pos...

  • speaker photo
    Michael Doyle
    Principal Consultant, Secure Development Practice Lead, Synopsys
  • speaker photo
    Dwayne Dreakford
    Solutions Architect, Sonatype
  • speaker photo
    Richard Melick
    Sr. Technical Product Marketing Manager, Automox

    Richard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.

  • speaker photo
    Etay Maor
    Chief Security Officer, IntSights

    Etay Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in...

  • speaker photo
    Gina Scinta
    Sr. Solutions Architect, Thales

    Gina Scinta is a Senior Solutions Architect with the Thales, DIS, Cloud Protection and Licensing business line. She has over 30 years of experience in the IT profession, encompassing pre/post sales engineering support for Commercial and Federal territories. For the past 10 years, she has focused on providing solutions for protecting data usin...

  • speaker photo
    Rick Holland
    CISO and VP of Strategy, Digital Shadows

    Rick has more than 15 years' experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently co-chair ...

  • speaker photo
    Chris Goettl
    Sr. Director, Product Management, Ivanti

    Chris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events...

  • speaker photo
    Lee Psinakis
    Cloud Security Sales Specialist, Check Point Software Technologies

    Lee is a Cloud Security Specialist engaging with Check Point customers in the southeast to enable and accelerate their digital transformation and cloud initiatives, by designing secure, compliant solutions to protect their corporate assets and data in the public cloud.

    Before joining Check Point, Lee held Sales, Management and Business...

  • speaker photo
    Eric Skinner
    VP, Strategy, Trend Micro

    Eric Skinner is VP of Market Strategy at Trend Micro, helping shape Trend’s solution offerings, growth plans and go-to-market approach. Previously at Trend Micro, Eric has been responsible for global product marketing. Prior to Trend Micro, Eric held senior management positions in a health care mobile startup and at digital identity solutions...

  • speaker photo
    Tim O'Connor
    Manager of Knowledge Services, Cadre Information Security

    Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including PCI-QSA, CISA, CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written...

  • speaker photo
    James Ellis
    Detective First Lieutenant, Commander, Michigan Cyber Command Center (MC3), Michigan State Police

    Detective First Lieutenant Jim Ellis is the commander of the Michigan State Police Cyber Section within the Intelligence Operations Division. He leads a cyber team of 56 MSP members located at 7 offices throughout Michigan. He has oversight over the Michigan Cyber Command Center (MC3), Computer Crimes Unit (CCU), and the Michigan region of th...

  • speaker photo
    Edward Roberts
    Director of Product Marketing, Imperva

    Edward Roberts leads Product Marketing for Imperva Advanced Bot Protection. Prior to Imperva he led marketing at Distil Networks and has over twenty years of experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Softw...

  • speaker photo
    Ran Rosin
    Director, Product Management, Imperva

    Ran Rosin Joined Imperva two years ago and is currently leading the Cloud Data Security solution. Prior to joining Imperva, Ran founded and lead two start-ups in the area of mobile Application and IoT.

  • speaker photo
    Phillip Wylie
    Lead Curriculum Developer, Point3 Federal

    Phillip Wylie is the Lead Curriculum Developer for Point3 Federal, Adjunct Instructor at Dallas College, and The Pwn School Project founder. With over 22 years of experience, he has spent the last eight plus years as a pentester. His passion for mentoring and education inspired him to start teaching and to found The Pwn School Project, a bi-m...

  • speaker photo
    Tod Beardsley
    Director of Research, Rapid7

    Tod Beardsley is the director of research at Rapid7. He has over 20 years of hands-on security experience, stretching from in-band telephony switching to modern IoT implementations. He has held IT Ops and IT Security positions in large organizations such as 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Today, ...

  • speaker photo
    Glenn Kapetansky
    Chief Security Officer & Technology Lead, Trexin Group

    Glenn Kapetansky has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational suppo...

  • speaker photo
    Thomas Blade
    Presales System Engineer, Arctic Wolf
  • speaker photo
    Ryan Gritt
    Solutions Architect, ReliaQuest
  • speaker photo
    Myla Pilao
    Director, Technology Marketing, Trend Micro
  • speaker photo
    Moderator: Susan St. Clair
    Director, WhiteSource
  • speaker photo
    Eric Wolff
    Sr. Product Marketing Manager, Cloud and App-layer Data Protection, Thales Cloud Security

    Eric Wolff is a Senior Product Marketing Manager for Thales application-layer data protection and solutions for public cloud security. He has over 20 years’ experience in threat intelligence management, network security, application acceleration, enterprise-class storage area networking, storage virtualization, data-management applications, a...

  • speaker photo
    Jonathan Nguyen-Duy
    VP, Global Field CISO Team, Fortinet
  • speaker photo
    Kevin Dillaway
    Cloud Security Architect, Optiv
  • speaker photo
    Sami Laine
    Principal Security Architect, Okta
  • speaker photo
    Kelsey Nelson
    Sr. Product Marketing Manager, Okta

    Kelsey Nelson is a Senior Product Marketing Manager at Okta, leading workforce IT and security solutions, including getting beyond the buzzword of "Zero Trust." Prior to joining Okta, she led product and business communications at tech startups varying from enterprise software to edtech to consumer music hardware, and prior to that taught sec...

  • speaker photo
    David Masson
    Director of Enterprise Security, Darktrace

    David Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various u...

  • speaker photo
    Susan Hanson
    Vice President, Human Resources, Provation Medical

    Susan has over 20 years of healthcare experience in Human Resources and Compliance. Susan joined the Provation team in 2017 and brings her experience of building and growing high-performing teams with a dynamic, results-oriented culture and strong leadership. Susan also has experience in healthcare compliance specifically in HIPAA and HITECH ...

  • speaker photo
    Paul Lanzi
    Co-Founder & COO, Remediant

    Paul Lanzi, is the co-founder and COO of Remediant. Remediant is a cybersecurity startup focused on delivering a new approach Privileged Access Management. Paul and his co-founder at Remediant, Tim Keeler, worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At eac...

  • speaker photo
    Mark Spencer
    Regional Sales Manager and Account Executive, AccessIT Group
  • speaker photo
    Adam Waltman
    Sr. Sales Engineer, Malwarebytes

    Adam has over 20 years of experience in technology and serves as a senior technical member of the Malwarebytes field sales organization, providing expertise to customers in the Eastern U.S. Prior to joining Malwarebytes almost 5 years ago, Adam’s travels took him from various operational roles to other pre-sales engineering roles with Symante...

  • speaker photo
    Eddie Doyle
    Global Security Strategist, Check Point Software Technologies

    Eddie Doyle works with enterprise organizations, university think tanks and corporate leaders to articulate the complex subject of cyber security in an engaging manner, championing his customer’s initiatives to fruition and finding the holy grail of cyber security… making cyber a profit center for the business.

    LinkedIn recognizes Eddi...

  • speaker photo
    Tom Brennan
    Executive Director, Americas Region, CREST

    Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrast...

  • speaker photo
    Andre Alves
    Cloud Security Architect, Trend Micro

    Andre Alves has been helping companies to achieve safer environments for information exchange for over 10 years. Has always enjoyed tinkering with computers and being on the edge of new technologies, even back as a nerdy teenager in Brazil. Andre is a certified AWS Solutions Architect and Hybrid Cloud Security trainer.

  • speaker photo
    Nathan Wenzler
    Chief Security Strategist, Tenable, Inc.

    Nathan Wenzler is the Chief Security Strategist at Tenable, the Cyber Exposure company. Nathan has over two decades of experience designing, implementing, and managing both technical and non-technical security solutions for IT and information security organizations. He has helped government agencies and Fortune 1000 companies alike build new ...

  • speaker photo
    Martyn Crew
    Director of Product Marketing Management, Gigamon
  • speaker photo
    Gurinder Bhatti
    Principal Global Security Strategist, Okta

    Gurinder Bhatti is a Principal Global Security Strategist for Okta's pre-sales field teams. In his current role, he works with both customers and prospects in helping them understand the value proposition of Identity as a security strategy. Prior to Okta, Gurinder was an AVP of Cyber Security engineering at Moody’s and implemented numerous se...

  • speaker photo
    Somer Hernandez
    Solutions Architect, ReliaQuest
  • speaker photo
    John Davies
    Sr. Presales Systems Engineer, Arctic Wolf
  • speaker photo
    Dean Gross
    Identity and Security Architect, Insight
  • speaker photo
    Kazbek Khumush
    Trend Micro
  • speaker photo
    Brian Rossmeisl
    Sr. Security Architect, AccessIT Group
  • speaker photo
    Bob Pacheco
    Principal Risk Management Architect, Eurofins
  • speaker photo
    Joseph Acosta
    Director, Security Operations, Delta Risk
  • speaker photo
    Marc Keating
    Security Evangelist, Arctic Wolf
  • speaker photo
    Richard Schunk
    Major Accounts Systems Engineer, Palo Alto Networks
  • speaker photo
    Mike Lloyd
    CTO, RedSeal Networks

    Dr. Mike Lloyd has more than 25 years of experience in the modeling and control of fast-moving, complex systems. He has been granted 21 patents on security, network assessment, and dynamic network control. Before joining RedSeal, Mike Lloyd was Chief Technology Officer at RouteScience Technologies (acquired by Avaya), where he pioneered self-...

  • speaker photo
    James Sheldrake
    Enterprise Sales Engineer, Egress Software Technologies Ltd
  • speaker photo
    Kevin Romero
    Sales Engineer, ReliaQuest
  • speaker photo
    Kevin Kennedy
    Sr. Sales Engineer, Malwarebytes
  • speaker photo
    Nick DeLena
    Principal, IT Risk Assurance & Advisory, DGC (DiCicco, Gulman & Company)
  • speaker photo
    Mark Ostrowski
    Head of Engineering, East US, Check Point Software Technologies

    Mark Ostrowski is the Head of Engineering for the East region of US at Check Point Software Technologies. Mark has over 25 years’ experience in IT security and has helped design and support some of the largest security environments in the country. As an evangelist and member of the Office of the CTO at Check Point Software, Mark provides thou...

  • speaker photo
    Davitt J. Potter
    Director, MSSP and Channels, Americas, Digital Shadows

    Born and raised in the Black Hills of South Dakota, Davitt has over 25 years of experience in the OEM, VAR & MSSP channels realm. From starting as a field services engineer fresh from school at the South Dakota School of Mines and Technology, and eventually defining and managing IT operations and strategy for numerous companies in a CTO capac...

  • speaker photo
    Michael Lopez
    Director of Cloud Services, AccessIT Group

    Mike Lopez, Director of Cloud Services at AccessIT Group, has a history of designing cloud architecture with a security focused approach for government and fortune 500 clients. He has worked with private and public cloud environments including AWS, Azure, Oracle, and Google Cloud. Mike leads AccessIT Group’s Cloud practice by helping its cust...

  • speaker photo
    Marc Ybarra
    Distinguished Solutions Engineer - North America, Alert Logic
  • speaker photo
    Erika Barber
    Director of Compliance and Privacy, Boston Medical
  • speaker photo
    Gillian Lockwood
    Enterprise Information Security Program Administration and Governance, Partners Healthcare
  • speaker photo
    Brian Carey
    Manager, Advisory Services, Rapid7

    Brian Carey is a Rapid7 Manager of Advisory Consulting, specializing in: Security Program Assessments, Security Program Development, Risk Management, Vulnerability Management Program Development, Security Awareness and Policy Development. Before joining Rapid7 Brian was Information Security Director and interim Security Officer at LafargeHolc...

  • speaker photo
    Adam Winn
    Product Manager, Cisco Umbrella, Cisco

    Adam Winn is the platform product management lead for Cisco Umbrella. He got into cloud security product management in 2013 and never looked back. In 2016, he joined OpenDNS shortly before it was rebranded as Cisco Umbrella. He is a life-long California resident and a fan of live music (and can't wait for it to come back).

  • speaker photo
    Yuk Fai Chan
    Co-Leader, OWASP Toronto Chapter

    Yuk Fai Chan is Co-Leader of the OWASP Toronto chapter, where he actively promotes software security within the Toronto community. Professionally, Yuk Fai is a Co-Founder at Proack Security Inc., a Toronto-based information security consulting firm. He specializes in application security, penetration testing, threat modelling, security incide...

  • speaker photo
    Bobby Modha
    Security Consultant, Security Compass

    Bobby Modha is a Security Consultant with Security Compass. He specializes in security assessments in the application security space including web application, APIs and mobile app penetration testing. In his spare time, Bobby enjoys working on personal projects such as developing scripts and participating in capture-the-flags.

  • speaker photo
    Keyaan Williams
    Founder and Managing Director, CLASS, LLC
  • speaker photo
    Melvin Crum
    Computer Scientist - Informatics, Centers for Disease Control & Prevention
  • speaker photo
    Jeremy Castleman
    Cloud Security Specialist, Check Point Software Technologies

    Jeremy Castleman is the Cloud Security Specialist supporting the Cloud Team for Check Point Software Technologies. Jeremy brings 15 years of experience in technology sales, marketing, business development and cloud migration services in the partner ecosystem. He has worked in multiple countries around the world, in various markets, and across...

  • speaker photo
    Achint Sehgal
    Global Head of Solutions Engineering, OneTrust

    Achint Sehgal, CIPP/E, CIPM, serves as a Global Head of Solutions Engineering for OneTrust Vendorpedia—a purpose-built software designed to operationalize third-party risk management. In his role, Sehgal advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, fra...

  • speaker photo
    Ernest Dunn
    Regional Partner – Mid Atlantic, GuidePoint Security
  • speaker photo
    Eric Mims
    Director, Enterprise IT Security & CISO, University of Houston
  • speaker photo
    Greg Thompson
    CISO & VP, Manulife
  • speaker photo
    Robert Wong
    Executive Vice-President, Chief Information Officer, Toronto Hydro

    Robert Wong is EVP & CIO at Toronto Hydro, responsible for information technology, operational technology, cyber security, and telecommunications. Robert was also Chief Risk Officer, responsible for corporate enterprise risk management, strategic planning, corporate governance, and business continuity.
    Robert is on the Board of Directo...

  • speaker photo
    Lois Tullo
    Executive in Residence, Global Risk Institute; CFRO/CCO, Novera Capital, Risk Management Faculty, Schulich School of Business, York University
  • speaker photo
    GuidePoint Security Representative
  • speaker photo
    Nick Ritter
    CISO, First Financial Bank

    Nick Ritter is the leader for Product & Industrial Security teams within GE. He is responsible for the product security program across GE commercial products, third party and supply chain security, manufacturing security, application security, and attack simulation (Red Team). Nick is also a key risk advisor to GE’s global CISO. He has almost...

  • speaker photo
    Kai Pfiester
    Founder & Chief Security Architect, Black Cipher Security
  • speaker photo
    James Goepel
    Treasurer and Member, Board of Directors, Cybersecurity Maturity Model Certification (CMMC) Accreditation Body

    James Goepel is Treasurer and Member, Board of Directors for the CMMC-AB. He is also an adjunct professor of Cybersecurity at Drexel University and CEO of Fathom Cyber, a trusted agent for senior management and developer of defensible cybersecurity strategies. Jim earned his BSECE from Drexel and his JD and LLM degrees from George Mason Unive...

  • speaker photo
    Edward Ettorre
    Operational Risk Consultant, Wells Fargo

    Ed is an Operational Risk Consultant working within the Technology Information Security group. He has been with Toastmasters International (TMI) since 1997 and has multiple certifications from TMI. Ed is a resourceful, creative, and solution-oriented person who was frequently able to come up with new and innovative approaches to his assigned ...

  • speaker photo
    Devon Campbell
    Digital Forensic Examiner, TransPerfect Legal Solutions

    Devon Campbell is a Digital Forensic Examiner at TransPerfect Legal Solutions in the Forensic Technology and Consulting division. Devon has experience conducting forensic examinations of mobile devices, computers, social media data, cloud-based data, and email data. Prior to joining TransPerfect Legal Solutions, Devon earned her Master's degr...

  • speaker photo
    Christina Griffin
    IT Security and Risk Manager, Chatham Financial

    Cybersecurity professional specializing in risk management and information security. She holds an MBA, a master’s in information technology leadership, and also has a CISSP certification. She has professional experience working in both higher education and finance industries and is currently employed as an IT Risk and Security Manager at Chat...

  • speaker photo
    Tedrick Housh
    Partner, Lathrop GPM LLP

    Tedrick Housh (CIPP/US, CIPP/E) leads the Global Privacy, Cybersecurity & Data Protection practice at Lathrop GPM. He advises companies on data – its collection, storage, protection, use, transfer and disclosure. He assists clients with data security incident response. He drafts Information Security Policies, Incident Response Plans, and the ...

  • speaker photo
    Steve Hengeli
    Attorney at Law, Polsinelli

    With a background in computer programming, Steve Hengeli takes a problem-solving approach to privacy, data security, and technology transactions. Steve works with clients in a variety of highly-regulated and innovative industries to develop strategies to address U.S. and international regulations relating to privacy and information technolog...

  • speaker photo
    Nan L. Grube
    Consulting Attorney, PBL Consulting

    Owner of consulting firm PBL, Nan Grube partners with businesses of all sizes to solve privacy, business, and litigation challenges with a view of larger picture and attention to detail. She has the compassion and capacity to help her clients during some of the most stressful business events they will encounter by explaining in understandabl...

  • speaker photo
    Scott Laliberte, Moderator
    President, ISSA Delaware Valley Chapter

    Scott Laliberte, President of ISSA Delaware Valley Chapter for over 10 years, has grown the chapter significantly by creating a collaborative community for Cyber Security professionals to share their knowledge and experience and satisfy their CPE needs. Scott also leads Protiviti’s Emerging Technology practice where he enables clients to leve...

  • speaker photo
    Brice Taylor
    Special Agent, FBI
  • speaker photo
    Jason Patel
    Chief Technology Officer, Ensighten

    As Chief Technology Officer Jason leads the Product and Engineering teams at Ensighten. Being part of Ensighten’s development team over six years ago when the Tag Management Platform was first designed gives him a unique perspective and experience on all our solutions; he has hence been influential in designing and implementing the majority o...

  • speaker photo
    Sunny Notani
    Special Agent, United States Secret Service

    Sunny Notani has worked as a Special Agent for the United States Secret Service for 18 years. SA Notani was initially assigned to the New York Field Office (NYFO) for eight years. During his time in the NYFO, SA Notani specialized in Financial Institution Fraud, Electronic Crimes, Network Intrusions, and Social Engineering. SA Notani was assi...

  • speaker photo
    RJ Sudlow
    IT Advisory Manager, Dixon Hughes Goodman LLP
  • speaker photo
    Steve Magowan
    Director, Data Protection and Resiliency, Royal Bank of Canada

    Steve Magowan is Director of Data Protection with the Royal Bank of Canada. A Veteran of the Canadian Airforce, since retiring Steve has spent the past 20 years engaged in a wide assortment of Risk Focused, Data Protection, Security Architecture & Enterprise Risk Management initiatives.

    Including the remediation of active security...

  • speaker photo
    MJ Couldridge
    Director, Business Development, Canadian Cyber Threat Exchange

    MJ Couldridge is the Director of Business Development for the Canadian Cyber Threat Exchange. The CCTX is Canada’s threat sharing hub for all companies doing business in Canada. It provides analysis and enables collaboration of cyber security insights impacting Canada. Providing both a cross-industry and by-industry context, it serves small, ...

  • speaker photo
    Sabrina Stanich
    Cybersecurity Manager, Darktrace

    Sabrina Stanich is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from financial services to manufacturing, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting an...

  • speaker photo
    Will Mishra
    Cybersecurity Manager, Darktrace

    Will Mishra is a Cyber Security Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from financial services to healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autono...

  • speaker photo
    Taylor Lehmann
    CISO, athenahealth

    Taylor Lehmann is the VP and Chief Information Security Officer at athenahealth, a healthcare information technology organization with headquarters in Watertown, MA and operations around the world. Taylor has been in information security and risk management for over 15 years. He was most recently the CISO at Wellforce, an eastern MA-based, Tu...

  • speaker photo
    Myles Kellerman
    Chief Cybersecurity Analyst, Alpine Security

    Myles Kellerman is the Chief Cybersecurity Analyst at Alpine Security. He has over 15 years of IT/Cyber experience in the commercial and DoD sectors. Myles’ extensive background in cybersecurity includes a degree in Information System Security and multiple certifications including CISSP, CEH, CPT, CHFI, and CFR. Myles leads and performs many ...

  • speaker photo
    Lauren Provost
    Professor, Computer Science, Western Governors University

    Dr. Lauren E. Provost is an ethical hacker, author and professor. She directs The Ethical Hackers Cybersecurity organization, a virtual community for educators and industry providing comprehensive planning and risk management updates, network and cloud security knowledge and information on other cybersecurity topics such as general penetratio...

  • speaker photo
    Sam Rastogi
    Product Marketing Director, Illumio

    Sam Rastogi is a veteran of the security industry with 18+ years experience marketing leading security products at Illumio, Palo Alto Networks, Cisco Systems, HP Enterprise, McAfee, Juniper Networks, and Oracle. Sam is a Product Marketing Director at Illumio, where he is responsible for leading go-to-market and marketing activities for zero t...

  • speaker photo
    Leland Dean
    VP, Global Corporate Security, Bank of New York Mellon

    Leland is the Vice President of Global Corporate Security for Bank of New York Mellon. He is responsible for physical protection and investigations of the southwest part of the United States, Mexico, Chile, Argentina, and Brazil (LaTAM).

    Leland graduated with a Bachelor’s of Science degree from Sam Houston State University in Criminal ...

  • speaker photo
    Nathan Wilcox
    Sr. Security Architect, GuidePoint Security
  • speaker photo
    Patrick Keenan
    Principal Security Engineer, GuidePoint Security

    Splunk Master Flex

  • speaker photo
    Torry Crass
    Agency CISO, North Carolina State Board of Elections

    Torry Crass currently serves as the Agency CISO at the North Carolina State Board of Elections and member of the CISO team at Woodstar Labs, a division of Associated Universities, Inc.

    Torry has more than 20 years of experience in the IT field and over 10 years of cybersecurity experience. Prior to joining Woodstar Labs, Torry was a CI...

  • speaker photo
    Brian Neesby
    CIO, N.C. State Board of Elections

    Brian Neesby is the CIO of the State Board of Elections. Prior to this role, he was the Chief Data Officer. Brian has served as a fact witness, been deposed several times, and executed declarations on behalf of the State Board concerning his knowledge of North Carolina’s Statewide Voter Registration Database. He investigated data discrepanc...

  • speaker photo
    Michael Dickerson
    Director, Mecklenburg County Board of Elections

    Michael Dickerson is currently the Director of Elections for Mecklenburg County and has held this position since 1998.
    Prior to coming to Charlotte, Mr. Dickerson was with the Federal Election Commission as a Deputy Assistant Staff Director. Mr. Dickerson spent 14 years at the Federal Election Commission.

    Currently he is a membe...

  • speaker photo
    Karen Brinson Bell
    Executive Director, N.C. State Board of Elections

    Karen Brinson Bell has served as executive director of the North Carolina State Board of Elections since June 2019. She has worked in elections administration since 2006 in county, state, and national roles. As North Carolina’s chief elections official, she leads about 65 full-time employees at the state agency, which is charged with administ...

  • speaker photo
    Patrick Gannon
    Public Information Officer, N.C. State Board of Elections

    Patrick Gannon is the public information director at the State Board of Elections. He has served in this role since since October 2016, just before the presidential election. His responsibilities include managing the State Board website, drafting press releases and social media content, responding to public records requests, and answering que...

  • speaker photo
    Boris Vishnevsky
    Board Member and Technology Strategist, Cloud Security Alliance - Delaware Valley (CSA-DV)

    Boris Vishnevsky, MBA, CISSP, DIA is a board member and advisor of the Cloud Security Alliance- Delaware Valley Chapter, Distinguished IT Architect of the Open Group and is a frequent speaker and presenter, taking part in review panels and advising innovative Cyber Security Companies. Mr. Vishnevsky is a solutions principal advising companie...

  • speaker photo
    Marc Tabago
    Solutions Engineer, Trend Micro

    As a Solutions Engineer, Marc Tabago works with enterprises to solidify and strengthen their digital security policies against malicious threat actors. However, he believes that having a concrete digital security posture starts at the use case level, driven and experienced by its users and not simply read off a PowerPoint slide. Once the dust...

  • speaker photo
    Justin Bourgeois
    Sales Engineer, Mimecast

    Justin Bourgeois is a Solution Engineer at Mimecast. He has a background in implementation project management, IT consulting and has spent his off time programming as a hobby. Justin’s main responsibility is educating people about the ever-evolving threat landscape that not only threatens their infrastructure but also their partners and the g...

  • speaker photo
    Joe Zurba
    CISO, Harvard Medical School

    In his role as the leader of Information Security at Harvard Medical School, Joe Zurba has been responsible for defining and building capabilities to meet the requirements of an extraordinarily diverse community of clinical and research faculty, students, and staff. Joe develops strategy, improves capabilities, and manages risk for all inform...

  • speaker photo
    Michael Anaya
    Supervisory Special Agent, Cyber, FBI (Prior)

    Michael is the Head of Cyber Risk at Expanse (one of Forbes' 25 fastest-growing venture-backed startups likely to reach a $1 billion valuation). He leads a large team of analysts who identify vulnerabilities in large Fortune 500 companies' and government agencies’ vast online presence. He also has 14 years of FBI experience as a Special Agent...

  • speaker photo
    Tony Howlett
    CISO, SecureLink

    Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP and GNSA certifications, and a B.B.A in Management Information Systems. Tony is curre...

  • speaker photo
    Ian Woolley
    Chief Revenue Officer, Ensighten

    Ian’s impressive background and management expertise in digital marketing and advertising are fueling his success in driving adoption of Ensighten’s solutions worldwide. Ian started his career at Dun & Bradstreet Europe before working at Interpublic Group’s Draft Digital as Managing Director. After building his own premium publisher business,...

  • speaker photo
    Samara Williams
    Threat Intel Engineer, Cardinal Health

    Samara works for Cardinal Health, as a Threat Intelligence Engineer. As an engineer, Samara collects and assesses a wide range of threats to the healthcare industry. She specializes in MITRE ATT&CK, threat actor reporting, strategic program design/implementation, and fostering relationships within the organization. Samara is passionate about ...

  • speaker photo
    Melisa Ozcan
    Cybersecurity Account Executive, Darktrace

    Melisa Ozcan is a Cyber Security Account Executive at Darktrace, the world’s leading AI company for cyber defense. At Darktrace, Melisa works with leading organizations in a range of industries from private equity to media and entertainment to deploy and operationalize cutting edge technologies. During Melisa’s tenure at Darktrace, the compan...

  • speaker photo
    Kelley Misata
    CEO, Sightline Security

    Dr. Kelley Misata, CEO of Sightline Security, President and Executive Director of OISF (Suricata), and former Director of Communication of The Tor Project - a cyber and information security executive with 15+ years of experience in cyber and information security, marketing, and communications. Expert in bridging the gap between technical and ...

  • speaker photo
    Sergeant Michael Davis
    Cyber Investigator at the Houston Police Department, Criminal Intelligence Division and Fusion Center Unit

    Sgt. Davis is assigned to the Houston Police Department Criminal Intelligence Division – Fusion Center Unit a total of 10 ½ years both as an officer and supervisor. He has worked Financial Crimes, Human Trafficking, Counter-Terror, Violent Crimes, and Cyber cases. He is currently the Cyber/Analysis and Open Source Unit supervisor for the Ho...

  • speaker photo
    Michael Butterfield
    Regional Architect - Mid-Atlantic, Check Point Software Technologies

    Michael Butterfield is Security Architect at Check Point, where he supports 30+ engineering teams responsible for hundreds of customers across the Mid-Atlantic. He is primarily focused on helping enterprises design, consolidate, and integrate security controls into emerging technology platforms. Over an 18-year career in cybersecurity, Michae...

  • speaker photo
    Andrew Hoover
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Andrew Hoover is a Senior Engineer with the CERT Division of Carnegie Mellon University’s Software Engineering Institute. As a member of the Cybersecurity Assurance Team, he performs risk and resilience management work for a variety of organizations, mostly relating to critical infrastructure protection. Andrew has 16 years of experience in i...

  • speaker photo
    Katie Stewart
    Sr. Member, Technical Staff, CERT Division, Software Engineering Institute - Carnegie Mellon University

    Katie Stewart is a senior member of the technical staff within the CERT® Division at the Software Engineering Institute (SEI), a unit of Carnegie Mellon University in Pittsburgh, PA. She has more than 15 years of experience advising clients in engineering, information technology, and telecommunications industries. Katie’s current research int...

  • speaker photo
    Juan Marin
    Sales Engineer Manager, IntSights

    A cybersecurity professional and avid technologist advocate with 10 years of experience in effective cyber-security practices, advanced threat prevention, malware and incident response; Juan has worked with the likes of McAfee/Intel Security and Trend Micro in the past, fulfilling technical sales, advisory and customer success roles, and toda...

  • speaker photo
    John Amaral
    Head of Product, Cloud Security, Cisco

    John Amaral is the Head of Product for Cisco Cloud Security. In this role, he is responsible for product management, planning and strategy for Cisco's leading cloud security offerings including Cisco Umbrella and Cisco Cloudlock. John joined Cisco through the acquisition of Cloudlock, where he was Head of Product; responsible for product deve...

  • speaker photo
    Stacy Harper
    Partner, Spencer Fane LLP

    Stacy Harper is a Partner with Spencer Fane LLP where she counsels organizations on regulatory compliance, health care reimbursment, and cybersecurity strategies. Stacy co-chairs the firm's data privacy and cybersecurity practice. as a former health care compliance officer, Stacy regularly works with clients to assess data-related risks, and ...

  • speaker photo
    Benjamin Agner, Moderator
    SVP, Cyber Security Engineering, Truist
  • speaker photo
    Rick Doten
    VP, Information Security, Centene Corporation

    Rick is CISO of Carolina Complete Health, a state healthcare plan, for Centene Corporate. Rick has run ethical hacking, application security, incident response & forensics, and risk management teams throughout his 25 years in IT Security. Rick has been the first CISO for two companies. He has also consulted as a virtual CISO for many industri...

  • speaker photo
    Dr. Atefeh (Atty) Mashatan
    Founder & Director, Cybersecurity Research Lab, Ryerson University

    Dr. Atefeh (Atty) Mashatan is the Founder and Director of the Cybersecurity Research Lab at Ryerson University. SC Magazine recognized her as one of top five Women of Influence in Security globally in 2019. She joined the School of Information Technology Management of Ryerson University in 2016 focusing on Information Systems Security, Crypto...

  • speaker photo
    Rob Dalzell
    BISO, Bank of America

    Rob Dalzell is a cybersecurity professional with over 30 years of Information Technology and Cybersecurity experience. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access Management, Responsible Vulnerability Disclosure, email encryption, and general security awa...

  • speaker photo
    James Keegan, Moderator
    VP, Information Security, Essent Guaranty, Inc.
  • speaker photo
    Tammy Klotz, Moderator
    CISO, Trinseo

    Tammy Klotz is a vibrant and accomplished executive with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned...

  • speaker photo
    ACP Local Chapter
  • speaker photo
    Pete Murphy
    IT Advisory Executive, CareSource

    Pete Murphy is a well-established leader, builder and collaborator with high standards for personal integrity and a bias for action. He has demonstrated senior level leadership experience building, growing, improving and operating business systems and processes as a CIO, CTO, CISO, Risk Leader and Data and Analytics executive.
    He speci...

  • speaker photo
    Joshua Cloud
    Director of Information Security, NFI

    Joshua Cloud is currently serving as the director of information security for NFI. He has over 20 years of infrastructure and security leadership experience spanning professional services, manufacturing, retail, and logistics industries in countries all over the world. Cloud is a transformational security leader with a business focus who evan...

  • speaker photo
    Paul Ihme
    Co-Founder & President of Consulting Services, Soteria

    Paul is an accomplished Security Professional with 14 years of experience in multiple information technology domains, specializing in computer network exploitation, computer network defense and security incident response. His expertise includes planning, coordinating and performing offensive computer operations.
    Paul leads the firm’s ma...

  • speaker photo
    Douglas Jambor
    Sr. Cybersecurity Manager - IT Advisory, Dixon Hughes Goodman LLP

    Douglas has 13 years of penetration testing experience in the information technology field, focusing on information systems security and information security risk management. He is DHG’s cybersecurity subject leader and manager over all of the firm’s technical cybersecurity services, which includes internal, external, wireless and web applica...

  • speaker photo
    Trend Micro
  • speaker photo
    Kevin Dreyer
    IT Director & CISO, Maple Reinders Group

    Kevin Dreyer is an IT Director and CISO with over 25 years of industry experience for a General Contractor securing a national network and its 400 users across a hybrid cloud infrastructure. He fell in love with computers at age 12 when a cousin introduced him to programming, and has never looked back. Having dropped out of college due to the...

  • speaker photo
    Jana White
    COO, Alpine Security

    Jana White is the Chief Operating Officer of Alpine Security. Jana has an extensive background in banking, compliance, and loss prevention and serves as one of the virtual CISOs for Alpine Security clients. Jana has degrees in criminal justice and cybersecurity and is certified as a crime scene evidence technician. She also holds many cyber...

  • speaker photo
    Olivera Zatezalo
    Chief Security Officer, Huawei Canada

    Olivera Zatezalo is the Chief Security Officer at Huawei Canada, and her responsibility is to ensure Huawei Canada’s operations is compliant with Canadian cyber security laws and regulations. With over 20 years of experience in the telecommunication industry, Olivera is best known for creating value through collaborative leadership style, agi...

  • speaker photo
    Kenrick Bagnall
    Toronto Police Service, Coordinated Cyber Centre (Ret.); Founder, KONCYBER

    Kenrick Bagnall has 17 years of law enforcement experience, the last eight of which were in the Coordinated Cyber Centre (C3) as a Cybercrime Investigator. Prior to law enforcement, he spent two decades working in the Information Technology industry primarily in the financial services sector. During this time, he spent twelve years in Bermuda...

  • speaker photo
    Tamika Puckett
    Risk Manager, Corporate Security, Zoom

    As the City of Chicago’s Chief Risk Officer, Ms. Puckett was responsible for implementing and managing the city’s enterprise risk management governance framework, including the implementation of policies and procedures to identify and manage organizational risks. A career risk manager, Ms. Puckett possesses over 15 years of experience managin...

  • speaker photo
    Tanya Tipper-Luster
    IT Audit/Advisory Professional, Wyndham Destinations

    Tanya Tipper-Luster has spoken at cyber conferences such as the (ISC)2 Security Congress and was featured as a cybersecurity expert in the Orlando Business Journal. She is a Cybersecurity Audit thought leader and visionary. She represents the alignment of emerging technology, critical business processes and key cybersecurity controls to infl...

  • speaker photo
    Robert Ryba
    Sr. IT Audit / Advisory, Wyndham Destinations

    Robert Ryba has spoken at cyber conferences such as the (ISC)2 Security Congress. He is a Certified Public Accountant and Certified Information Systems Auditor with an Internal Audit and Cybersecurity background. As a millennial who is deeply passionate about information technology, he is motivated to learn why millennials are so indifferent...

  • speaker photo
    Ethan Strayer
    Sr. IT Advisory Analyst, Wyndham Destinations

    Ethan Strayer has spoken at cyber conferences such as the (ISC)2 Security Congress. Ethan is a Certified Information Systems Auditor, Cybersecurity and Information Technology (IT) Governance Risk and Compliance professional. He supports the Company's risk tolerance while also improving the IT posture of the organization. Ethan specializes in...

  • speaker photo
    Chris Turley
    Leader, RISC Education & Awareness, FIS

    I lead the Risk, Information Security, and Compliance Education & Awareness team for FIS, a financial services leader focused on payments, banking, and investments. My team is responsible for providing education & awareness for our 55,000+ colleagues located in offices across the globe. My career was focused in security and audit space previo...

  • speaker photo
    Brian Coleman
    Associate CIO, Information Security Officer , University of Massachusetts Medical School

    Brian is a seasoned leader, Chief Information Security Officer, and IT executive. His experience spans Insurance, Financial Services, Health Care, and Cloud Security. His specialty is optimizing Information Security and Risk Management / Compliance organizations, his passion is employee mentorship, continuous improvement and process developme...

  • speaker photo
    Donna Ross
    President, WiCyS Delaware Valley Affiliate

    Dynamic leader and board member demonstrating over 20 years of diverse risk, compliance, information security, technology, and operations experience within the manufacturing, insurance, banking, financial services, and retail sector. Adept in developing and implementing strategic technology and risk solutions, performing research and analysis...

  • speaker photo
    Nancy Hunter, Moderator
    Board President, WiCyS Delaware Valley Affiliate

    Nancy Hunter is the VP, CISO and Data Privacy Security Officer at the Federal Reserve Bank of Philadelphia. With more than 25 years of experience in technology including 15 years in Information Security, Nancy joined the Federal Reserve Bank in 2017 where is accountable for Information Security Operations and Consulting, Information Risk Mana...

  • speaker photo
    Mark Eggleston, CISSP, GSEC, CHPS
    CISO, CSC

    Mark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, ...

  • speaker photo
    Joshua Sorenson
    Sr. Director, Global Security, Equifax

    Joshua is a Global Information Security Leader with 14 years of professional experience. Joshua currently serves as Equifax's Senior Director of Global Mainframe Security where he has responsibility for transforming zSeries platform security around the world. Prior to joining Equifax, Joshua served in security leadership roles, leading transf...

  • speaker photo
    Ted Demopoulos
    Principal, Demopoulos Associates

    Ted Demopoulos’ professional background includes over 35 years of experience in Information Security and Business, including over 30 years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other startups. He is a frequent...

  • speaker photo
    Joel Lowe
    Director of Physical and Cyber Security, Red Ventures

    Joel Lowe has more than 14 years of experience in remediating threats, vulnerability management, risk management, data privacy, and information security programs. These programs focus on overseeing private data protection, corporate governance, risk management strategy, Certification & Accreditation, Incident Response, forensics and executive...

  • speaker photo
    Canadian Cyber Threat Exchange (CCTX)

    The Canadian Cyber Threat Exchange (CCTX) is a sharing hub and collaboration organization that provides insight into cyber events directly impacting Canadian business, along with mitigation options and tools to combat identified threats. Learn about the CCTX and enjoy a special, CCTX-hosted guest presentation. Details available soon.

  • speaker photo
    Ken E. Sigler
    Board of Advisors, University of Detroit Mercy, Center for Cybersecurity and Intelligence Studies

    Ken Sigler has served as a full-time faculty member of the Computer Information Systems program at the Auburn Hills Michigan campus of Oakland Community College since 2001, while his primary research is in the area of cybersecurity education, policy, and management; software management; and software assurance. Ken serves as the Liaison for th...

  • speaker photo
    Daniel Goldenberg
    Director, IT Infrastructure, Barton Associates

    Dan is a business results-focused information technology leader with a background in information security, infrastructure, and technical operations; experiences range from fledgling start-ups to enterprise corporate environments.

  • speaker photo
    Tammy Moskites
    Ponemon Institute Distinguished Fellow, Career CISO & Former CISO, Time Warner Cable; CEO & Founder, CyAlliance

    Tammy is the CEO and Founder of CyAlliance. She is a strategic advisor to companies, vendors and startups by leading, building and scaling security offerings while providing CISO as a Service and virtual CISO (vCISO) services for companies worldwide. With her 30 years of experience, she is noted by her peers to be a results-driven and passion...

  • speaker photo
    Bobby Singh
    CISO and CTO, Toronto Stock Exchange
  • speaker photo
    Adam Karcher
    Cyber Special Agent, FBI

    Special Agent Adam Karcher has been with the FBI for over 16 years running cyber investigations and operations across the full spectrum of criminal and national security programs. SA Karcher's experience spans local field investigations to national and international strategic engagement against the most sophisticated cyber threats. His curren...

  • speaker photo
    Matt Donato
    Co-Founder & Managing Partner, HuntSource

    Matt Donato is a Co-Founder & Managing Partner of HuntSource- the preeminent Executive Search and Talent Solutions firm with a niche focus in Cyber Security & Data Intelligence. Matt possesses fifteen years of experience in executive recruiting, talent solutions, workforce planning, and talent management. He is a thought leader and recruiting...

  • speaker photo
    Helen Oakley
    Lead Security Architect, SAP Global Security and Cloud Compliance

    Helen Oakley is a cybersecurity enthusiast, researcher, and educator. Helen is a well-known expert in Toronto’s cybersecurity community, and a regular speaker at Elevate, SecTor, and corporate cybersecurity and technology events; she is currently on the advisory board for SiberX’s "Canadian Women in Cybersecurity” conference. Helen is current...

  • speaker photo
    (ISC)2 Local Chapter

    The International Information System Security Certification Consortium, or (ISC)², is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization."

  • speaker photo
    Joe Provost
    Information Security, Avidia Bank

    Joe's been in cyber since the internet was a piece of string tied between two soup cans! He's a former Army warrant officer (network warfare), MIT Lincoln Laboratory IAM, IBM (XForce Cyber Range) “The Cave” member, teaches professional ED at MIT with the Geospatial Cyber Security group, and has a Masters in Cyber from Utica College. His forme...

  • speaker photo
    Michael Meyer
    Chief Risk and Innovation Officer, MRS BPO, LLC

    Michael Meyer, MPSTM, CISSP, CIPP/US, CIPM, FIP, CISM, CRVPM II, CRISC, CISA, is the Chief Risk and Innovation Officer of MRS BPO. He is responsible for overseeing the company’s enterprise innovation, risk management and security initiatives for its Fortune clients. Michael has been with MRS for over 20 years and previously served in the Chie...

  • speaker photo
    Don McKeown
    Information Security Manager, Wolters Kluwer Health

    Don McKeown is currently an information security manager for a provider of healthcare solutions that facilitate effective clinical decisions. There he developed and teaches a threat modeling course, teaches code scanning, contributes to corporate application security advisory committees, and consults for technical and product teams. Previousl...

  • speaker photo
    Doug Graham
    Chief Security and Privacy Officer, Lionbridge

    Doug is the Chief Security and Privacy Officer at Lionbridge Technologies, a global leader in localization and data training. He has over 20 years of global experience in the enterprise security space and brings a balance of leadership, customer focus, and technical expertise to the table. He previously served as CSO of Nuance Communications ...

  • speaker photo
    Ben Schwering
    CISO, Premiere, Inc.
  • speaker photo
    Gabriel Doncel
    Director, Information Security, Drexel University

    Gabriel Doncel joined Drexel University in 2019 where is currently Director of Information Security. He is also part of the University of Delaware and Wilmington University Adjunct Faculty. As a member of the Information Security team at Drexel, and working closely with the campus community and outside parties, his focus is to protect the peo...

  • speaker photo
    Margarita Rivera
    VP, Information Security, Risk & Compliance, LMC (a Lennar Company)

    An Information Security Executive with over 15 years of experience, Margarita Rivera has thrived her entire career on solving complex problems. Margarita has dedicated her professional journey to building Information Security Risk, Compliance and Privacy Programs and continues to do so as the Head of Information Security at LMC, a Lennar Corp...

  • speaker photo
    Brendan Campbell
    VP, Technology and Cybersecurity Audit & Advisory Services, Manulife
  • speaker photo
    Mike Ste Marie
    Election Security Partnership Program Manager, Office of the Secretary, Commonwealth of Massachusetts

    Mike has over 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a...

  • speaker photo
    Adel Danesh
    CISO, Analytics 4 Life

    Adel Danesh has over 20 years of experience in IT and information security. Over the course of his professional career, he has been holding information security leadership roles in various organizations and spearheaded mission critical security and infrastructure projects. In his current job, Adel is a CISO at Analytics For Life, a medical re...

  • speaker photo
    Dominique West
    Sr. Cloud Security Consultant, EY, Instructor, Georgia Institute of Technology

    Dominique West is a senior consultant for Ernst & Young based in Atlanta, GA. She has eight years of experience in Information Technology, five of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries...

  • speaker photo
    Daniel Pepper
    Partner, BakerHostetler

    Dan Pepper is a partner on BakerHostetler's Privacy and Data Protection team. Utilizing 25 years of comprehensive experience in information technology, data privacy, and cybersecurity law, Dan advises clients on proactive data security practices, data breach incident response, and regulatory compliance. He frequently handles security incident...

  • speaker photo
    Michael Effiong
    Head of Cybersecurity, Tango Networks

    Michael Effiong is Head of Cybersecurity at Tango Networks, where he is in charge of the Cybersecurity department, developing policies, security awareness training, network architecture, vulnerability analysis, and governance and compliance. He reports to the COO/CISO. Michael holds a masters degree in cybersecurity from University of Dallas,...

  • speaker photo
    Arif Hameed
    Sr. Director, Client Security, Equifax Canada

    Arif Hameed is Senior Director at Equifax, where he leads a team that handles client cybersecurity due diligence activities including questionnaires, audits, remediation support, security schedules, etc. Prior to his role at Equifax, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third Party Cyber Risk, and IT ...

  • speaker photo
    Imran Ahmad
    Partner and Head of Technology, Co-Chair Data Protection, Privacy and Cybersecurity, Norton Rose Fulbright Canada LLP

    Imran Ahmad is the Canadian head of our technology sector and Canadian co-head of our information governance, privacy and cybersecurity practice. He is based in our Toronto and Montreal offices and is recognized as a leading cybersecurity lawyer by several legal directories.

    Imran advises clients across all industries on a wide array ...

  • speaker photo
    J. Zhanna Malekos Smith
    Sr. Associate, Aerospace Security Project, and Adjunct Fellow, Strategic Technologies Program, Center for Strategic and International Studies

    J. Zhanna Malekos Smith, J.D., served as a captain in the U.S. Air Force Judge Advocate General’s Corps and is a delegate in Stanford University’s U.S.-Russia Forum. She received a B.A. from Wellesley College, an M.A. and A.K.C. from King’s College London, Department of War Studies, and J.D. from the University of California, Davis School of ...

  • speaker photo
    Larry Snyder
    Associate Professor, Bloomsburg University of Pennsylvania

    Professor Larry Snyder has nearly two decades of experience in law enforcement, fraud, and auditing in the US Army and a variety of industries, and 15 years in the field of cybersecurity education. Larry believes that cybersecurity strategists must have a broad understanding of the cyber issues facing organizations, as well as the skills need...

  • speaker photo
    Ryan Hausknecht
    Instructor, University of North Carolina at Charlotte

    Ryan Hausknecht specializes in red teaming as a Security Consultant at SpecterOps and is an instructor for cybersecurity at UNC Charlotte. He is a former Forensic Consultant, Information Security Analyst, and Penetration Tester who has dealt with clients ranging from local government to enterprise-sized businesses. Ryan graduated Summa Cum La...

  • speaker photo
    Stephen Purpura
    Founder, [Stealth Mode]

    Stephen Purpura is an American entrepreneur and an applied machine learning researcher. He has co-founded four companies that focus on evolving the future of work, including Context Relevant (renamed Versive and acquired by eSentire) and SkyEye LLC (also acquired). He holds degrees from Harvard University’s Kennedy School of Government and th...

  • speaker photo
    Karen Holmes
    VP and CISO, TrueBlue Inc.

    Karen Holmes is the Vice President and CISO at global staffing company TrueBlue, where she is responsible for Cybersecurity, Technology Governance, Risk and Compliance, Networking, and Telecommunications. On a mission to drive automation and orchestration, she is focused on improving overall seamless and secure user experiences while creating...

  • speaker photo
    Tom Bechtold
    Digital Event Director, SecureWorld

    Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also worki...

  • speaker photo
    Garrett Whitney
    CIO, Delta Dental of Washington

    Garrett Whitney is the Chief Information Officer at Delta Dental of Washington, the largest dental benefits provider in Washington State. He developed a passion for technology at an early age by learning to program Pascal, C, and 8086 Assembly languages prior to graduating high school. Garrett is a veteran of the United States Navy, specializ...

  • speaker photo
    Kat Jungck
    Principal Enterprise Security Architect, F5 Networks

    Kat is an experienced cybersecurity practitioner with a background in both enterprise cybersecurity and secure product development with deep domain experience in cloud security, identity and access management, and secure product development. Kat enjoys working with local cybersecurity chapters and programs to recruit and develop the next gen...

  • speaker photo
    Brian Shea
    BISO, Salesforce

    Brian is an IT Executive with 29 years of experience from Security Operations and Support, Compliance, Risk Management, Technology Innovation, IT Operations and Supportand. Currently, Brian is a Business Information Security Officer (BISO) supporting multiple business units at Salesforce, delivering security and compliance across our people, ...

  • speaker photo
    Sean Ventura
    CISO, Atmosera

    Sean has over 30 years of experience in the Information Technology field, with a focus on information security best practices and compliance. He currently serves as the Chief Information Security Officer at Atmosera, implementing and maintaining the company’s security posture, while providing security and compliance expert advisory to Atmoser...

  • speaker photo
    Michael Ray
    Manager, IT Security & Risk, Puget Sound Energy
  • speaker photo
    Mukesh Dixit
    CTO, Washington State Department of Labor and Industries

    Chief Technology Officer at Washington State Department of Labor and Industries. Expert level grasp on IT Security governance and management of security in application, infrastructure and cloud domains. Spearheaded teams to do FedRAMP assessments of major cloud service provider giants in the industry. Certifications include CISSP, CCSP, CISA,...

  • speaker photo
    Austin McBride
    Threat Data Scientist, Cisco Umbrella

    Austin McBride is a Threat Data Scientist at Cisco Umbrella who identifies unclassified threat vectors, discovers emerging trends in malware distribution, and analyzes and evaluates the impact of security threats on customers. His current research focuses on the significance of cryptocurrency in the ever-evolving threat landscape, which abets...

  • speaker photo
    Monica Dubeau
    Director, Privacy Program, IBM Security
  • speaker photo
    Jay Wilson, Moderator
    CISO, Insurity
  • speaker photo
    Burak Serdar
    Co-Founder, ConsentGrid

    Burak is one of the co-founders and the technical lead at Cloud Privacy Labs. He has more than 25 years of experience as a software engineer and recently left his position at Red Hat as Principal Software Applications Engineer. His work includes large scale back-end applications for distributed environments and open-source tools for enterpris...

  • speaker photo
    Jaymin Desai
    Third-Party Risk Offering Manager, OneTrust

    Jaymin Desai is a Certified Information Privacy Professional (CIPP/E , CIPM) and the Third Party Risk Offering Manager at OneTrust—the #1 most widely used privacy, security, and third-party risk technology platform. In this role, Desai oversees a global professional services team of privacy certified consultants focused on formulating efficie...

  • speaker photo
    Clint Sowada
    Director of Product Security, Collibra

    As the Director of Product Security at Collibra, Clint Sowada is responsible for delivering secure applications and protecting customer’s data. He has been in the security industry for nearly a decade and has proven track record in building secure SDLC programs at companies that range from endpoint protection to large scale cloud service prov...

  • speaker photo
    Ashish Popli
    Director of Product Security, Privacy & Compliance, UiPath

    Ashish thrives on pragmatism, innovation and building teams that deliver a promise. He started his career over 20 years ago, as a computer scientist in upstate NY, and since then has been learning the 'art of impossible', by wearing multiple hats, including writing code, conducting pen tests, finding and fixing security bugs, building and shi...

  • speaker photo
    Dr. Ben Edwards
    Sr. Data Scientist, Cyentia Insitute

    Dr. Benjamin Edwards joined Cyentia at the beginning of 2019 as hire #1. He was formerly with IBM Research, where he worked in applying advanced machine learning techniques to solve real world security problems and shaped the next generation of analytical security models. Before that he received his Ph.D. from the University of New Mexico wit...

  • speaker photo
    Jeff Raymond
    Sales Engineer, Avanan

    Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakesurfing (depending on the se...

  • speaker photo
    Justin Schluessler
    Data Protection Officer, Compassion International

    Justin Schluessler has served with Compassion International, a global child development non-profit, for 21 years. Starting in IT and then transitioning to Risk Management, Justin was the organization’s very first information security employee—building a comprehensive security and compliance program from the ground up. In his current role as ...

  • speaker photo
    Christopher Grillo
    VP & CISO, Formerly Deluxe Corporation
  • speaker photo
    Jerry Vergeront
    Attorney, Vergeront Law, PLLC

    Jerry Vergeront is the founder and attorney at Vergeront Law, PLLC. With over 25 years in Information Security before becoming an attorney, he brings an industry understanding to data security, privacy, and compliance law.

  • speaker photo
    Tim Danks
    VP, Risk Management & Partner Relations, Huawei Technologies (USA)

    As VP Risk Management & Partner Relations Mr. Danks is responsible for understanding and managing business risks in the context of cybersecurity and privacy across Huawei USA businesses and toward external stakeholders. Further, he is responsible for developing and enhancing partner relationships towards key external stakeholders across acade...

  • speaker photo
    Bruce Potter
    CISO, Expel

    Bruce Potter is the CISO at Expel. Previously, Bruce co-founded Ponte Technologies, a cybersecurity research and engineering company. He also served as the senior technical advisor to the members of President Obama’s Commission on Enhancing National Cyber Security, and co-founded the Shmoo Group in 1996.

  • speaker photo
    Gaurav Kapil
    Sr. Director, Information Security, Blue Cross and Blue Shield
  • speaker photo
    Anand Singh
    CISO, Alkami Technology

    Dr. Anand Singh is an information security executive with a history of bridging the gap between IT and business. He has led significant enterprise transformations on behalf of Fortune 20 companies. He has also driven success of several early stage companies and has shaped Information Security industry in his illustrious career. He is currentl...

  • speaker photo
    Drew Simonis
    VP & Deputy CISO, Hewlett Packard Enterprise

    Drew Simonis is a Vice President and serves as the Deputy CISO at Hewlett Packard Enterprise (HPE). He has worked in some of the largest and most complex environments in the public sector and the private sector with firms such as IBM, AT&T, EDS and Symantec. Prior to joining HPE, Drew spent 8 years as the CISO for Willis Group Holdings (now W...

  • speaker photo
    Robert Walden
    Chief Information Officer, Epsilon

    Robert Walden is the Chief Information Officer at Epsilon where he is responsible for cybersecurity, data center and public cloud infrastructure services, and network services. Additionally, Robert is responsible for providing all IT workplace services for a global user base. Robert has been delivering business value through technology for ov...

  • speaker photo
    Tianne Strombeck, Moderator
    Sr. Principal, Sr. Manager, Network Security, Verizon

    Tia Strombeck, MBA, CISSP, currently manages a risk management team focused on governance and cross-organizational programs. Tia has 20+ years experience in information security. She has focused on building cross-organizational relationships to help other business teams understand the importance and value of security initiatives. She has work...

  • speaker photo
    John Berisford
    Sr. Security Architect, SecureWorks
  • speaker photo
    Michael Blaha
    Sr. Director, Cloud Operations, NucleusHealth

    Michael Blaha is currently Sr. Director of Cloud Operations and Security at NucleusHealth. Throughout his career, Michael has made a focus of integrating security and cloud native principles into his delivery and operations teams in both the healthcare payer and healthcare Software-as-a-Service space.

  • speaker photo
    Ian Schneller
    CISO, Health Care Service Corporation

    A 20+ year information security veteran, Ian has served in many leadership positions to include CIO/CISO. Ian also led a multi-billion dollar mission charged with developing and operating advanced cyber capabilities for the Undersecretary of Defense (Intelligence), the DoD Chief Information Officer, and the Secretary of the Air Force. In this...

  • speaker photo
    Craig Swinteck
    IS Manager, Town of Castle Rock

    Craig Swinteck has a comprehensive background in IT operations and cybersecurity, with a career spanning across entrepreneurship, small businesses to global corporations, serving the public in local and federal government, and providing cybersecurity guidance in challenging industries such as Finance, Healthcare, and Manufacturing. Craig’s pa...

  • speaker photo
    Joe Dietz
    Network Security Architect, CenturyLink

    A technology focused senior level IT security professional with an excellent balance of business experience and knowledge of systems/network security. Always conducting oneself with integrity and ethical behavior following the motto of “Always do the right thing.”

  • speaker photo
    Diana Hennel
    CTO, Catalyst Corporation Federal Credit Union

    Diana Hennel is currently the Chief Technology Officer for Catalyst Corporate Federal Credit Union. In her role, Diana is responsible for the long-term strategic direction and implementation of technology strategy, security, and processes. She oversees the corporate’s network operations, technology development and information systems securit...

  • speaker photo
    Joshua Carlson
    Data Privacy and Technology Law Attorney, The Carlson Firm

    Joshua Carlson is a privacy lawyer but also is a technologist and understands sytem engineering, he has for a long time held his CISSP, CIPP, CIPP/G, CIPP/E and provides guidance and advisory to organizations around the world.

  • speaker photo
    Jay Jacobs
    Chief Data Scientist & Co-Founder, Cyentia Institute

    Jay is a Co-founder and Chief Data Scientist at Cyentia Institute, a research firm dedicated to advancing the state of information security knowledge and practice through data-driven research. Prior to Cyentia, Jay served as the Lead Data Analyst on the Verizon Data Breach Investigations Report and is the co-founder of the Society for Informa...

  • speaker photo
    Christopher Calarco
    Special Agent / Private Sector Coordinator, FBI Denver

    Special Agent (SA) Christopher A. Calarco has been in law enforcement for 25 years. He was previously a local and federal prosecutor, and has been an Agent for the FBI for over 20 years. SA Calarco has investigated a number of matters to include reactive violent crimes, gangs, organized crime, fraud and major theft. SA Calarco was also a m...

  • speaker photo
    Scott Bennett
    VP, Applications, Lear Corporation

    Scott Bennett leads Lear Corporation’s global applications as the Vice President of Applications, Deployment and Development. Prior to joining Lear Corporation, he served as the Global Chief Information Officer to International Automotive Components Group, a $6 billion Tier 1 automotive supplier. Before that, Scott was the North America CIO...

  • speaker photo
    Zahira (Zah) Gonzalvo
    SVP and Chief Information Security & Privacy Officer, Flagstar Bank

    Zah joined Flagstar Bank Information Security & Privacy team in 2018 as a Senior Vice President and Chief Information Security & Privacy Officer. Prior to her CISO role, Zah was the head of ERM and the Operational Risk teams since 2013 when she joined Flagstar Bank. Zah was the Strategy Leader for Diversity and Inclusion (D&I) for the Bank si...

  • speaker photo
    Janet Lawless
    CEO & Founder, Center for Threat Intelligence

    Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge holistic threat intelligence program including assessments, consulting and training. Janet’s former leadership roles at Microsoft and Cisco, creating and managing global programs focused on compliance and securi...

  • speaker photo
    Jason Rader
    Director, Network & Cloud Security, Insight Cloud + Data Center Transformation

    Jason Rader joined Insight in 2015 as the National Practice Director of Security. He is charged with managing Insight’s security portfolio including strategic consulting offerings and technology focused solutions. Jason has over 20 years experience and has a deep understanding of the skills, tools, and methodologies required to deliver true s...

  • speaker photo
    Dennis Hodges
    CIO, Inteva Products

    Dennis Hodges is the Chief Information Officer for Inteva Products, LLC, a position he has held since March 1, 2008. Prior to this assignment Dennis was Chief Information Officer for Delphi Interiors and Closures. Prior to joining Inteva, Dennis served as the Global Business Systems Director at Huntsman Corporation. He began his career at She...

  • speaker photo
    Tammylynne Jonas
    CIO, Self Esteem Brands

    Tammylynne Jonas (TLJ) is a seasoned digital and technology executive with almost 20 years of experience leading large, international teams. TLJ is the Global CIO for Self Esteem Brands, the parent company for Anytime Fitness. In this role, TLJ has responsibility for multiple franchise brands, with almost 5000 locations across almost 40 count...

  • speaker photo
    Brenden Smith
    CISO, FirstBank

    Brenden Smith is the Chief Information Security Officer at FirstBank. Having spent the last 10 years at FirstBank he is passionate about their community involvement and “Banking for Good” philosophy. In his current role Brenden is focused on aligning security with the needs of the business to help drive better business outcomes through better...

  • speaker photo
    Christopher Riley
    CISO, Ntirety (formerly HOSTING.com)

    Chris is a seasoned IT Strategist with 20 years of leadership experience in Project & Program Management, Technology & Infrastructure, and Security & Governance. He creates and scales internal technology operations for sustained hyper-growth, builds security operations for Managed Security Provider and spearheads Compliance certification pro...

  • speaker photo
    Ronald Williamson
    Information Security Officer, Medical College of Wisconsin

    Ronald Williamson has over 20 years’ experience in Information Technology and Information Security. He has held roles within the banking, retail, and healthcare industry. Currently, he is Information Security Officer at the Medical College of Wisconsin. Driven by a belief in promoting a strategic vision and utilizing best practices to accompl...

  • speaker photo
    Bill Meredith
    Cloud Security Engineer, Charles Schwab

    Bill Meredith has over 25 years of experience designing, implementing, and supporting IT solutions for large enterprises, of which 10 years have been in the cybersecurity area. He is a cybersecurity professional with experience across a diverse set of cyber domains and industries such as Cloud Security, Financial, Forensics Investigation, Te...

  • speaker photo
    Panel Discussion
  • speaker photo
    David Sonheim
    Cybersecurity Advisor, DHS / CISA
  • speaker photo
    Kevin Beaver
    Independent Information Security Consultant, Principle Logic, LLC

    Kevin Beaver, CISSP is an information security consultant, writer, and professional speaker with Atlanta, GA-based Principle Logic, LLC. • With over 31 years in IT and 25 years in security, Kevin specializes in independent security assessments and virtual CISO consulting work to help businesses uncheck the boxes that keep creating a false sen...

  • speaker photo
    Doug Boykin
    Solutions Engineer, OneTrust

    Doug Boykin serves as a Privacy Engineer at OneTrust – the #1 most widely used privacy, security and third-party risk technology platform. In his role, Boykin advises many of the world's leading organizations on CCPA, GDPR and ePrivacy (Cookie Law) solution implementations, focused on formulating efficient and effective responses to data prot...

  • speaker photo
    John Callaghan
    Sr. Security Engineer in SOC Operations, Forensics, and Threat Hunting, Pulte Financial Services

    As a security practitioner of 30 years, Jack's experience began in the 80s with commercial and military venues, and expanding in early days of the Internet. It continued to be shaped by the growth of malware and data breaches as global threats against business, nations, and individuals. While developing some of the earliest proactive IPS syst...

  • speaker photo
    Patrick Benoit, Moderator
    CISO, Brink's Inc.

    Patrick was previosuly the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting comp...

  • speaker photo
    Jeff Kenney
    CIO/CISO, Grasshopper Bank

    30+ years IT and Information Security practice. CIO/CISO at the first digital commercial bank in the US. Previously served as the Global Head of Wealth Technology for Thomson Reuters wealth management business line. Lead a team of over 380 developers and technologists supporting the TR BETA, BETA Online, and Thomson One products. Previously t...

  • speaker photo
    Dale Drew
    Chief Security Officer, Zayo Group

    Dale is currently the Chief Security Officer of Zayo Group, Inc, a global telecommunications service provider based in Boulder, Colorado. Dale is an accomplished and experienced corporate security executive with 31 years of experience in developing critical global security programs, having worked in Federal/State Law Enforcement and with Inte...

  • speaker photo
    Rob Walk
    Sr. Security Engineer, Tenable

    Rob is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying, and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable, he helps organizations reduce risk due to Cyber Exposure.

  • speaker photo
    Kelce Wilson
    General Counsel, InfraGard North Texas

    Kelce S. Wilson was in the U.S. Air Force, both active duty and reserves, retiring as a Lieutenant Colonel. He has a B.S., M.S. and PhD in electrical engineering, an M.B.A., a J.D., US PTO patent practitioner registration, and is a certified privacy professional with CIPP-US, CIPP-E, and CIPM. During his military and engineering career he wor...

  • speaker photo
    TJ Gonen
    Co-Founder , Protego Labs

    TJ is a subject matter expert on cloud security who has decades of experience solving enterprise problems with innovative solutions. His current project, Protego Labs, is two years in the making. With Protego, TJ has developed an award-winning platform that automates security for serverless applications. The combination of reduced development...

  • speaker photo
    Book Signing
  • speaker photo
    Parthasarathi Chakraborty
    Director, Security Architecture, Bank of Montreal

    Partha has over 20 years of cyber security leadership experience in financial services industry. An active speaker and panelist in cyber security conferences around the world. Very much passionate about learning new technologies and writing on recent cyber trends. Currently heading up infrastructure security architecture for Bank of Montreal....

  • speaker photo
    Rob Maynard
    Solutions Architect, Trend Micro

    Rob Maynard is a sales engineer and DevOps SME for Trend Micro. He has been in the IT field for over 11 years working with various cloud, automation, and virtualization technologies. He lives in Michigan with his wife and two children.

  • speaker photo
    Jennifer Reicherts
    Certified Ethical Hacker, Healthcare Information Security Analyst

    Jennifer Reicherts is an Information Security Analyst with over 16 years of experience working in the Healthcare and Public Health sector. Her passions include IoT cybersecurity and threat intelligence. Jennifer is a Certified Ethical Hacker (CEH) and an Executive Board Member of InfraGard Minnesota Member Alliance.

  • speaker photo
    Michael Hiskey
    Chief Marketing Officer, Avanan

    Michael Hiskey is a long-time data, analytics, cloud, and AI industry executive. An accomplished writer and speaker, he has published articles in Forbes, InfoWorld, TechCrunch, ITProPortal, etc. He spends his time thinking about how these innovations impact B2B organizations and their customers. Michael has a background in enterprise technolo...

  • speaker photo
    Rebecca Harness
    VP & CISO, Quickbase

    Rebecca Harness is VP & Chief Information Security Officer for Quickbase. Rebecca has an established 25-year career in information technology with the past twelve years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technology startups over the course of h...

  • speaker photo
    Scott Hogg
    Chair Emeritus, Rocky Mountain IPv6 Task Force

    Scott Hogg is CTO and a co-founder of HexaBuild.io, an IPv6 consulting and training firm. He is a CCIE #5133 and CISSP #4610 with over 25 years of network and security experience. He is the author of the a Cloud Guru course, “Rapidly Deploying IPv6 on AWS.” Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member o...

  • speaker photo
    Joseph Marentette
    MIM, Network Engineer 3, Washington University in St. Louis

    Joe Marentette, MIM (WashU IT Network Engineer 3), has worked for the university for over 20 years. Joe leads the design and engineering of the WashU enterprise network and the research network. Joe has a long history of collaboration with the Information Security department, and most recently built the data collection network to capture netw...

  • speaker photo
    Eddie Ho
    Former CIO & COO, Los Alamos National Bank

    Eddie Ho is the former COO and CIO for Los Alamos National Bank in New Mexico and CIO and CISO at OmniAmerican Bank in Texas. Prior to banking leadership roles, Eddie was in Technology Risk Management, cyber security, and Enterprise Architecture for IBM, Dell, Grant Thornton, and Blockbuster. Eddie is a board member for ePayAdvisors and is a ...

  • speaker photo
    Marc Ashworth
    CISO & SVP, First Bank

    Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter ...

  • speaker photo
    Frank Leyva
    Systems Engineer, Radware

    Frank Leyva is a Systems Engineer with Radware, a market leader in cybersecurity with a focus on Network and Application level availability, and security. Prior to that, he was a subject matter expert in network security defense with a leading anti-malware company, performing advanced threat analysis, deep packet inspection, and creating hack...

  • speaker photo
    Rod Aday, Moderator
    Director, Information Risk Management, Verizon

    Rod Aday is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built Information Security and Business Continuity Programs from the ground up at three different financial ...

  • speaker photo
    Mark Nagiel
    CISO, Supreme Lending

    Mark is currently serving as the Chief Information Security Officer at Supreme Lending. Prior to Supreme Lending, Mark Served as the CISO at Prime Lending, Head of Information Security at MetroPCS (a T-Mobile division), VP of Information Technology and VP of Information Security at InCharge Institute, Head of NEC Information Security Consulti...

  • speaker photo
    Beth Young
    Sr. Security Incident Response Consultant, Aflac

    Beth Young has 20 years of cyber security experience. She is currently a Senior Security Incident Response Consultant with Aflac. Beth has previously worked for a financial services company and for one of the Information Sharing and Analysis centers. She just completed her Masters in Applied Data Science from Syracuse University. She has prev...

  • speaker photo
    Christopher McMahon
    Special Agent, Global Investigative Operations Center, United States Secret Service

    Chris McMahon is a Special Agent for the United States Secret Service. Prior to joining the Secret Service, Chris was a Prince George’s County, MD Police Officer. Chris is a well-seasoned criminal investigator specializing in cyber-enabled financial fraud, money laundering, credit card/ID fraud among other crimes. Chris began his Secret Servi...

  • speaker photo
    Siam Luu
    Lead Security Architect, Colorado Judicial Department

    Siam Luu has worked information security for over 8 years beginning as an analyst, graduating to an engineer, and currently is employed as a security architect. He has worked in both the public and private sectors in a myriad of different careers and locations in both technical and non-technical roles. At present, he has his CISSP certificati...

  • speaker photo
    Melissa Van Buhler
    Cybersecurity & Data Privacy Attorney, Focal Law

    Melissa’s legal practice focuses on cybersecurity, privacy, and regulatory compliance. Her key strength is helping organizations achieve cyber resiliency through legal and regulatory compliance.

    Before joining Newman Du Wors in 2018, she served more than 15 years as a Judge Advocate General officer in the United States Army where she s...

  • speaker photo
    Quin DeVries
    UX Researcher, Automotive Cybersecurity, Mitsubishi Electric Automotive America

    Quin DeVries is exploring the realm where technology and human behavior meet to create engaging user experiences. As a curious researcher, he is eager to tackle the challenges of today and the future.

    His research background includes topics in design thinking and ideation in engineering, managerial accounting and neuropsychology, and ...

  • speaker photo
    Alan Berry
    Vice President, Cybersecurity, Centene Corporation

    Alan Berry is the Vice President for Cybersecurity at Centene Corporation. He leads the Cyber Incident Response, Security Strategy, and Threat and Vulnerability Management teams, as well as the Business Resilience and Crisis Management teams. Alan brings 30 years of experience in cyber operations, communications, and command and control. Prio...

  • speaker photo
    Matthew Clapham
    Director of Cybersecurity, GE Healthcare

    Matt Clapham is a Directory of Cybersecurity at GE Healthcare. He and his team make products more secure.

  • speaker photo
    Michael Rogers
    Director, Cyber Defense, Optum / UHG

    Michael Rogers is on a mission to make organizations more secure by executing on the basics of cybersecurity. He is a certified nerd with nearly 20 years of IT experience, and has spent the last decade developing his understanding of information security, business strategy, and communications. Mike earned his MBA from the Carlson School of Ma...

  • speaker photo
    David Stauss
    Partner, Husch Blackwell LLP

    David is the leader of Husch Blackwell’s national privacy and data security practice group. Accredited by the International Association of Privacy Professionals as a Fellow of Information Privacy, Certified Information Privacy Professional/United States, and Certified Information Privacy Technologist, David brings to the table a deep engageme...

  • speaker photo
    Marc Harwin
    Information Security Professional, Harwinet LLC

    Marc Harwin is an Information Security Professional with more than 20 years of experience. He has worked to improve Information Security at multiple Fortune 500 organizations with a focus on:
    - Security Operations
    - Vulnerability Management
    - Incident Response

    Marc has a Master of Science in Information Systems from W...

  • speaker photo
    Preston Bukaty
    GRC Consultant / Privacy & Compliance Specialist, IT Governance USA Inc.

    Preston Bukaty is an attorney and consultant working for IT Governance USA. He specializes in data privacy GRC projects, from data inventory audits to gap analysis, contract management, and remediation planning. His compliance background, and experience with operationalizing compliance for a variety of industries, give him a strong understand...

  • speaker photo
    Jeff Wilbur
    Technical Director, Online Trust Alliance, Internet Society

    Jeff Wilbur is the Technical Director of the Internet Society’s Online Trust Alliance. He is responsible for integrating, developing, and extending the OTA initiative within the Internet Society’s overall mission and objectives. He has over 25 years of experience in high technology, all focused on bringing new, industry-transforming communica...

  • speaker photo
    Selim Aissi
    SVP and CISO, Ellie Mae

    Selim Aissi is Senior Vice President & Chief Security Officer at Ellie Mae’. He is responsible for Ellie Mae’s Security Engineering, Operations, Strategy and Information Technology Risk & Compliance. Before joining Ellie Mae, Selim was the Vice President of Global Information Security at Visa. In that role, Selim transformed Visa’s informatio...

  • speaker photo
    Sudesh Gadewar
    Security Engineer, Ellie Mae

    Sudesh Gadewar is Sr Staff Security Engineer at EllieMae. Sudesh holds 10+ years of experience in security where passion is in offense and defense of security. Sudesh holds various Security Certifications which he use as attestations to his skillset. His core area of expertise is in product and application security, where he build SSLDC lifec...

  • speaker photo
    Janelle Hsia
    Director of Privacy and Compliance, American Cyber Security Management

    Janelle Hsia is a trusted advisor for strategic and tactical decision making within organizations of all sizes. She brings a diverse background with strong leadership, technical, and business skills spanning 20 years of experience in the areas of project management, IT, privacy, security, data governance, process improvement, and software dev...

  • speaker photo
    Carlin Dornbusch
    President, American Cyber Security Management (ACSM)

    Carlin Dornbusch is an innovative leader in Cybersecurity and Data Privacy. His company, American Cyber Security Management, brings proven methods, best-in-class tools, and deep knowledge of data privacy and security standards to every client engagement. ACSM excels at creating custom privacy and security programs to meet the demands of moder...

  • speaker photo
    Ethan Sailers
    Solutions Engineer, OneTrust

    Ethan Sailers serves as a Privacy Engineer at OneTrust, the largest and most widely-used dedicated privacy management technology platform to operationalize privacy, security, and third-party risk management. In his role, he advises companies large and small on EU GDPR, California Consumer Privacy Act (CCPA), Brazil LGPD, and hundreds of the w...

  • speaker photo
    Carlos Garcia
    Enterprise Architect, Office of CIO, Optum

    Carlos has specialized in Identity and Access Management systems for the past 20 years. His experience has been in the architecture and implementation of large enterprise and consumer IAM systems. Most of his career has been spent designing and running the large scale IAM systems for UnitedHealth Group. His experience and leadership led him t...

  • speaker photo
    Tom Muehleisen
    Director of Cyber Operations, Norwich University Applied Research Institutes

    Tom Muehleisen, CISSP and Retired Army Lieutenant Colonel, is a proven leader in cybersecurity. He is currently the Director of Cyber Operations for NUARI, a non-profit focused on improving our nation’s cybersecurity. He has a rich emergency management background as a National Guardsman, ranging from fighting fires to writing Washington State...

  • speaker photo
    Dave Ruedger
    CISO, RMS

    Dave Ruedger is the Chief Information Security Officer for Risk Management Solutions based out of Newark, CA. RMS is a premier provider of catastrophe risk models for the insurance industry that help organizations forecast losses for hurricane, earthquake, flood, wildfire, terrorism and cyber risk in a cloud hosted SaaS environment. Dave ho...

  • speaker photo
    Kevin Paige
    CISO, Flexport

    Kevin Paige is the Chief Information Security Officer (CISO) at Flexport, provider of the Operating System for Global Trade. Prior to Flexport, Kevin was the CISO at MuleSoft, and brings over 20 years of leadership in delivering solutions and programs that optimize security, compliance and technical operations for both the private and public ...

  • speaker photo
    John Heasman
    CISO, Chegg

    John Heasman is the CISO of Chegg, the leading student-first connected learning platform where he is focused on proactive approaches to building secure software. Prior to Chegg, John was the Deputy CISO at DocuSign. He has presented at Black Hat, DEF CON, OWASP AppSec and other industry forums on a diverse range of topics from web application...

  • speaker photo
    Maarten Van Horenbeeck
    CISO, Zendesk

    Maarten Van Horenbeeck is Chief Information Security Officer of Zendesk since March 2018. He has also been a Board member of the Forum of Incident Response and Security Teams (FIRST) since 2011, and is the Lead Expert to the IGF Best Practices Forum on Cybersecurity. From July 2015 to March 2018, he served as Vice President, Security Engineer...

  • speaker photo
    Rinki Sethi
    VP & CISO, Twitter

    Rinki Sethi is an information security executive known for change, technical and thought leadership across security and enablement disciplines. She is a veteran in the cyber security domain and throughout her career has built and matured technical security teams across security operations, product security, application security, security arch...

  • speaker photo
    Gary S. Chan
    System VP & CISO, SSM Health

    Gary S. Chan helps organizations innovate, stay secure, and meet compliance using information security as the vehicle. He has architected anti-fraud systems for state agencies, led the information security teams for a large-cap technology company, leads the information security department for a large multi-state healthcare system, owns an inf...

  • speaker photo
    Jonathan Cran
    Head of Research , Kenna Security

    Jonathan Cran is an information security expert based in Austin, Texas. He’s a principal at the strategic consulting firm Pentestify, and founder of the the open security intelligence platform, Intrigue. His passion is security assessment, architecting systems to measure and ultimately prevent security incidents. Currently, he’s building a wo...

  • speaker photo
    Ann Nagel
    Institutional Privacy Officer and former UW Associate CISO, University of Washington

    Ann Nagel is the Associate Vice Provost for Privacy, University Privacy Officer, and European Union General Data Protection Officer for the University of Washington (UW). She is responsible for developing a cohesive strategy for the humanitarian and legal aspects of privacy across the UW. To help ensure privacy is included in the design of th...

  • speaker photo
    Lynette Crane
    Founder & CEO, Quiet Brilliance Consulting LLC

    Lynette Crane, MA, is a Minneapolis-based mentor to introvert CEOs, an acclaimed national speaker, corporate trainer, executive coach and author, and Founder of Quiet Brilliance Consulting LLC Trained in psychology, she has more than 30 years' experience in her field. Lynette Crane and Quiet Brilliance Consulting help smart companies who are ...

  • speaker photo
    Mark Dargin
    Director, Security & Architecture, Qualfon

    Mark Dargin is the Director of Security Architecture at Qualfon Inc., an organization with over 16,000 employees across North America, South America, and Asia. Mark has over 19 years of experience designing, managing, and securing complex WAN and LAN infrastructures. He is a member of the Michigan Cybersecurity Civilian Corps, FBI citizen’s a...

  • speaker photo
    Swathi Joshi
    Sr. Technical Program Manager - Incident Response, Netflix

    Swathi Joshi is a Senior Technical Program Manager, on the Security Incident Response Team at Netflix where she works on advancing the crisis management program and maturing the incident response function. Previously she worked at Mandiant as an Engagement Manager and as an Escalations manager, managing and solving most critical technical eff...

  • speaker photo
    Sarah Lange
    CISO, Allgress, Inc.

    Sarah has over 23 years of experience in Information Security Management, Risk Management, Third Party Oversight, and Governance in both internal and consulting roles. She is an experienced leader with a background in design, and implementation of GRC and Security programs working with technologies that enable these programs to be effective. ...

  • speaker photo
    Zach Turner
    Enterprise Sales Engineer, Mimecast

    Zach joined Mimecast in 2017 as an Enterprise Sales Engineer in Denver, CO. Previously, Zach worked in the enterprise space for AirWatch by VMware, where he focused on cloud-based Mobile Device Management solutions involving mobile security, content management, and email management. Most recently, he worked for Fuze, Inc., a $1 billion UCaaS ...

  • speaker photo
    Christopher Frenz
    AVP, Information Security, Interfaith Medical Center

    Christopher Frenz is the AVP of Information Security for Interfaith Medical Center, where he worked to develop the hospital’s information security program and infrastructure. Under his leadership, the hospital has been one of the first in the country to embrace a zero trust model for network security. Christopher has also played a role in pus...

  • speaker photo
    Holger Weeres
    Executive Account Manager, baramundi software USA, Inc.

    Holger is a seasoned UEM expert with over 20 years of experience in endpoint Automation for company of all sizes. He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company's general challenges and common obstacles in ach...

  • speaker photo
    Griffin Weaver
    Attorney, Technology and Transactions Counsel, USAA
  • speaker photo
    Dr. Jason Edwards
    Cybersecurity Regulatory Testing Lead, USAA

    Jason Edwards has over 20 years of IT/Cybersecurity experience and currently works for USAA researching, developing and executing enterprise cybersecurity assurance testing. Jason is a 22-year veteran of the US Army and has served multiple tours of duty in Iraq, Afghanistan, and elsewhere. Jason is currently awaiting final approval for his do...

  • speaker photo
    Kristie Pfosi
    Sr. Manager, Automotive Cybersecurity, Mitsubishi Electric Automotive America

    Kristie Pfosi stands at the forefront of one of automotive’s greatest challenges: cybersecurity. A well-respected policy maker and program manager with deep technology expertise, Kristie has been a champion for best practices in cybersecurity for over a decade as a technical intelligence officer at the CIA and as an OEM employee, most notably...

  • speaker photo
    Amy Chu
    Sr. Director, Automotive Product Security, Harman

    Amy Chu is Senior Director, Automotive Cybersecurity at HARMAN, a wholly-owned subsidiary of Samsung Electronics Co., Ltd. HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide, including connected car systems, cyber security solutions, audio and visual products, enterprise automati...

  • speaker photo
    Jennifer Tisdale
    Associate Principal, GRIMM, a Cyber Research, Consulting & Education firm

    Jennifer Tisdale is the Associate Principal for Embedded Systems and Advanced Transportation Security Programs at GRIMM, a cybersecurity research and engineering firm. Previously, Jennifer served as R&D Program Manager of Vehicle Product Cybersecurity at Mazda North America. While at Mazda, Jennifer bridged the gap between R&D and Government ...

  • speaker photo
    KC Condit
    CISO, G6 Hospitality, LLC

    KC Condit has been an information security practitioner and IT leader for 30 years with a diverse resume including hospitality, financial services, retail, and private, post-secondary education. He is currently the CISO for G6 Hospitality, LLC, and is responsible for information security, data privacy, IT risk management, and IT compliance fo...

  • speaker photo
    Sonja Torseth
    Sr. Training Consultant, Kalles Group

    Sonja Torseth is a Senior Training Consultant at Kalles Group. She designs communications strategy and learning experiences with a sharp focus on end-goals: to affect staff behavior change, especially for security risk mitigation. She has more than 10 years’ experience in communications, learning design, and project delivery, and holds a B.S....

  • speaker photo
    Jeanette Rogers
    Director of Learning, Kalles Group

    Jeanette Rogers is the Director of Learning at Kalles Group, helping companies build world-class security awareness and training solutions. She has over a decade of experience in design, development, and delivery of global corporate technology-based programs and holds a Master's degree from Stanford University.

  • speaker photo
    Abigail McAlpine
    PhD Cybersecurity Researcher, Secure Societies Institute - University of Huddersfield

    Abigail McAlpine is a CyberSecurity Researcher at the Secure Societies Institute at the University of Huddersfield. Her research is specialised in PII data published on digital systems that leads users to become vulnerable to a number of threats to their identity and safety long-term.

  • speaker photo
    Andy Purdy
    Chief Security Officer, Huawei Technologies USA

    Andy is Chief Security Officer for Huawei Technologies USA, overseeing Huawei USA's cybersecurity assurance program and supporting Huawei’s global assurance program. Andy is the Huawei global lead for the East-West Institute Global Cooperation in Cyberspace Initiative and serves on the Steering Committee of The Open Group Trusted Technology F...

  • speaker photo
    Elvis M. Chan
    Supervisory Special Agent, Squad CY-1, National Cyber Center, FBI San Francisco

    Elvis Chan is a Supervisory Special Agent (SSA) assigned to FBI San Francisco. SSA Chan manages a squad responsible for investigating national security cyber matters. With 14 years in the Bureau, he is a decorated agent who is recognized within the Intelligence Community as a cyberterrorism expert. SSA Chan was the lead agent on significant c...

  • speaker photo
    Mary Chaney
    Chairwoman, CEO & President, Minorities in Cybersecurity, Inc.

    Mary N. Chaney, Esq., CISSP, CIPP/US has over 30 years of experience in Information Security, Privacy and Risk Management. She graduated from Xavier University with a B.S.B.A in Information Systems and became a licensed attorney in the State of Texas in 1999 after obtaining her J.D. from Texas Southern University - Thurgood Marshall School of...

  • speaker photo
    Tara Schaufler
    Information Security Awareness and Training Program Manager, Princeton University

    Tara Schaufler is the Information Security Awareness and Training Program Manager at Princeton University. Tara has worked at Princeton for 17 years, spending the last 10 focusing on training and technical communications, and over the past five years has built a robust security awareness and training program from the ground up. She is a membe...

  • speaker photo
    David Sherry
    CISO, Princeton University

    David Sherry is the CISO at Princeton University, with university-wide responsibility and authority regarding matters of information security and information risk. He is tasked with the development and maintenance of Princeton's information security strategy, policies and best practices, security training and awareness programs, as well as on...

  • speaker photo
    Steven Lentz
    Head of Security, Mojio

    Steven is the Head of Security, CISSP, CIPP/US. He has presented for SC Magazine and in Las Vegas regarding Cybersecuirty and Security Awareness.

  • speaker photo
    Paola Saibene
    Principal, Teknion Data Solutions

    Paola Saibene has been a technologist for 26 years, having held multiple C-suite roles (CIO, CTO, CSO) in large, global organizations, having received national awards in innovation and cybersecurity, and having led thousands of her own team members to fulfill business missions, and thrive despite constraints. She has also worked as a Data Pri...

  • speaker photo
    Benjamin Brooks
    Founder & President, Praevalidis

    Benjamin D. Brooks is a cybersecurity professional United States Navy Veteran and Drilling Reservist, with over 20 years of information and cyber security experience across multiple industries, local, and the federated government. A CISSP and Ponemon Institute Distinguished Research Fellow, his work as founder of Preavalidis, LLC is based ar...

  • speaker photo
    Abhijit Solanki
    Founder & Managing Director, Whiteboard Venture Partners

    Abhijit Solanki is the founder of Whiteboard Venture Partners, an early stage venture capital firm helping entrepreneurs achieve their whiteboard dreams.

  • speaker photo
    Ann Marie Mortimer
    Managing Partner, Los Angeles Office, Hunton Andrews Kurth LLP

    Mortimer is the managing partner of Hunton Andrews Kurth LLP’s Los Angeles office and co-head of the firm’s commercial litigation practice. Her practice is cross-disciplinary and includes significant business and class action consumer claims litigation experience and crisis management in relation to data breach, consumer related labeling clai...

  • speaker photo
    Kenneth Hartman
    Instructor, The SANS Institute

    Kenneth G. Hartman is a security engineering leader in Silicon Valley. Ken's motto is "I help my clients earn and maintain the trust of their customers." Ken is an Instructor for the SEC545 Cloud Security Operations course offered by the SANS Institute. Ken has worked for a variety of Cloud Service Providers in Security Architecture, Engineer...

  • speaker photo
    Scott Reynolds
    Industrial Security Manager, Johns Manville

    Scott Reynolds is the Industrial Security Manager at Johns Manville. He has over 14 years of Industrial Engineering experience and is an active member of the OT / IT community. Scott has held leadership roles in the International Society of Automation (ISA) for the last four years and is currently an Executive Board Member. Scott has an elect...

  • speaker photo
    Chris McLaughlin
    Information Security Officer, Johns Manville

    Chris McLaughlin is the Information Security Officer at Johns Manville, a Berkshire Hathaway company. JM is leading global manufacturer of insulation, roofing and glass fibers products. Chris has over 20 years of security and infrastructure experience leading the vision for a highly complex manufacturing environment. Chris has a passion for i...

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government ...

  • speaker photo
    Jack Freund, PhD
    Director, Risk Science, FAIR Institute

    Dr. Jack Freund is a leading voice in cyber risk measurement and management. He is an expert at building relationships to collaborate, persuade, and sell information risk and security programs. Jack is currently serving as Director, Risk Science at RiskLens and previously worked for TIAA as Director, Cyber Risk. Jack holds a PhD in Informatio...

  • speaker photo
    Nick Selby
    Director, Cyber Intelligence and Investigations, NYPD

    Nick is the Director of Cyber Intelligence and Investigations for the New York City Police Department. He serves the NYPD's Intelligence Bureau, helping advise the strategy and policies that govern how the Bureau assesses and manages investigations and intelligence in the Cyber domain. For nearly a decade Nick has served the public as a Texas...

  • speaker photo
    Serge Borso
    Community Instructor, SANS Institute

    Serge Borso is the founder and CEO of SpyderSec, an organization specializing in penetration testing, security awareness training, and OSINT. He also resides on the board of directors for the Denver OWASP chapter and teaches with the SANS Institute. He is an expert in a variety of information security fields, having served in many roles in th...

  • speaker photo
    Michael Landewe
    Co-Founder & Chief Privacy Officer, Avanan

    Before cofounding Avanan in 2014, Michael Landewe had over 20 years of internet startup experience, starting with cofounding an ISP in 1996. He was an early employee of Network Physics, an internet traffic performance company that was one of the first technology companies to develop detection response for the Blaster worm. As a research engin...

  • speaker photo
    Don Peterson
    Supervisory Cybersecurity Analyst, Federal Reserve Board

    Don Peterson is a Supervisory Cybersecurity Analyst for the Federal Reserve System, based out of the Federal Reserve Bank- St. Louis. He is tasked with overseeing the supervision of the largest and most systemically important financial institutions in the United States with assets of $100B+. His duties also include participating in the develo...

  • speaker photo
    Daniel Stiegman
    Cyber Threat Intelligence Engineer, Pathfinder Intel

    Daniel is a 15-year Intelligence Professional, with a career in US Army Intelligence and the National Geospatial Agency. His primary focus has been in Counter-Terrorism, Asymmetrical Warfare, and Intelligence Analysis methodology. Daniel was a national-level instructor in All Source Intelligence Analysis and has written several published whit...

  • speaker photo
    Craig Reeds
    Cybersecurity Compliance Manager, Electric Power Systems International

    Craig Reeds has been involved with Cybersecurity since before there was a name for it. During his time in the IT field, he has been responsible for Cyber Security, Cyber Vulnerability Assessments, Penetration Testing, Risk Identification and Management, Business Continuity/Disaster Recovery and Change Management. In his role as a NERC Complia...

  • speaker photo
    Tina Hauri
    Former CISO, City of Chicago; President, Bradford Garrett Group

    Tina is President of the Bradford Garrett Group. Her prior roles include CISO for the City of Chicago, Global CISO for AON, CIO for Kudoz.com, Director of Enterprise Risk Management for Discover Financial Services, and Global IT Security Program Manager for Perot Systems at Swiss Bank. As co-founder of the Chicago CISO Networking group, Presi...

  • speaker photo
    Rhia Dancel
    Technical Manager, Information Security, NSF International

    Rhia is an ISO 27001 and 9001 Lead Auditor and OSINT PenTester for NSF and has previously held several auditing and technical positions in the information security and Pharma quality sectors. Rhia has completed technical writing work and audits for NSF throughout North America, working directly with customers onsite and remotely developing se...

  • speaker photo
    Tony Giles
    Business Leader, Information Security, NSF International

    Tony is an ISO 27001, ISO 20000 and ISO 9001 Lead Auditor and OSINT PenTester for NSF. Currently, Tony is a Business Leader of Information Security, also having served as Director of Operations, Director of Business Development, and Service Delivery Manager. Tony has conducted audits globally for over 10 years and worked on large-scale securi...

  • speaker photo
    Merlin Namuth
    Cyber Risk Advisory Board Member, Pepperdine University

    Merlin Namuth has spent over 20 years focused in security. His experience includes building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions. Namuth serves on the cyber risk advisory board at Pepperdine Univers...

  • speaker photo
    Alexis Womble
    Sr. Threat Intelligence Analyst, BAE Systems

    Alexis Womble is a Sr. Threat Intelligence Analyst at BAE Systems. Previously, she was a Cybersecurity Intelligence Analyst at Express Scripts, where she interned for a year in an EOCC automation development role, Attack Simulation role, and an Intelligence role. She is also a recent grad from Missouri Baptist University, where she can still ...

  • speaker photo
    Matthew DeChant
    CISO, Tempus, Inc.
  • speaker photo
    John Fatten
    Technical Solutions Architect, Cisco Umbrella
  • speaker photo
    Ann Marie Isleib
    VP, Enterprise Sales, Okta, Inc.
  • speaker photo
    Linda Marcone
    Sr. Director, Information Security, Serta Simmons Bedding, LLC

    Linda Marcone has 15+ years of Information Security, Governance, Risk & Compliance, and Fraud Prevention experience. Throughout her career, she has built and transformed Information Security Programs and Teams, worked with FBI & NCFTA to take down an international fraud ring (APT), promoted diversity in the workplace, and acted as a mentor. ...

  • speaker photo
    Samuel Blaney
    Director Cybersecurity, Georgia Technology Authority

    Sam is the Director of Cybersecurity & Governance Risk and Compliance (GRC) at GTA and is a Chief Warrant Officer (CW3) retired. Georgia Technology Authority (GTA) Office of Information Security (OIS) is the premier strategic partner for all state and local government organizations in support of a strong State Cyber Security posture. GTA OIS,...

  • speaker photo
    Adam Shostack
    Leading Expert on Threat Modeling, Shostack & Associates

    Adam is a leading expert on threat modeling, and a consultant, entrepreneur, technologist, author and game designer. He's a member of the BlackHat Review Board, and helped create the CVE and many other things. He currently helps many organizations improve their security via Shostack & Associates, and advises startups including as a Mach37 Sta...

  • speaker photo
    William Lidster, PhD
    CISO, AAA Washington

    William serves as the leader of AAA Washington’s information security and compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.  William has been with AAA Washington since August of 2...

  • speaker photo
    Bryce Verdier
    Sr. Software Engineer, GroupOn

    Bryce Verdier (CISSP, CEH) is currently a Senior Software Developer at GroupOn. In previous roles, he’s also been a Systems Engineer with an automation and DevOps minded focus, and an Information Security Engineer, focusing on host-based security.

  • speaker photo
    Tamika Albert-Williams
    Undergraduate IT Program Adjunct Faculty, Capella University - School of Business and Technology

    With a passion for addressing the human element of cybersecurity, Tamika Albert-Williams has 10+ years’ experience in information technology and security. She began her career in IT project management. She is currently a Management Consultant and adjunct IT program faculty at Capella University. She specializes in GRC; and IS program strategy...

  • speaker photo
    Sherron Burgess
    SVP & CISO, BCD Travel
  • speaker photo
    Ken Foster
    Head of Global Cyber Risk Governance, First Data Corporation
  • speaker photo
    Donna Gallaher
    President & CEO, New Oceans Enterprises
  • speaker photo
    Austin Rappeport
    Blue Team Coordinator, Zurich Insurance Group

    Austin Rappeport is a Threat Defense Consultant working for Zurich Insurance on their global cybersecurity team. His team is responsible for managing Zurich's SIEM and integrating Zurich's security toolkit to allow for the automated detection of suspicious or malicious activity across Zurich's network. Previously, Austin worked for the Federa...

  • speaker photo
    Chris Carlis
    Red Team Coordinator, Zurich Insurance Group

    Chris Carlis is a member of the Zurich Insurance Group Red Team and has built a career helping organizations become more secure through offensive testing. Locally, Chris is a community organizer in the Chicago area and helps coordinate several monthly gatherings designed to connect like-minded information security professionals. In his spare ...

  • speaker photo
    Ed Snodgrass
    Regional Security Principal, Insight Cloud + Data Center Transformation

    Ed has over 20 years of experience in information security, supply chain security, risk, compliance and mergers and acquisitions. Prior to joining Insight, he served as Chief Information Security Officer for Secure Digital Solutions, a consulting firm providing cyber security program strategy, enterprise risk and compliance, and data privacy....

  • speaker photo
    Paul Russo
    Enterprise Security Engineer, Tenable

    Paul is a passionate technologist focusing on solutions at the intersection of business and technology. He has over 20 years of industry experience architecting, deploying and consulting on enterprise solutions. In his current role as a Sr. Security Engineer for Tenable he helps organizations reduce risk due to Cyber Exposure.

  • speaker photo
    Cody Johnson
    Intelligence Analyst, FBI
  • speaker photo
    George Schultze
    Supervisory Special Agent, Cyber Crime Task Force , Federal Bureau of Investigation

    Special Agent George Schultzel entered on duty in July of 2010 and was assigned to the New York Field Office. Over the course of his career, SA Schultzel has investigated complex criminal computer intrusions, nation state adversarial action, and cyber terrorism. SA Schultzel is currently serving as the Supervisory Special Agent of the Cyber C...

  • speaker photo
    Moderator: Ed Pascua
    SVP, Simeio Solutions & Director, ISSA
  • speaker photo
    Joseph Thacker
    Sr. Security Consultant, Crowe

    Joseph Thacker, CISSP, is a Senior Staff Member in Crowe’s cybersecurity practice. With experience in software development, automation, and cybersecurity, he is serving in Security Engineer and Analyst roles to assist in the development and maturing of one of Crowe’s cybersecurity programs. He has a Bachelor’s degree in Computer Science and a...

  • speaker photo
    Tim Chapman
    Director of Security Assurance, ADP

    Tim Chapman serves as ADP’s Director of Security Assurance, leading a team that provides security assurance to ADP’s North American clients. Prior to ADP, Tim’s expertise includes over 17 years of information security, operational risk management, business management, and process improvement experience. Additionally, Tim has been involved wit...

  • speaker photo
    Jeff Wheat
    Director, Solutions Engineering, @RISK Technologies, Inc.

    Jeff is the Director of Solutions Engineering at @RISK Technologies as a Technical Director sitting at the nexus of Sales, Deployment, Operations, and Product Development. Interacting directly with customer C-Suite and Technical Staff to drive sales, customer satisfaction, and innovation back into the platform. Jeff provides operational and c...

  • speaker photo
    Tim Callahan
    SVP, Global Chief Security Officer, Aflac

    Timothy L. Callahan, CISSP, CISM, CRISC Senior Vice President, Global Security; Chief Security Officer Tim Callahan joined Aflac in 2014, bringing more than 30 years of experience in information and physical security, business resiliency and risk management. He was promoted to his current role in January 2016, where he is responsible for dire...

  • speaker photo
    Phyllis Woodruff
    VP, Enterprise Cybersecurity Programs, Fiserv
  • speaker photo
    Kim Keever
    CISO & SVP, Security & Technology Services, Cox Communications
  • speaker photo
    Deborah Wheeler
    CISO, Delta Air Lines

    Deborah Wheeler is Delta’s Chief Information Security Officer. In this role, Wheeler leads Delta’s Information Security team responsible for the airline’s cybersecurity efforts that secure and protect information important to Delta and personal to its customers, while ensuring the overall cyber resiliency of the airline.

    Wheeler’s 25 y...

  • speaker photo
    Michael Jones
    Attorney, Trusted Counsel

    Michael is a corporate attorney with a strong background in intellectual property and business-oriented technology. As an Attorney with Trusted Counsel, Michael handles licensing and commercial agreement issues. He advises clients on IP and technology licensing, outsourcing and services agreements. He is responsible for negotiating complex te...

  • speaker photo
    Dominick Frazier
    Program Manager, Security Learning & Awareness, Meta

    Dominick Frazier is a security professional with over 13 years of security experience with his current role being in Information Technology/Cyber-Security. In his current role he serves as the Security Awareness & Communication Manager responsible for the conversation around security between technical and non-technical teams, which extends to...

  • speaker photo
    David Allen
    CISO, State of Georgia - Georgia Technology Authority

    David Allen is the Chief Information Security Officer for the State of Georgia. He leads GTA’s Office of Information Security, which unifies information security responsibilities for the state’s IT enterprise, the Georgia Enterprise Technology Services (GETS) program, and GTA. Prior to joining GTA in 2019, David served as the Chief Informatio...

  • speaker photo
    Graeme Payne
    President, Cybersecurity4Executives

    Graeme Payne has over 30 years' experience in security and information technology risk consulting and IT management. He spent the majority of his career at Ernst & Young prior to joining Equifax in 2011 as VP of IT Risk & Compliance. At the time of the 2017 Equifax data breach, he was CIO of Global Corporate Platforms. He now consults with Bo...

  • speaker photo
    Lori Anello
    VP, Threat Management & Cybersecurity Operations, GE Aviation

    Lori Anello is an adaptive leader with broad background in leading large enterprise teams in the areas of infrastructure, security technology, application architecture, and business solutions. She started her career working for the National Institutes of Health and then moved into private industry in the areas of consulting and manufacturing ...

  • speaker photo
    Kristen Ellis
    Sr. Director, Cybersecurity, Clinical Reference Laboratory, Inc.

    Kristen Ellis is the Security Officer for Clinical Reference Laboratory, Inc. in Lenexa, KS. She obtained her Certified Information Systems Security Professional (CISSP) designation in 2012 and has over 23 years of Information Technology experience, twelve years focused in security. Mrs. Ellis has been instrumental in the development of the s...

  • speaker photo
    Melissa Spicer
    Sr. Manager, InfoSec Ops, Kansas City Power & Light
  • speaker photo
    Moderator: Beth Strobel
    Sales Director, Onspring

    Beth Strobel began her career at a global aerospace and defense company, maintaining responsibility for the ethics and legal compliance training and awareness programs. She's since worked in both technical and sales roles at technology companies providing solutions for cybersecurity and governance, risk and compliance. Beth currently serves a...

  • speaker photo
    Jim Pointer, Moderator
    Manager, Information Security, Helzberg Diamonds
  • speaker photo
    Mike Shine
    Director, Systems Engineering, Mimecast

    Mike has over 15 years’ experience designing and implementing IT security solutions for large enterprises, and he’s currently focused on making email safer for businesses. He actively participates in combating existing cyber threats and researching new threats out of Mimecast’s Chicago office. Mike holds a degree in Computer Engineering from ...

  • speaker photo
    Anne Rogers
    COO/CSO , ERASCOGroup, LLC
  • speaker photo
    Mario Chiock
    Chief of Staff, Itegriti; CISO & Fellow Emeritus, Schlumberger

    Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and m...

  • speaker photo
    Brandon Bradshaw
    Sales Engineer, Trend Micro

    Brandon has been with Trend Micro for three plus years, and has been in the IT Industry since the late 1990s. As a Sales Engineer, it's his passion to be the technical bridge between sales and customers.

  • speaker photo
    Altaz Valani
    Research Director, Security Compass
  • speaker photo
    Sahba Kazerooni
    CISO, Aviva Canada
  • speaker photo
    Karen Nemani
    Director, Risk, Compliance and Projects, IACS, Opentext
  • speaker photo
    Greg Thompson
    Vice President & CISO, Manulife
  • speaker photo
    Patrick Gray
    IT Security Consultant, Patrick Gray & Assoc LLC
  • speaker photo
    Stanton Gatewood
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA

    Mr. Stanton Gatewood is the U.S. DHS/CISA - R4 Cyber Security Coordinator - State of Georgia. He is the former Chief Information Security Officer for the State of Georgia and Board of Regents of the University System of Georgia and the University of Georgia.

    Stanton has more than 35 years of experience in cybersecurity program manageme...

  • speaker photo
    Vinay Puri
    Cybersecurity Executive & Co-Founder, Profound Security Labs

    Vinay is an ex-veteran and a leader in cybersecurity with two decades of experience. He possess incisive analytical skills and has innovative ideas to identify gaps in cybersecurity posture and has helped many organizations in architecting complete security frameworks. Vinay holds dual masters in Computer Science and Information Warfare from ...

  • speaker photo
    Bryan Orme
    Principal & Partner, GuidePoint Security

    Bryan Orme leads the Information Assurance consulting organization; which includes Application Security, Cloud Security, Governance, Risk, and Compliance Services, Threat and Attack Simulation, Incident Response and Forensics. Additionally, Bryan leads the internal IT and Information Security teams as well as the Project Management Office and...

  • speaker photo
    Susan Berezny
    Director, Information Security, Royal Canadian Mint

    Susan Berezny is the Director of Information Security at the Royal Canadian Mint. She is responsible for developing a cybersecurity strategy and managing a risk-based security program aligned with business objectives. Prior to joining the Mint, Susan was with The Ottawa Hospital for 23 years in several roles, including Information Security Of...

  • speaker photo
    Bob Gordon
    Executive Director, Canadian Cyber Threat Exchange

    Robert W. (Bob) Gordon is the Executive Director of the Canadian Cyber Threat Exchange (CCTX). The CCTX is Canada’s private sector organization for the sharing and analysis of cyber threat information, and enabling collaboration across all sectors. Most recently, Bob was a Director, Global Cyber Security at CGI. Prior to this, he enjoyed a lo...

  • speaker photo
    Laura Fey
    Principal, Fey LLC

    Laura Clark Fey, Esq., PLS, CIPP/US, CIPP/E, CIPM, FIP: Laura Clark Fey, one of the first twenty-seven U.S. attorneys recognized as Privacy Law Specialists by the International Association of Privacy Professionals (IAPP) (ABA-accredited), leads Fey LLC, a global data privacy and information governance law firm. She and her team help organizat...

  • speaker photo
    Roger Vann
    Information Security Leader, JANUS Associates, Inc.
  • speaker photo
    Dave Snyder
    Chief Information Security Leader, Independence Blue Cross
  • speaker photo
    Samuel Sutton
    Computer Scientist, FBI, Houston Cyber Squad

    Samuel Sutton is an FBI Computer Scientist. Since 1992 he has worked in Headquarters and Field Offices across the country. He is currently assigned to a Cyber Squad of the Houston Office. Specializing in Computer Security, Network Forensics, "Enhanced Network Capabilities", and Information Security Management, his skills have been applied to ...

  • speaker photo
    Andrew Matushek
    Senior Special Agent, United States Secret Service

    Andrew Matushek is a Senior Special Agent (SSA) with the United States Secret Service. He is also the Assistant Director of the Kansas City Electronic Crimes Task Force (ECTF) and has over 19 years of experience. He has previously served in Arizona, California, and Washington, DC, prior to landing in Kansas City. SSA Matushek is current activ...

  • speaker photo
    Tim Miller
    Lead Cybersecurity Consultant, Trend Micro

    Tim has over 10 years’ experience in Information Security and 33 years working with computer technology. He started his career with the Apple IIe in his first computer class, through achieving his master’s degree in Network Communications Management. Tim has been with Trend Micro for three years, and his experience in Information Security in...

  • speaker photo
    Intel Analyst from the FBI
  • speaker photo
    Lynn Watson
    Director of Compliance and Risk Management, Dinsmore & Shohl LLP

    Lynn is the Director of Compliance & Risk Management for Dinsmore & Shohl, a national law firm with 1,300 attorneys and employees in 26 offices. Lynn oversees the cybersecurity team and is responsible for all firm security policies, procedures, technology, and initiatives, including the incident response program.

  • speaker photo
    Eric Bucher
    Solutions Architect, Cequence Security

    Eric Bucher has over 15 years of experience in the security industry with a technical concentration in financial fraud, advanced persistent threats, forensics, exfiltration, DLP, and overall attack surfaces.

  • speaker photo
    Eugene Kesselman
    Founder and CEO, TapJets

    Eugene Kesselman is Founder and CEO of TapJets, the on-demand private jet charter company headquartered in Houston, Texas. Since 2015 the company has been using blockchain ledger technology to conduct its business and since 2016 became the first private aviation company to instantly accept cryptocurrency as a form of payment for its services....

  • speaker photo
    Gustavo Coronel
    Sr. Cloud Security Architect, Check Point Software Technologies

    Gustavo (Gus) Coronel is a Senior Cloud Security Architect with Check Point Software Technologies and has been involved with network security for over 25 years. His first foray into network security was serving as the first Firewall Administrator at the US Department of Transportation in 1994. Intrusion Detection, Vulnerability Assessments, P...

  • speaker photo
    Dr. Fred Kwong
    VP & CISO, DeVry University

    Dr. Fred Kwong has been in the information security and technology field for the past 20 years in working in education, financial, telecommunication, healthcare, and insurance sectors. He is an award-winning thought leader in security and currently works at DeVry University where he currently serves as the VP and Chief Information Security O...

  • speaker photo
    Joseph Rogalski
    Sr. Director, Solution Engineering, eSentire Inc.

    Joe Rogalski is an accomplished Technology and Security Professional with over 20 years of experience developing world-class programs and delivering technology-based solutions. He has served in a variety of technical and management positions during his career, including Security Strategist at Symantec and Information Security Officer at Firs...

  • speaker photo
    Axel Peters
    Executive Sales Manager, baramundi Software USA Inc.

    Axel holds his degree in IT Management and has advised more than 300 small businesses and global enterprises in Europe and the U.S. on tools and strategies to keep technology infrastructure up-to-date, safe, and efficient. Now continuing that role at the baramundi U.S. headquarters in Framingham, MA, Axel is actively helping IT departments ad...

  • speaker photo
    Tasha Phelps
    President & CEO, Phelco Technologies, Inc.

    Protecting the integrity of information continues to be a strategic focus within Tasha's cybersecurity efforts. She has seen the impact of businesses being compromised by malicious threats, and shares how building contingency plans can be of value. Her approach is to align business processes with technical solutions to create powerful plans f...

  • speaker photo
    Zaki Abbas
    VP & CISO, Brookfield Asset Management

    An accomplished Information Security and Technology leader with proven ability to develop and align strategies with business priorities and establish strong, trust-based partnerships across executive teams, key stakeholders and board members. Zaki has extensive experience in the insurance, real estate, banking, infrastructure, energy, investm...

  • speaker photo
    Chase Cresgy
    Sr. Healthcare Cybersecurity Consultant, Crowe LLP

    Chase Cresgy attended IUPUI and graduated with a BS in CIT concentrated in information security. He also holds the Security+ and CySA+ certifications. Information/cybersecurity has always interested Chase, and he believes it will be one of the greatest challenges society faces over the next decade. The world of cybersecurity is a fast, ever-c...

  • speaker photo
    Jay Robinson
    Director of Cyber Operations, BlackRock

    BlackRock's Cyber Operations team manages the global 24x7 operations center responsible for cyber monitoring, incident response, cyber intelligence, cyber forensics, and vulnerability management.

  • speaker photo
    Timothy Keese
    Special Agent, FBI
  • speaker photo
    Bob Rudis
    Sr. Director, Chief Security Data Scientist, Rapid7

    Bob Rudis has over 20 years of experience using data to help defend global Fortune 100 companies and is currently [Master] Chief Data Scientist at Rapid7, where he specializes in research on internet-scale exposure. He was formerly a Security Data Scientist & Managing Principal at Verizon, overseeing the team that produces the annual Data Bre...

  • speaker photo
    Joel Weinstein
    President, Greater Boston Chapter, Association of Continuity Professionals

    Joel Weinstein, a native of Washington DC, moved to Boston in 1977, formed his first company in 1986, and currently is in his second term as president of the Greater Boston Chapter of ACP. He has taught at Boston University, Northeastern University, Benjamin Franklin Institute, and ITT Technical Institute for over 40 years. Joel is interested...

  • speaker photo
    Adib Sarakby
    Sr. Sales Engineer, Mimecast

    Adib Sarakby joined Mimecast as a Service Delivery and, after a year, was promoted to a Sales Engineer role. He works closely with the Sales, Marketing, and Educational teams to continually enhance Mimecast's products and promote Cyber Resilience. Email Security is Adib's passion, and as the threat landscape evolves, he splits his time betwee...

  • speaker photo
    Jonathan Villa
    Practice Director, Cloud Security, GuidePoint Security

    Jonathan Villa has 19 years of experience as a technology consultant including 18 years of direct information security experience. For over 10 years Jonathan consulted to a large municipality across several competencies including PCI compliance and training, application architecture and security, vulnerability management, secure coding, web a...

  • speaker photo
    Antona Dumas
    Associate, XPAN Law Group

    Antonia M. Dumas is an associate at XPAN Law Group, a certified Women’s Business Enterprise (“WBE”) and Women Owned Small Business (“WOSB”). At XPAN, Antonia works with clients to create proactive, streamlined, and global approaches to cybersecurity and data privacy. She performs audits, assessments and gap analysis of a client’s existing con...

  • speaker photo
    Les Stevens
    Vice President, Information Security, Equifax Canada

    As Vice President of Information Security at Equifax Canada, Les Stevens is responsible for the identification, assessment, and mitigation of inherent, residual, regulatory, security, and compliance risks specifically associated with the business operations of Equifax International business units. His experience building and maintaining infor...

  • speaker photo
    Heather Bearfield
    IT Risk and Assurance Services Leader, Marcum Technology

    Heather B. Bearfield is a principal in the firm’s Boston office and serves as the IT Risk and Assurance Services leader. She is also a member of the national Real Estate, Alternative Investment, Healthcare, and Financial Services Industry groups. In addition, Ms. Bearfield chairs the Marcum Diversity & Inclusion Committee. She has extensive e...

  • speaker photo
    Chris Braden
    Vice President, Global Channels & Alliances, eSentire

    Chris Braden is a veteran sales and channel executive, bringing over 20 years of experience building, leading, and executing successful programs around the world. In his current role as the Vice President, Global Channels and Alliances, he is responsible for eSentire's global channel program, overseeing strategic partner recruitment, internat...

  • speaker photo
    Mike Fabrico
    Sr. Technical Sales Director, TrapX Security

    Mike Fabrico is a security expert that has worked for NASDAQ and has over 20 years of industry experience in implementing, architecting, and maintaining critical infrastructure networks. He is also an advisory board member on a number of successful cybersecurity companies worldwide for APT/malware, network intrusion, threat intelligence, digi...

  • speaker photo
    Joshua Marpet
    Data Protection Advisory Council
  • speaker photo
    Rosemary Christian
    DevSecOps Engineering Coach, Comcast

    Rosemary Christian is Co-President for WiCyS Critical Infrastructure and a Board Member for WiCyS Delaware Valley. She has demonstrated passion, knowledge and proven ability to engage others in the emerging market needs for cybersecurity initiatives. She leverages her experience, communications skills and interpersonal savvy across all levels...

  • speaker photo
    Robert Wilner
    President, Delaware Valley Chapter, Cloud Security Alliance
  • speaker photo
    Parker Crook
    Senior Sales Architect, SentinelOne

    Parker Crook has been in the security industry for over 10 years across multiple verticals. He has experience working on both blue and red teams and has been asked to speak at various regional security conferences. Some of his speaking engagements have covered topics such as purple-teaming, wargaming, orchestration, and his own research. Park...

  • speaker photo
    Matt Wilson
    Chief Information Security Advisor, BTB Security

    Matt Wilson is the Chief Information Security Advisor for BTB, based in southeastern Pennsylvania. Matt has spent his entire career in IT and has over 14 years of experience within Information Security. Throughout his career, Matt has fostered the development of assessment methodologies, toolsets, and techniques for the delivery of security a...

  • speaker photo
    Bruce Forman
    CISO, UMassMemorial Health Care

    Bruce has several degrees including an MBA in Biotechnology and Health Industry Management. Prior to his current position at UMass, he held other IT Management positions, focusing on Information Security, Risk Advisory, and Security Strategy and Policy, as well as offering consultative services. Bruce is a past president of the Information Sy...

  • speaker photo
    Brian Minick
    CISO, Fifth Third Bank

    Brian Minick is CISO at Fifth Third Bank. Brian has responsibility for the bank’s information protection program. Brian is a noted speaker and published author. He brings 20 years of technology and cybersecurity leadership and experience to this position. Prior, Brian was VP of Managed Threat Services at Booz Allen Hamilton following the acqu...

  • speaker photo
    Brian Tobia
    Consulting Systems Engineer, Cisco

    Brian has been an IT practitioner, consultant, and pre-sales engineer for 15 years, focusing on network and virtualization security. He currently is a consulting systems engineer covering cloud security solutions at Cisco. He holds a CISSP along with other industry certifications.

  • speaker photo
    Andrew Dutton
    CISO, DuHart Consulting

    Strategic Global Cybersecurity leader that is accomplished in complex multinational organizations. Strong interpersonal skills and communicator. Extensive experience in cybersecurity, compliance, governance, architecture. Expert in deployment of enterprise standards, processes, and policies. Strong project management experience. Dedicated and...

  • speaker photo
    Christopher Stephen
    Senior Sales Engineer, SentinelOne

    Chris Stephen is a Senior Sales Engineer at SentinelOne. Chris has over a decade of experience in the IT field, from his initial startup where he designed end-phase punch management systems for commercial and residential builders, to his work at Apple to his work in the medical industry. Chris is a ‘Jack-of-all-trades’ when it comes to IT.

  • speaker photo
    Grant Asplund
    Growth Technologies Evangelist, Check Point Software Technologies

    For more than 20 years, Grant Asplund has been sharing his insights on how businesses can best protect themselves from sophisticated cyber-attacks in an increasingly complex world. As Check Point’s chief evangelist, he travels the world enthralling audiences with his passionate and relational storytelling at conferences like RSA and Next100 C...

  • speaker photo
    Kevin McPeak
    Principal Cyber Architect, U.S. Federal Government, Symantec

    Kevin McPeak is Symantec’s Principal Cyber Architect for the U.S. Federal Government. In this capacity, he serves as the technical SME for eight distinct enterprise defensive technologies. In addition to his CISSP and ITILv3 certifications, Kevin also holds two Masters of Science degrees from Johns Hopkins University and Virginia Tech. In add...

  • speaker photo
    Ondrej Krehel
    CEO and Founder , LIFARS

    Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise. He actively participates in many high-profile engagements around the world whereby his proprietary methodology is leveraged to achieve the most rapid root-cause analysis and remediation.
    He’s the former Chief Information Security Officer ...

  • speaker photo
    Katie Creaser
    SVP and Cybersecurity Practice Lead, Affect

    Katie is a Sr. Vice President, Cybersecurity Lead at Affect, where she provides counsel to clients that are looking to bring PR and social media into their communications program as part of a thoughtful, holistic strategy. Katie is passionate about helping brands of all shapes and sizes find unique and creative ways to tell their story. She w...

  • speaker photo
    Seth Robertson
    Principal, Nocturn Security

    Seth is a dynamic information security leader with fifteen years’ experience building best-in-class programs – including launching a security startup, managing NASA’s incident response program, founding the Security Operations Center at a top Wall Street firm, and leading the security program for a global tech company. His work has been used ...

  • speaker photo
    Sandra Fathi
    President, Affect

    Sandra Fathi has spent the last 20 years helping technology, healthcare and professional services companies achieve their goals. As President and Founder of Affect, a public relations, marketing and social media agency, Sandra has successfully led the company with consistent growth since the agency’s inception in 2002. Sandra’s commentary has...

  • speaker photo
    Jimmy Mills
    Senior Solutions Architect, SSH.COM

    Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.

  • speaker photo
    Kenneth Olmstead
    Internet Privacy & Security Analyst, The Internet Society's Online Trust Alliance

    Kenneth (Kenny) Olmstead is the Internet Security & Privacy Analyst that helps research, analyze, write, and review technical content relating to The Internet Society's Online Trust Alliance issues—identity, security, privacy, and data stewardship. He also helps with communications and engages the OTA Committees on technical and techno-policy...

  • speaker photo
    Jodi Daniels
    Founder & CEO & Privacy Consultant, Red Clover Advisors, LLC

    Jodi Daniels, founder of Red Clover Advisors, is a Certified Informational Privacy Professional (CIPP/US) with more than 20 years of experience helping a range of businesses from solopreneurs to multi-national companies. Red Clover Advisors has helped hundreds of companies create privacy programs, achieve GDPR compliance, and establish a secu...

  • speaker photo
    Tasneem Nipplewala
    VP, Information Security; MSIA, CISSP, CCSP, Eastern Bank

    Tasneem is a Senior Security Architect at Eastern Bank, the largest and oldest mutual bank in the country with $11B in assets. As part of her responsibilities, she provides internal clients security services when implementing new initiatives across the bank and insurance company to ensure the solutions are built with the highest security stan...

  • speaker photo
    Jason Barr
    CIO & CISO, Firstup

    Jason has been in the technology sector for over 20 years and has a passion for taking things apart and making them better.

  • speaker photo
    Jockel Carter
    Sr. Cybersecurity Advisor, Sage Data Security
  • speaker photo
    Jeremy Rucker
    Attorney, Spencer Fane LLP

    As a cybersecurity and data privacy attorney in the Dallas office of Spencer Fane LLP, Jeremy Rucker has assisted companies of all sizes in responding to data security and privacy incidents. The expertise of Jeremy and his Spencer Fane colleagues cover several industries including healthcare, banking and finance, insurance, energy, transporta...

  • speaker photo
    John Opala, PhD
    VP & Global CISO, Hanesbrands Inc.

    Cybersecurity thought leader with over 19 years of technical and leadership experience in multiple disciplines.

  • speaker photo
    Fred Gordy
    Director, Operational Technology Risk Assessment, Michael Baker International

    Fred Gordy is a nationally recognized thought leader, speaker, and expert in building systems cybersecurity specializing in organizational and technical vulnerabilities. He has over 20 years of industry experience including information technology and building controls systems. Fred has been the Chairperson of the Cyber Security Committee for ...

  • speaker photo
    Tom Tollerton
    Sr. Manager, IT Advisory, DHG

    Tom has 15+ years of experience in the IT industry, and has extensive experience performing SOC 1 and 2 examinations and reporting, cybersecurity risk assessments, PCI compliance assessments, and system security assessments. Tom is one of DHG’s PCI Qualified Security Assessors and has completed multiple Reports on Compliance for PCI Level 1 m...

  • speaker photo
    Bryan Bechard
    CISO, Flagship Credit Acceptance

    Bryan is a 20+ year InfoSec career professional currently serving as CISO for an auto finance company and teaching the next generation of InfoSec pros.

  • speaker photo
    Velu Jeganathan
    VP, Security Engineering Solutions Team, State Street Corporation

    Velu Jeganathan has more than 20 years of IT experience, most of which is around Information Security. He has been extensivly involved in various roles in penetration testing, vulnerability management, security project consulting, and developing security processes, with an emphasis on integrating security into the project lifecycle.

  • speaker photo
    Vince Fitzpatrick
    Director of Information Security, ChristianaCare

    Vince Fitzpatrick is a 20-year information security professional in the fields of healthcare and finance. Currently, he is the Director of Information Security at Christiana Care Health System (CCHS), one of the largest healthcare providers in the mid-Atlantic region, serving all of Delaware and parts of PA, MD, and NJ.

  • speaker photo
    Jim Menkevich
    Sr. Sales Engineer, Netskope

    Jim Menkevich is an Information Security, Privacy, and Risk Management professional with 19+ years of experience. Through his career, he has led teams in Cybersecurity, Enterprise Architecture, Systems Integration, and Application Development. Jim specializes in applying methodologies, frameworks, and ideas outside of the intended domain, whi...

  • speaker photo
    Moderator: Joe Walsh
    M.A.C.J. Program Director and Assistant Professor of Criminal Justice/Computer Science, DeSales University

    Joe Walsh teaches digital forensics and computer security at DeSales University. He previously worked as a senior security consultant where he performed security assessments, conducted penetration testing, and responded to computer security incidents. He has been a police officer for 13 years and is a former member of the ICAC Task Force and ...

  • speaker photo
    Charles Sgrillo
    Professor of Cybersecurity, Drexel University

    Charles Sgrillo is an adjunct professor of cybersecurity at Drexel University, teaching on topics such as IT Auditing, Cybersecurity, Penetration Testing, and Computer Forensics. During his time as a principal consultant, Charles has worked with over 50 businesses to implement the NIST Cybersecurity Framework. Along with teaching at Drexel Un...

  • speaker photo
    Christian Espinosa
    CEO, Blue Goat Cyber

    Christian Espinosa is the CEO & Founder of Blue Goat Cyber and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a U.S. Air Force veteran with a BS in Engineering from the U.S. Air Force Academy and an MBA from Webster University. He holds multiple patents on ...

  • speaker photo
    Daniel Smith
    Head of Research, Threat Intelligence Division, Radware

    Daniel is the Head of Research for Radware’s Threat Intelligence division. He helps produce actionable intelligence to protect against botnet-related threats by working behind the scenes to identify network and application-based vulnerabilities. Daniel brings over ten years of experience to the Radware Threat Intelligence division. Before joi...

  • speaker photo
    Roy Wattanasin
    Research Security Officer, Massachusetts Institute of Technology

    Roy Wattanasin is an information security professional. He is an avid speaker providing thought leadership at many conferences and webinars. Roy enjoys incident response and building security programs. He is involved with many computer security groups including the Boston Application Security Conference (BASC), OWASP Boston and other local as...

  • speaker photo
    Ron Reidy
    Audit Analytics Leader, Wells Fargo

    Ron has been working in IT for over 30 years. Starting as a software engineer writing database programs on CP/M, MSDOS, VAX/VMS, and UNIX in C, Pascal, VAX/VMS assembler, and FORTRAN. After 15 years, he switched into a database administration role, managing large Oracle databases as well as smaller SQL Server and Sybase databases. Ron became ...

  • speaker photo
    Ernesto DiGiambattista
    CEO & Founder, CYBRIC

    Ernesto DiGiambattista founded CYBRIC to enable organizations to more easily, confidently and holistically answer the question “How secure are we?” Prior to founding CYBRIC and developing the CYBRIC Continuous Application Security Platform, Ernesto was the Chief Technology & Security Officer for Sentinel Benefits & Financial Group, responsibl...

  • speaker photo
    Michael Brown
    Rear Admiral, U.S. Navy (Ret.), President, Spinnaker Security LLC; ACSC Board Clerk

    Michael Brown, Rear Admiral, United States Navy (Retired) is the Founder and President, Spinnaker Security LLC, a cybersecurity consulting business focused on understanding, identifying and mitigating business risks associated with cybersecurity. Additionally, Brown brings executive leadership, including crisis management, from both public an...

  • speaker photo
    Salar Atrizadeh, Esq.
    Attorney at Law, Law Offices of Salar Atrizadeh

    Salar Atrizadeh, Esq. is an attorney and IT expert with an extensive background in technology and computer information services. He has conducted seminars before legal and non-legal organizations on similar topics. Salar is licensed to practice in the State of California, District of Columbia, and the United States District and Bankruptcy Cou...

  • speaker photo
    Matt Connors
    Identity and Access Management Program Manager, University of New Hampshire

    Matt Connors is the Identity and Access Management Program Manager for the University of New Hampshire. His role sits at the cross section of enterprise infrastructure, client experience, and security; as well as leading IAM strategy and practice for a Tier 1 Research University. Matt enjoys collaborating and sharing knowledge with technolog...

  • speaker photo
    Edward Davis
    President & CEO, Edward Davis, LLC

    Davis has been in law enforcement for 35 years. He served as the Police Commissioner of the City of Boston from December 2006 until October 2013. He administered 6 world championship celebrations and led the highly successful response to the Boston Marathon bombing. Prior to that, Davis was the Superintendent of the Lowell Police Department, ...

  • speaker photo
    Sean Baggett
    VP & CISO, Blue Cross Blue Shield of Massachusetts

    Sean Baggett is the Vice President and Chief Information Security Officer at Blue Cross Blue Shield of Massachusetts. Sean has been an IT and Security leader in the healthcare industry for over 20 years. He has a BS from the Massachusetts Maritime Academy and is a former U.S Navy Surface Warfare Officer. He currently holds CISSP and CISM cert...

  • speaker photo
    Bryan Scovill
    Manager, Telecom & Network Ops, University of New Hampshire

    Lead of the network security team at the University of New Hampshire for 18 years. Areas of focus include development and architicture in the UNH networking enviroment.

  • speaker photo
    Hazel Cerra
    Assistant to the Special Agent in Charge, United States Secret Service

    Assistant to the Special Agent in Charge (ATSAIC) Hazel Cerra is a twenty-two year veteran with the United States Secret Service. ATSAIC Cerra was assigned to the Former President William Clinton Protective Detail in Chappaqua, NY, where she spent four years traveling around the world in support of the Clinton Global Initiative (CGI).

    ...

  • speaker photo
    Anahi Santiago
    CISO, ChristianaCare Health System

    Anahi Santiago is the Chief Information Security Officer at ChristianaCare Health System, the largest healthcare provider in the state of Delaware. Prior to CCHS, she spent over 10 years as the Information Security and Privacy Officer at Einstein Healthcare Network. In her role as CISO, Anahi has overall responsibility for the organization's ...

  • speaker photo
    Craig Newell
    Manager, Information Security, Ontario Cannabis Store

    Craig is in the business of mitigating privacy and data loss disasters. Constantly keeping abreast of new challenges and developments in the industry, he has evangelized risk-based security and control through the banking and utility industries, private business, governmental agencies, and now, online sale of a really exciting product. A beli...

  • speaker photo
    Bruce Schneier
    Security and Cryptography Expert and Author

    Bruce Schneier is an internationally-renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the best-seller "Click Here to Kill Everybody"—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over ...

  • speaker photo
    Arvin Verma
    Cybersecurity Strategist, InfraGard National Sector IT Subject Matter Expert

    Arvin Verma is a highly motivated and talented cybersecurity professional with over 8 years of experience across a diverse set of cyber domains and industries such as Aerospace and Defense, Technology, Financial and Insurance, Commercial Retail, Manufacturing and several more. He has filed more than 4 invention disclosures in the field of cyb...

  • speaker photo
    Samantha Dutton
    President , DuHart Consulting

    Dr. Samantha Dutton is the President of DuHart Consulting where she works with her husband in addressing cybersecurity business needs, as it impacts the human factor. She is also an Associate Dean and the Director of the Social Work Program in the College of Social and Behavioral Sciences at the University of Phoenix. She is a Licensed Clinic...

  • speaker photo
    Calvin Nobles
    Cybersecurity Policy Fellow, New America Think Tank, New America

    Dr. Nobles is a Cybersecurity Scientist and practitioner with more than 25 years of experience. He teaches cybersecurity at several universities. He recently retired from the Navy and is currently employed in the Financial and Services Industry. Dr. Nobles is a Cybersecurity Policy Fellow with the New America Think Tank. He authored a book on...

  • speaker photo
    Joseph Fontecchio
    Director of Infrastructure and Database Services, The University of Massachusetts

    Joe is currently the director of infrastructure and database services for The University of Massachusetts Information Technology Services department, leading a team of security professionals who support infrastructure and applications used to host shared services. He holds a master’s degree in Information Technology from Worcester Polytechnic...

  • speaker photo
    Girish Chiruvolu
    Director, Information Security Risk Management, Experian

    Dr. Chiruvolu is a CISSP/CISM and has spent several years in the security industry and in particular Finance/e-Commerce and Enterprise industries on cloud/SaaS technologies. He is currently Director Information Security and risk management, and has lead several successful programs on several fronts of Information Security, Risk management and...

  • speaker photo
    Helen Patton
    Advisory CISO, Cisco; Former CISO, The Ohio State University

    With more years working in the Security, Risk, Privacy and Resiliency professions than she cares to say, Helen Patton advocates using information risk, security and privacy to enable the mission of organizations and to support society at large.

    Helen is an Advisory CISO at Duo Security (now CISCO), where she shares security strategies ...

  • speaker photo
    Rori Boyce-Werner
    Information Security Compliance Program Manager, University of New Hampshire

    Rori Boyce-Werner is currently the Information Security Compliance Program Manager for the University of New Hampshire, where she was previously the Associate Director of IT Client Services and Identity and Access Management Service Owner.She holds a Bachelor’s of Science in Business Administration and is working towards her Masters of Cybers...

  • speaker photo
    Michael Gough
    Founder, IMF Security

    Michael is a Malware Archaeologist, Blue Team defender, Incident Responder and logoholic. Michael developed several Windows logging cheat sheets to help the security industry understand Windows logging, where to start and what to look for. Michael is co-developer of LOG-MD, a free tool that audits the settings, harvests and reports on malicio...

  • speaker photo
    Kalani Hausman
    Adjunct Professor, University of Maryland University College
  • speaker photo
    James Baird
    Founder and Manager, Cybersecurity Management Consultants, LLC

    As a CISO, James has seen his role oversee all the programs and processes involved with Information Security, Operational Security, Technology Risk Management, and IT Compliance, . He has designed and implemented security programs using the ISO 27001, NIST RMF, NIST ICTSCRM, NIST CSF, and ITIL. James holds a Master of Science degree in Inform...

  • speaker photo
    Bryan Inagaki
    Sr. Director, Cybersecurity Risk Management & Solutions, Thermo Fisher Scientific

    Bryan's path to information security was anything but direct, and he took a few detours in the worlds of small business, federal law enforcement and financial services before finding himself fully entrenched in the industry. As a physical security professional first and an information security professional second, Bryan enjoys the challenge o...

  • speaker photo
    John Helt
    Security Operations Center Manager, Discovery, Inc. (Formerly Scripps Networks)

    I have considered myself a "hacker" from the moment I turned on my TI-99/4a. My insatiable curiosity has driven me through a career in IT Operations and InfoSec with both Hewlett Packard (10 years) and Discovery (Scripps Networks Interactive, 18 year). I hold a MS in Information Systems Management and current CISSP-ISSAP, CEH, and CCENT certs...

  • speaker photo
    Candy Alexander
    President, ISSA International; CISO, NeuEon

    Ms. Alexander has over 30 years of experience in the cybersecurity profession. She has held several positions as CISO (Chief Information Security Officer) for which she developed and managed corporate security programs. She is now working as a CISO and Cyber Risk Practice lead for NeuEon, Inc., assisting companies large and small to improve t...

  • speaker photo
    Sandy Silk
    Director, Information Security Education & Consulting, Harvard University

    Sandy Silk is the Director of Information Security Education and Consulting at Harvard University, Founder of Cyber Risk and Resilience Consulting, and a member of the Board of Advisors for the MS in Information Security Leadership at Brandeis University. She excels at bringing together executive leaders, business teams, and IT professionals ...

  • speaker photo
    Mike Brannon
    Director, Infrastructure & Security, National Gypsum

    Mike Brannon is an experienced IT professional and long-term employee at National Gypsum Company (NGC). His IT career began in 1977, and he joined NGC in 1985. Mike leads the teams that provide infrastructure and security: "We Keep National Gypsum Running."

  • speaker photo
    Brandi Keough
    Information Security Analyst, Novant Health

    Brandi Keough is a Charlotte, North Carolina, native who started her college career at UNC Charlotte as a Chemistry major and graduated from Utica College in 2016 with her Bachelors of Science in Cybersecurity and Information Assurance with a concentration in Forensics and Investigations. Brandi is currently an information security analyst wi...

  • speaker photo
    Bernie McGuinness
    IT Risk Lead, Campbell Soup Company

    Bernie is a cybersSecurity professional with over 20 years’ experience, both hands on and regulatory compliance of multiple complex systems within the Department of Defense and the commercial space. He provides in-depth knowledge on Third-Party Risk Management, Information Security, Assurance, Audit, and IT Operations, within industry. Holder...

  • speaker photo
    Ian Burke
    Enterprise Information Security Manager, Road Scholar

    Currently the Enterprise Information Security Manager for Road Scholar in Boston, Ian Burke has been working in information security for over 20 years, completing his master’s degree in Information Assurance in 2013. He has worked for companies such as TJX and IBM in the business sectors and Middlebury College in the education sector. He has ...

  • speaker photo
    Dr. Raj Sachdev
    Professor, Researcher, Lawyer, Education

    Dr. Raj Sachdev is a professor, researcher, and‎ internationally qualified lawyer (USA and England/Wales). He holds‎ several degrees in business and law and has guest spoken at such institutions as Oxford, Cambridge, Stanford and major industry conferences including having given a TEDx talk. Over the last 15‎ years, he has taught 50‎+ differe...

  • speaker photo
    Barry Herrin
    Founder, Herrin Health Law, P.C.

    Barry Herrin is the Founder of Herrin Health Law, P.C., a boutique law practice located in Atlanta, Georgia. He regularly assists health care providers in all segments of the industry on health care operations and compliance, medical information privacy and confidentiality, cybersecurity, and data breach response. He is admitted to the bars o...

  • speaker photo
    Tariq Shaikh
    IT Program Manager, Aetna

    Tariq Shaikh leads the Privileged Access Management practice for Aetna as part of their Global Security team. Tariq has more than 20 years of technology experience and is a certified project manager and information systems security professional. Tariq is an SME in the Privileged Access Management space and has spoken extensively about it at i...

  • speaker photo
    Tyler Tate
    Sr. Systems Engineer, Palo Alto Networks
  • speaker photo
    Zubaid Kazmi
    Sr. Manager and IAM Practice Lead, Sila

    Zubaid is a Sr. Manager and Identity and Access Management Practice Lead at Sila. With close to two decades of consulting experience, he has helped Fortune 500 organizations develop Identity and Access Management strategies and solutions. Zubaid has worked with clients across multiple industries, including financial services, telecommunicatio...

  • speaker photo
    Greg Bennett
    Program Manager, Air Force CyberWorx, Center for Technology, Research and Commercialization

    Air Force Officer for 22 years culminating as the Director of Research for a Department of Defense and Dept. of Homeland Security interagency research center delivering capability to the Homeland Security Enterprise and the Air Force. He was the CEO for a small business in Colorado Springs for 14 years and is currently the program manager and...

  • speaker photo
    Wayne Tynes
    Sr. Sales Engineer, Mimecast

    Wayne Tynes is a Sr. Sales Engineer at Mimecast and has been designing solutions on Microsoft’s enterprise software stack for over 20 years, including working for Microsoft as a field sales engineer and SharePoint product manager. Wayne spent 5 years as a Solutions Architect at Avanade and was responsible for their Managed Services business i...

  • speaker photo
    Ashwin Patil
    Sr. Security Analyst , Microsoft

    Ashwin Patil currently works with Microsoft as Senior Security Analyst in Redmond, WA, with over nine years of Blue Team experience in security monitoring and Incident Response. His core work areas are security analytics, threat hunting using Big Data and SIEM technologies with strong interest in Data Science and Machine Learning to analyze s...

  • speaker photo
    Clint Harris
    Consulting Systems Engineer, Cloud Security, Cisco

    Clint is a Consulting Security Engineer with Cisco. He has over 19 years of experience in information security. Originally from New Zealand, he was an Avionics Engineer in the Royal New Zealand Airforce for five years before entering civilian life as a System Administrator with Peace Software. Experiencing a company breach and response first-...

  • speaker photo
    Rich Compton
    Principal Network Security Engineer, Charter Communications

    Rich Compton has been working at ISPs for the last 20 years. He was the very first Network Security Engineer at Charter Communications and has been working in the cable industry for the past 16 years. In his tenure at Charter, he has dealt with all facets of network security. He now focuses on DDoS detection and mitigation, stopping botnets, ...

  • speaker photo
    Tim McCain
    CISO, City of Aurora

    Tim McCain is the Chief Information Security Officer for the City of Aurora, Colorado. He has been in the governance, risk, and compliance industry for 18 years at the manager, director, and CISO level of start-ups to multi-national corporations, including public and private sector. He sees his role as a business enabler, driving meaningful b...

  • speaker photo
    Aleta Jeffress
    Chief Information & Digital Officer, City of Aurora

    Aleta Jeffress is the Chief Information and Digital Officer for the City of Aurora. She has over 20 years as a successful executive business leader and technologist building relationships between business and technology to enable digital transformation and market growth. She drives innovative strategies for business and IT leadership, and ...

  • speaker photo
    Kurt Johnson
    Security Engineer, Check Point Software Technologies

    Check Point Security Engineer, three years;
    Pro Serve/Consultant, four years;
    Sr. Engineer in Financial Services, six years;
    Firewall Monkey, two years

  • speaker photo
    Doug Carter
    Americas IT Security Operations Manager, Munich Re (Group)
  • speaker photo
    JD Milton
    Sr. Information Security Analyst, Greater Cincinnati Hospital System
  • speaker photo
    Lt. Col. Robert Siau
    Cyber Division Chief, Washington Air National Guard

    Lt. Col. Robert A. Siau is currently serving as the Cyber Division Chief for the 252 Cyberspace Operations Group and duel-hatted to the Washington Joint Forces Headquarters as the Operational Cyber Planner.

    Siau is a seasoned cyberspace operator, serving more than 17 years in cyber missions. During Siau's Command of the 262 COS he led ...

  • speaker photo
    Philip Marshall
    Sr. Director, Product Marketing, SecurityScorecard

    Phil Marshall is a security industry veteran with more than 17 years of experience in both network and data security. At SecurityScorecard, he oversees the company’s go-to-market strategy in partnership with the product management organization. Prior to joining SecurityScorecard, Phil worked at security firms Black Duck, Cryptzone, Rapid7, an...

  • speaker photo
    David Cardwell
    Client Solutions Advisor, Optiv

    David Cardwell is a client solutions advisor in Optiv’s major accounts team. In this role he specializes in aligning information security solutions that enable an organization to meet their current and future goals. David has more than 13 years of experience in information security, ranging from frontline support, consulting, and security arc...

  • speaker photo
    Kristopher Dane
    Director of Digital Design, Thornton Tomasetti

    Kristopher is the Director of Digital Design based out of the Seattle office of Thornton Tomasetti, an international structural engineering firm. Kris has 11 years of experience managing teams, administering technology, and developing custom tools to support the design of over 5 million square feet of structures around the world. In collabora...

  • speaker photo
    Seth Kulakow
    Director, Promontory

    Seth is a director in Promontory’s cyber practice, where he advises clients on all aspects of tactical and strategic cybersecurity. He has more than 20 years of experience providing dynamic, secure, and cost-effective security solutions and programs. He has served in senior information security positions at companies ranging from startups to ...

  • speaker photo
    Emily Shipman
    Sr. Product Manager, RSA

    Emily Shipman is a senior product manager, responsible for RSA Archer’s Integrated Risk Management offerings. Emily previously spent seven years in Archer’s presales consulting group, working with hundreds of GRC customers globally to develop tailored solutions for cutting-edge risk management. As a product manager, she drives Archer’s innova...

  • speaker photo
    Nick Butcher
    Sr. Engineering Program Manager, Security/GRC, Microsoft

    Nick is a senior program manager within the Digital Security and Risk Engineering group at Microsoft, where he is responsible for designing, developing, and deploying GRC (Governance, Risk, and Compliance) automation to support every division at the company. Focused on modernizing existing work efforts and building entirely new processes fro...

  • speaker photo
    Moderator: Derek Isaacs
    Sr. Cybersecurity Scientist, L3 Harris

    Author, speaker, and SME. Specialties and certifications include: CISSP, CRISC, CGEIT, Security+, C|EH, C|NDA, ITILv.3, C|CISO

  • speaker photo
    Eric Wong
    Security Engineer, West, Comodo

    Eric Wong is an experienced security engineer with 15 years in the security industry. He has worked with many different security technologies and F-500 clients over the years, focusing on architecting and deploying secure environments. Eric brings the unique expertise of working on both sides of the isle, from the client-side practitioner r...

  • speaker photo
    Cathy Hall
    Sr. Manager and Cybersecurity Architect, Sila Solutions Group

    Cathy is a cybersecurity leader with 18 years of experience providing specialized IT Services to Fortune 500 companies and government agencies, specializing in Identity and Access Management, Information Security, Enterprise Applications and Business Process Management. Cathy brings a unique mix of Federal and Commercial cybersecurity experie...

  • speaker photo
    Zachary Limacher
    Sr. Manager and PAM Practice Lead, Sila Solutions Group

    Zachary Limacher is a cybersecurity leader, business architect, and strategist with 19 years of experience in architecting and implementing enterprise cybersecurity solutions. He has worked in both consulting and corporate roles. Prior to joining Sila, Zach led Access Management at Charles Schwab & Co. Zach is the Privileged Access Management...

  • speaker photo
    Stacy Scott
    Managing Director, Cyber Risk, Kroll

    Stacy Scott is a Managing Director in Kroll’s Cyber Risk practice, based in Dallas. In addition to founding and operating her own consultancy, Stacy has served in high-profile roles with a leading cyber security consulting firm, a Big Four accounting firm, and the largest not-for-profit healthcare system in Texas. She joined Kroll with over 1...

  • speaker photo
    Deneen DeFiore
    SVP, Global Chief Information & Product Security Officer, GE Aviation

    Deneen currently serves as SVP, Chief Information & Product Security Officer, for GE Aviation in Cincinnati, Ohio. And most recently she has taken on an expanded role for GE Aviation as co-leader of Aviation’s Digital League 2.0. She has also served as SVP, Chief Technology Officer, Security & Compliance, for GE Digital.

    She is respons...

  • speaker photo
    Jesse Hood
    Director, Darktrace

    Jesse Hood is a Director at Darktrace, the world’s leading cyber AI company. Jesse has helped many enterprise organizations and SMB’s throughout Colorado and the neighboring states deploy cyber AI to detect and stop emerging threats. He works with businesses across a range of industries, including finance, healthcare, biopharma, local governm...

  • speaker photo
    Anne-Marie Scollay
    Sr. Program Manager, Microsoft

    Prior to joining Microsoft, Anne-Marie was the CISO for Axiom Law, where she led the information security strategy for Axiom's products/services, corporation, and governance, risk and compliance (GRC). Before that, she built out and oversaw the infrastructure and security for a Seattle-based SaaS startup and global multi-nationals. Anne-Marie...

  • speaker photo
    Colonel Jeffrey Collins
    Director, Air Force CyberWorx

    Jeff “T-Rex” Collins (PhD, Carnegie Mellon University) is the Director of Air Force CyberWorx, a unit comprising a public-private research and design center located at the Air Force Academy in Colorado. Jeff is the former Deputy Director for Cyberspace Strategy and Policy at the Pentagon and Director of Staff for the Air Force CIO. He recentl...

  • speaker photo
    Co-Presenter: Rich Moss
    Head of Delivery, Mirador, LLC

    Rich Moss is a nationally known technology executive with 17 years of IT leadership experience. Rich started his career designing security and remote connectivity solutions. He has a proven track record of translating business requirements into technical objectives and ensuring execution of complex whole-corporate initiatives. Rich has develo...

  • speaker photo
    Bhuvaneswari Ramkumar
    Engineering Team Lead and Product Owner, GE Digital

    Bhuvana is a product leader in the field of IoT security. She has a decade of experience both in enterprise companies and startups, wearing engineering as well as product hats. In her current leadership avatar, she leads a team that has built and shipped a variety of IIoT security applications.

  • speaker photo
    JT Gaietto
    Executive Director, Cybersecurity Services, Richey May & Co., LLP

    JT has over 18 years of experience providing enterprise information security and risk management services to a variety of organizations, with a particular emphasis on the financial services industry. He has been a Certified Information Systems Security Professional (CISSP) since 2003, and holds an undergraduate degree in Computer Information ...

  • speaker photo
    Sam Masiello
    CISO, The Anschutz Corporation

    Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to Beckage, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the protection of employ...

  • speaker photo
    Matt Shufeldt
    CISO, Cognizant Healthcare

    Winner of the CTA APEX 2017 (inaugural) CISO of Year award, Matt Shufeldt is a leader in the Cyber Security community with 25+ years working professionally in multiple areas of Information Technology. Matt has been a CISO in multiple industries and is the current CISO for Cognizant Healthcare. As a passionate technologist and an avid believer...

  • speaker photo
    Barry Kimball
    Systems Administrator, VFIS of Ohio

    Barry is a Material Science Engineer turned IT System Admin Contractor. He runs the Cincinnati chapter of SMBA (Security Master Beer Appreciation) and is a member of ISSA. He enjoys tinkering with materials that make computers work—through logic electric circuits to board OS's and coding—covering a wide range of the field of IT. His favorite ...

  • speaker photo
    Matt Scheurer
    Chair, CiNPA Security SIG, Financial Services industry

    Matt Scheurer is a Systems Security Engineer working in the Financial Services industry and serves as Chair of the Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG). He holds a CompTIA Security+ Certification and possesses multiple Microsoft Certifications including MCP, MCPS, MCTS, MCSA, and...

  • speaker photo
    Gary McMullen
    Lead Security Analyst, Great American Insurance

    Gary McMullen is currently a Lead Security Analyst for the Financial/Insurance industry but has previously utilized his information security skill set to defend the Healthcare industry for nearly two decades. He currently resides in his second term as the president of the Cincinnati Tri-State chapter of the International Information System S...

  • speaker photo
    David Howard
    Security Administrator, 19-facility Healthcare System

    David Howard is a CISSP, Certified Ethical Hacker, and holder of many other certifications. He also has 20 years of experience and currently is the senior member of the security staff of a regional hospital system. He is the host of Bring Your Own Security Radio, heard on iHeartRadio's app and many of their AM/FM stations nationwide, and is k...

  • speaker photo
    Nick Ferrell
    Technical Engineer, Trend Micro

    Nick Ferrell has been helping Trend Micro customers across the world solve security challenges since 2011 as a senior engineer and professional services consultant. A primary focus of this work has been assisting enterprise organizations achieve a unified, automated, and effective set of security controls across diverse cloud and data center ...

  • speaker photo
    Matthew Gioia
    Associate Director, IT Security & Compliance, St. Louis Community College

    Matthew Gioia is Associate Director for IT Security & Compliance at St. Louis Community College where he works with students, faculty, and staff to secure student and employee data. Matthew believes the community is best served with an education partner focused on helping every student establish and work towards achievable goals, and that dev...

  • speaker photo
    Patrick Woods
    Asst. Director, Cybersecurity & Technology / CISO, Missouri State Highway Patrol

    Patrick J. Woods serves as the Chief Information Security Officer for the Missouri State Highway Patrol (MSHP) and the Assistant Director for Cybersecurity & Technology in the Patrol's Criminal Justice Information Services (CJIS) Division. In this capacity, Patrick directs the Patrol's cybersecurity and technology efforts to include network, ...

  • speaker photo
    Micah Brown
    Vice President, Greater Cincinnati ISSA

    Micah K. Brown is a member of the IT Security Engineering team at American Modern Insurance, part of the Munich RE Group. Over the past two years he has served as the lead Engineer on the DLP implementation for Data Loss Prevention for the Munich RE organizations located in North and South America. In this role Micah has learned the many intr...

  • speaker photo
    Tom Moore
    Consulting Sales Engineer, Cloud Security, Cisco

    Tom has more than 20 years of experience in the information security industry. He has extensive experience in corporate security policy review and design, auditing, vulnerability testing and analysis, network security and application administration. He has held positions as a chief security officer for a worldwide leader in broadcast televisi...

  • speaker photo
    Pratik Lotia
    Security Engineer III, Charter Communications

    Pratik Lotia is a Security Engineer at Charter Communications, responsible for developing new architectures related to firewalls, IDS/IPS, and botnet detection.

  • speaker photo
    Mohamed Malki
    Director, Enterprise Security Architecture, Colorado Governor's Office of IT

    Mohamed Malki, director of enterprise security architecture and HIPAA officer, has been key in transforming the State of Colorado’s security landscape. He’s been critical in building Colorado’s cybersecurity plan, designing Colorado's public cloud architecture and building the requirements for Colorado's Blockchain center of excellence. Moham...

  • speaker photo
    John Macintosh
    Sr. Systems Engineer, Comodo Cybersecurity

    John is a Senior Systems Engineer with over 10 years of experience in the security field. He’s previously worked with other cybersecurity firms such as Centrify, bringing trust to devices, users, and applications, and Barracuda Networks, where he worked on a wide range of perimeter defense technologies.

  • speaker photo
    Jenifer Clark, Moderator
    Information Security & Compliance Engineer, Costco Wholesale

    Experienced Information Security Professional with a demonstrated history of working in the retail industry. Skilled in Operations Management, Sales, Management, Point of Sale (POS) / Fuel Systems, and Inventory Control. Strive to find ways information security can enable and support business and operations teams with solutions. Actively supp...

  • speaker photo
    Brandon Reid
    Sales Engineer, Mimecast

    Mimecast Enterprise Sales Engineer with over 12 years’ experience in Information Technology and Security. Brandon has spent the better part of his career helping enterprise customer identify, architect and deploy cloud solutions. Most recently, he is focused on Mimecast’s enterprise customers in the Midwest. His goal is to ensure his customer...

  • speaker photo
    Mary Rowley
    Sr. Manager, Third-Party Risk, Raytheon Technologies

    Mary’s several years of leadership experience encompasses many areas of cybersecurity with a focus on IT risk management, IT audit, security awareness training, vulnerability management and incident response. Her extensive information security background includes working at Henry Ford Health System, Comerica Bank, WorkForce Software, Learning...

  • speaker photo
    Stephanie Scheuermann
    Technical Leader, Cyber Threat Intelligence, Ford Motor Company; President, Michigan InfraGard Members Alliance
  • speaker photo
    Ken Piggott
    Program Director, Baker College of Auburn Hills
  • speaker photo
    Paul Groll
    Director of Cloud Services and Research, Department of Technology, Management, and Budget, State of Michigan

    Paul Groll is a dislodged UP'er and a recovering coral reef theoretical ecologist. At some point, he got roped into a broad array of computer-related research projects at both the University of Hawaii (1984) and Michigan State University (1981, 1990). SCUBA tanks are heavy, so he eventually switched fields and moved into computer science (hey...

  • speaker photo
    Joe Olerich
    Systems Engineer, Radware

    Joe Olerich is a Systems Engineer for Radware. He works on the front lines designing cutting-edge security solutions to aid organizations in defending against the growing threat landscape. Over his 15 years of experience, Joe has engaged in a variety of roles, from designing networks and managing infrastructure, to running network and applic...

  • speaker photo
    Zachary Briggs
    Corporate Compliance Counsel, Paycor

    Zach Briggs is Corporate Compliance Counsel at Paycor, a human capital management SaaS company based in Cincinnati. He has a management degree from Purdue University and his Juris Doctor from Northern Kentucky University. Zach enjoys seeing how things work and making them work better. He is responsible for driving compliance initiatives acros...

  • speaker photo
    Dan Collins
    Security Technical Solutions Architect, Cisco

    Dan Collins is a Security Technical Solutions Architect for Cisco Systems. Dan has over 25 years in the Information Security industry, including nine of those years serving in the United States Air Force, focusing on Information Security.

  • speaker photo
    Jennifer Czaplewski
    Director in the Information Security Team, Target

    Jennifer Czaplewski is a Director in the Information Security team at Target. She leads Product Analytics, Security Ninjas, Cyber Risk Management, and Product Security Engineering functions. Jennifer has been with Target for 12 years and in Information Security for 8 years. Prior to her time at Target, she led efforts in Corporate IT at Pfize...

  • speaker photo
    Jadee Hanson
    CISO, Code42

    As chief information security officer at Code42, Jadee Hanson leads global risk and compliance,
    security operations, incident response, and insider threat monitoring and investigations. To her
    position, she brings more than 15 years of information security experience and a proven track
    record of building security programs.

  • speaker photo
    Sanur Sikdar
    Technical Specialist Manager, Deloitte

    Sanur is experienced in enterprise and solution architecture, security architecture and design, cloud architecture, threat modeling, Secure DevOps, application development, software testing, and connected vehicle security.

  • speaker photo
    John Fahey
    Cybersecurity Specialist, Infoblox

    John Fahey is a technical consultant with over 25 years of experience in infrastructure and security solutions. John’s career spans healthcare, telecommunications, and software manufacturers such as EMC, Intel Security, McAfee and Splunk prior to his current role as Product Security Specialist with Infoblox’s BloxOne Threat Defense solution....

  • speaker photo
    Robb Reck, Moderator
    Co-Host, Colorado = Security Podcast
  • speaker photo
    Brian Gorenc
    Director, Vulnerability Research, Trend Micro

    Brian Gorenc is the Director of Vulnerability Research with Trend Micro. In this role, Brian leads the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. His focus includes analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers ...

  • speaker photo
    Scott M. Giordano
    VP, Corporate Privacy, and General Counsel, Spirion

    Scott M. Giordano is an attorney with more than 25 years of legal, technology, and risk management consulting experience. IAPP Fellow, CISSP, CCSP, Scott is also former General Counsel at Spirion LLC, where he specialized in global data protection, tech, compliance, investigations, governance, and risk. Scott is a member of the bar in Washing...

  • speaker photo
    Brian Cady
    Principal Enterprise Security Architect, Providence St. Joseph Health

    Brian Cady has been working in the information technology industry for more than 20 years with an exceptionally broad background focusing on security, architecture and future technologies. Brian has held leadership positions for IBM and Microsoft along with banking, airline and gaming companies. He is currently leading the Security Strategy &...

  • speaker photo
    Lenny Maly
    VP, Cybersecurity Architecture & Engineering, Capital One

    Lenny is the former of VP of Cyber for Capital One, leading the Security Engineering and Architecture tower. Prior to that, Lenny was at Target, where he lead a number of security engineering organizations, including Cloud Security, Vulnerability Management, and Cybersecurity.

  • speaker photo
    Timothy Colby
    Regional Account Executive, Comodo Cybersecurity

    Tim has been selling and consulting in the Information Security industry for nearly 7 years. He has worked alongside security practitioners within Small-to-Medium size businesses up go Fortune 10 companies, delivering numerous security products and services throughout the years. Tim is responsible for developing Comodo Cyber Security’s chan...

  • speaker photo
    Michael Westra
    Connected Vehicle Cyber Security Technical Manager, Ford Motor Company

    Michael Westra is the Connected Vehicle Cyber Security Technical Manager at Ford Motor Company focused on cybersecurity for connectivity into vehicles and connected technology, including embedded modems, infotainment, cloud, and mobile systems. Mike has 20 years at Ford, with roles including leading software architect for SYNC, Solution Archi...

  • speaker photo
    Thaddeus Hoffmeister
    Law Professor, University of Dayton

    Law professor who is writing a book on IoT and the law.

  • speaker photo
    Auston Davis
    CISO, Stanford Children’s Health | Lucile Packard Children’s Hospital
  • speaker photo
    Amanda Rousseau
    Sr. Malware Researcher, Endgame
  • speaker photo
    Ibrahim Al-Islam
    Sr. Sales Engineer, Malwarebytes
  • speaker photo
    Mark Barragan
    Account Executive, Jazz Networks
  • speaker photo
    Tam Huynh
    Enterprise Solutions Architect, SentinelOne
  • speaker photo
    Jim Almerico
    Director, Corporate IT and Security, Qualys
  • speaker photo
    Mounir Hahad
    Head of Threat Labs, Juniper Networks
  • speaker photo
    Hema Lakkaraju
    CEO & Founder, HAYAG Corp

    Hema Lakkaraju has worked in the healthcare industry for 10 years in software and IT compliance.

  • speaker photo
    Christine Wanta
    CSO & Founder, CSO4Less (a cfw1 company)

    Over 35 years of security, technology, and business leadership experience with expertise in delivering complete, effective, and strategic security solutions across a breadth of industries, including those with regulatory requirements as well as Secret/Top Secret environments. Proven expertise in DLP solutions across industries including globa...

  • speaker photo
    Brent Lassi
    CISO, Bluecore, Inc.

    Brent Lassi is currently the CISO at Bluecore, Inc. He has nearly 20 years of experience in the information security field. Brent's previous roles include CISO at Carlson Wagonlit, Director of Information Security at UnitedHealth Group, CISO and VP of Information Security at Digital River, Inc. for a decade. He also co-founded one of the worl...

  • speaker photo
    Brian Bobo
    CISO, Sun Country Airlines

    Brian Bobo is the Chief Information Security Office for Sun Country Airlines in Eagan, Minnesota. He is responsible for all aspects of the security and disaster recovery strategy, implementation, and effectiveness. Sun Country Airlines focuses on vacation destinations taking vacationers to the tropical beaches of Mexico, Costa Rica, and the...

  • speaker photo
    Anton Towne
    CISO, Minnesota State Lottery
  • speaker photo
    Adnan Dakhwe
    Head of Security & Compliance, Vera
  • speaker photo
    Sujata Ramamoorthy
    Sr. Director, Information Security, Cisco

    Sujata is a Sr. Director of Information Security at Cisco and leads the group. Sujata and her team partner across Security & Trust Organization, Supply Chain, IT and various Product teams to deliver foundational capabilities to secure Cisco’s business operations and Cloud Offers. This includes establishing security standards, partnering to bu...

  • speaker photo
    Jimmy Sanders
    Head of Information Security, Netflix DVD

    Jimmy has spent the better part of two decades securing data and systems from cyber threats. In addition to his duties at DVD.com, Jimmy has served as the San Francisco Bay Area chapter president of the Information Systems Security Association (ISSA) since 2014. He is also on the ISSA International Board of Directors. Furthermore, he has been...

  • speaker photo
    Robert Troup
    Executive Sales Manager, baramundi Software USA Inc.

    Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex netw...

  • speaker photo
    Bruce Sussman
    Director of Media & Content, Podcast Host, SecureWorld

    Emmy-winning journalist Bruce Sussman spent more than 20 years on TV screens in Portland, Oregon. During his "second career," he became fascinated by cybersecurity while working with CISOs at Gartner. He joined SecureWorld in 2017 to help grow its media division. Currently, he hosts the Remote Sessions daily web conference series and SecureWo...

  • speaker photo
    Miles Edmundson
    Business Information Security Officer, Equinti

    Miles has spent over 20 years in senior and executive leadership positions building cybersecurity programs with global and national companies across a variety of vertical markets. He has experience in risk assessments, remediation prioritization, business continuity management/disaster recovery, incident response, policy/standard development,...

  • speaker photo
    John Schiel
    Principal InfoSec Engineer, CenturyLink

    John has over 12 years of hands-on experience in network and information security and security architecture. John was the primary DDoS architect and provided direction and support to Network Operations on how to best protect CenturyLink’s network from DDoS attacks. He has decades of cross functional network and application experience and toda...

  • speaker photo
    Julie Tsai
    Information Security Leader
  • speaker photo
    Kurt Aubuchon
    Founder and Principal Consultant, Portunus Consulting

    Kurt is a computer forensics and incident response consultant and an Assistant Professor of Cybersecurity at Maryville University. He has been in the IT field for nearly 20 years, with the last 11 focused on information security.

  • speaker photo
    Lan Jenson
    CEO, Adaptable Security, Communications Director for (ISC)2
  • speaker photo
    Philip Martin
    VP of Security, Coinbase
  • speaker photo
    Charles Nwatu
    Director of Security, Stitch Fix
  • speaker photo
    Chris Sorensen
    Sr. Cybersecurity Researcher, GE Digital

    Chris Sorensen has been in the IT industry for over 30 years practicing a wide range of specialties in multiple industries. He started in the Defense industry as a system administrator and developer before progressing to the Education sector where he taught system administration and security. From there he moved into the Automotive world wher...

  • speaker photo
    Victoria Thomas
    Cybersecurity Awareness Program Leader

    Victoria L. Thomas is an award-winning senior leader with talent for designing, developing and implementing world-class, global cybersecurity awareness programs. With nearly 10 years experience, she brings a strong creative perspective to the field and provides practical solutions that not only build awareness, but also cultivate advocacy and...

  • speaker photo
    Ryan Aniol
    Deputy CISO, State of Minnesota

    Ryan Aniol is the Deputy CISO for the State of Minnesota. A cyber threat expert with over 19 years of cyber security experience, Ryan has specialized in cyber threat intelligence, threat actor profiling, incident response, penetration testing, and digital forensics spanning multiple industries. He is a recognized security researcher and thoug...

  • speaker photo
    Lothar Determann
    Partner, Baker McKenzie

    Lothar has been helping companies in Silicon Valley and around the world take products, business models, intellectual property, and contracts global for nearly 20 years. He advises on data privacy law compliance, IT commercialization, copyrights, open source licensing, electronic commerce, technology transactions, sourcing, and international ...

  • speaker photo
    Teresa Merklin
    Fellow, Cyber Risk Assessment, Lockheed Martin

    Teresa Merklin is a Principal Information Assurance Engineer for Cybersecurity Engineering at Lockheed Martin Aeronautics, where she is responsible for technology identification and evaluation for aeronautics platforms. Teresa holds a BS in Electrical Engineering from Oklahoma State University, a Masters of Software Engineering from Texas Chr...

  • speaker photo
    CSO Council
  • speaker photo
    Tim Wittenburg
    Information Security Officer, FPX, LLC

    Tim Wittenburg is the Information Security Officer at FPX, LLC, a B2B company providing industry-leading CPQ software that improves sales force productivity by preparing complete and accurate product quotations. As ISO, Tim is responsible for the delivery of a catalog of security and compliance services based on industry leading cybersecurity...

  • speaker photo
    Co-Presenter: Joseph Szmadzinski
    CEO, IT Management Resources

    Joseph R. Szmadzinski has served as interim and permanent CIO (over 12 times) or as an advisor to the chief executive teams/ officers to troubleshoot, restructure, and manage client systems during turnaround, growth, and profit improvement efforts. Joe has served clients in a wide variety of industries, including financial services, transport...

  • speaker photo
    Milinda Rambel Stone
    VP & CISO, Provation Medical

    Milinda Rambel Stone is an executive security leader with extensive experience building and leading security programs, including Information Security Governance, Vulnerability Management, Incident Investigation & Response, Security Awareness, and Risk Management & Compliance. With significant experience in creating and managing large-scale in...

  • speaker photo
    Donald Smith
    Principle Security Architect, CenturyLink

    Donald Smith is responsible for technology leadership, proposals, and strategic direction. His contributions include DCID 6/16, NISPOM chapter 8, DNS changer working group (DCWG), Conficker WG, and numerous security BCPs and RFCs. He has been a SANS handler since 2002. He has spoken at many conferences; including NANOG 33,42,52,71; University...

  • speaker photo
    Moderator: Kristin Judge
    CEO & President, Cybercrime Support Network

    Kristin Judge founded the nonprofit Cybercrime Support Network in 2017 to be a voice for cybercrime victims. She's a national speaker, sharing cybersecurity best practices with elected officials, businesses, and consumers. She's appeared on the C-SPAN Network and local news outlets, and been called on by numerous technology publications, to s...

  • speaker photo
    Tam Nguyen
    Cybersecurity Engineer, CISSP, MS, MCS, MA, U.S. Department of Health and Human Services

    Tam Nguyen is an IEEE and ACM peer-reviewed cybersecurity researcher whose with recent publications on Software Defined Network's security (CSNet - Paris, France), and instructional design evaluation of CEH v10 Online Course (IC4E - Tokyo, JP). Tam's research interests include large-scale cyber threat modeling, cyber behavioral science, and a...

  • speaker photo
    Michael Landeck
    CISO & Executive Director, Social Interest Solutions

    Mike Landeck led the security implementation and then operationalized two of the country’s largest cloud-based healthcare IT projects. He has been responsible for the overall security of systems with financial transactions of over $4 billion per month, as well security programs regulated by HIPAA, SOX, PCI, FISMA (NIST 800-53), the IRS (FTI I...

  • speaker photo
    Peter Chestna
    CISO of North America, Checkmarx

    Pete Chestna serves as the CISO of North America at Checkmarx, where he provides customers and prospects with practical advice for building successful application security programs. Bringing more than 15 years of direct AppSec practitioner experience, Pete has held roles ranging from developer and development leader to his most recent positio...

  • speaker photo
    Ryan Mostiller
    Sr. Manager, IT Security, BorgWarner

    Ryan has nearly 10 years of experience in defending large enterprise environments, specializing in Windows and Active Directory environments. Ryan has responsibility for Incident Response, Vulnerability Management, and the Management of all Security Tools and Controls. Ryan is a proud double alumnus from Oakland University as well as husband ...

  • speaker photo
    Skip Hansen
    Vice President of IT Operations, APi Group, Inc.

    Keith ‘Skip’ Hansen is the Vice President of IT Operations at APi Group Inc., a multi-billion-dollar parent company to more than 40 independently managed life safety, energy, specialty construction and infrastructure companies located in over 200 locations worldwide. Skip is responsible for aligning APi’s information technology strategy with ...

  • speaker photo
    John Bass
    Director, Global Data Risk, Duff & Phelps

    John W. Bass is a director in the Global Data Risk Practice at Duff & Phelps. John is an acknowledged thought leader on risk management, the human dimensions of cyber risk, and insider threats. John was a Central Intelligence Agency (CIA) National Clandestine Service (NCS) operational executive with 27 years in national security and internati...

  • speaker photo
    Jeremy Barnett
    SVP, Marketing and Business Development, NAS Insurance

    Jeremy Barnett is Senior Vice President of Marketing and Business Development for NAS Insurance, based in Los Angeles. Jeremy works across all NAS lines of business including Cyber, Specialty Products and Reinsurance solutions to provide brand strategy, product marketing, sales training, and producer support. Barnett is responsible for all co...

  • speaker photo
    Ernie Hayden
    Founder & Principal, 443 Consulting LLC

    Ernie Hayden is the Founder and Principal of 443 Consulting LLC. He holds a CISSP, CEH, GICSP (Gold), and PSP. Ernie's consulting experience includes work on every continent except Antarctica.

  • speaker photo
    Mark Langford
    Principal Consultant, Aberfoyle Associates

    Mark is the Founder and Principal Consultant at Aberfoyle Associates, a Plano based cybersecurity consulting firm. Mark is a Board Member of the North Texas ISSA, was recently inducted into Infragard, and is called upon periodically to speak at cybersecurity industry events. He holds a Bachelor’s Degree in Management from Clemson University a...

  • speaker photo
    Justin Berman
    CISO, Zenefits

    Justin is the CISO at Zenefits. Previously he lead security at Flatiron Health, lead security architecture at Bridgewater Associates, and built business at Aspect Security. He focuses on data and adversary driven approaches to security, and on centering security in business value.

  • speaker photo
    Steve Brown
    The Bald Futurist, Former Chief Evangelist and Futurist, Intel

    Steve Brown is an energetic speaker, author, strategist, and advisor with over 30 years of experience in high tech. Speaking at events all over the world, Steve helps his audiences to understand the business and societal impacts of new technologies and how they will shape the future five, ten, and fifteen years from now.

    Steve is passi...

  • speaker photo
    Judy Quinton
    Information Security Officer , CIBC Bank USA

    Judy Quinton is a driven professional and highly-skilled executive who is responsible for implementing innovative risk-based problems that address cybersecurity requirements while meeting strategic goals. Judy joined The PrivateBank, now known as CIBC Bank USA, as the Information Security Officer in 2011. Before that she worked at Xerox, HSBC...

  • speaker photo
    Torsten George
    Sr. Director, Product Marketing, Centrify

    Torsten George is a security evangelist at Centrify and frequent speaker on cybersecurity, identity and access management, and risk management strategies worldwide. He regularly provides commentary and byline articles for media outlets, covering topics such as data breaches, incident response best practices, and effective cybersecurity defens...

  • speaker photo
    Zoe Lindsey
    Customer Advocacy, Duo Security

    Zoe Lindsey is Duo Security’s Advocate Manager, where she educates and advises organizations with unique compliance challenges including the healthcare, government, and financial industries on strong security policy and best practices. She has been hooked on tech since getting her first Commodore 64 at age 10, and joined Duo with a background...

  • speaker photo
    Mikal Hass
    President, (ISC)2 Atlanta Chapter
  • speaker photo
    Fatih Orhan
    VP, Threat Labs, Comodo Cybersecurity

    With more than 15 years of experience in the technology industry, Fatih Orhan brings a great deal of expertise to his role as director of Comodo Cybersecurity’s Threat Research Lab (CTRL). Working with over 200 security analysts, Orhan and his digital intelligence team are committed to using the best combination of cybersecurity technology an...

  • speaker photo
    David Benton
    Director, The American Society of Digital Forensics & eDiscovery (ASDFED)

    In 1994, David began his investigative career as a Counterintelligence Special Agent. During his tour, he conducted numerous investigations across multiple continents. After the military, he joined the Georgia Bureau of Investigation and left as a supervisor on their computer evidence recovery team. He worked for a fortune 25 company and late...

  • speaker photo
    Richard Devera
    Security Architect, Check Point Software Technologies, Inc

    Richard Devera is the Security Architect at Check Point Software Technologies, Inc.. His background includes 20+ years of industry security experience. Richard is involved in providing best practices security strategies for all areas in networking. He is considered on of the thought leaders within the company providing strategic and technolog...

  • speaker photo
    Pierre-Olivier Fur, CISSP
    Cybersecurity Manager, Radware

    Pierre is a Cybersecurity Manager for Radware, where he brings 20 years of experience in the Information Security space. He holds a Master Degree in Computer Science and is a CISSP. Wearing various hats over the years as programmer, open source security expert, cryptography evangelist, network security architect, and CISO. Pierre is currently...

  • speaker photo
    John Shaia
    Director, Steiner Electric Company

    John has over 30 years of experience in information technology with leadership in data center operations, software development, change management, network infrastructure, security, business continuity, acquisition integration, and transforming technology teams to become business focused.

    Currently, John is a Director at Steiner Electri...

  • speaker photo
    Charles Williams
    Solutions Architect, Trend Micro

    With over 17 years in security and compliance, Charles is a technology evangelist enabling customers globally from a pre-sales and post-sales perspective to ensure proper deployment and configuration of endpoint, gateway, and datacenter security solutions.

  • speaker photo
    Kim Dale, CISSP, CISA
    IT Audit Specialist , Federal Reserve Bank of Chicago

    Kim Z. Dale is an IT Audit Specialist at the Federal Reserve Bank of Chicago. Her previous work experience includes Northwestern University, the US Government Accountability Office (GAO), US Steel, and Management Science Associates. Additionally, she is a freelance writer, speaker, and playwright. Ms. Dale earned a master’s degree in informat...

  • speaker photo
    Mary Kavaney
    Chief Operating Officer, Global Cyber Alliance

    Ms. Kavaney is the Chief Operating Officer for the Global Cyber Alliance (GCA), where she manages the daily operations of GCA, including strategy, personnel and legal responsibilities. She also engages in partnership development and outreach. Previously, Ms. Kavaney worked at the Center for Internet Security, where she developed relationships...

  • speaker photo
    Aimee Larsen Kirkpatrick
    Global Communications Officer, Global Cyber Alliance

    Aimée Larsen Kirkpatrick is the Global Communications Officer for the Global Cyber Alliance (GCA), where she is responsible for strategic communications for the international nonprofit. Prior to GCA she was President of ALK Strategies, a communication and public affairs consulting practice. Aimée was formerly with the National Cyber Security ...

  • speaker photo
    Alexandra Panaretos
    Americas Lead for Human Cyber Risk and Education, EY

    With a background in broadcasting and operational security, Alex specializes in secure communications and education, awareness program development, the psychology of social engineering, human-based risk mitigation, and behavior analytics. She has over 12 years of experience developing and implementing security awareness, communication, and ed...

  • speaker photo
    Jeff Butler
    Founder, JButler International

    Jeff Butler is a speaker, author and passionate millennial who helps organizations improve their relationships with millennial employees. Unlike other experts on millennials, Jeff has been in the trenches of what it means to be a millennial and what it takes to retain and keep them engaged. With Jeff ‘s versatile background, he has helped for...

  • speaker photo
    Gary Johnson
    Sr. Director of Cybersecurity and IT Infrastructure, Kansas City Power & Light

    Gary Johnson is a US Army veteran who has over 30 years of IT experience. He is the Sr. Director of Cybersecurity and IT Infrastructure for Kansas City Power & Light. Prior to that he spent 10 years at Cerner Corporation helping build their IT Infrastructure for the first five years and then led their security program the last five. He has a ...

  • speaker photo
    Kenneth Geers
    Senior Fellow, Atlantic Council

    Kenneth Geers (PhD, CISSP): NATO Cyber Centre Ambassador, Atlantic Council Senior Fellow, Digital Society Institute-Berlin Affiliate, TSN University of Kyiv Professor, Ukraine. 20 years US Government (US Army, NSA, NCIS, NATO); FireEye Senior Global Threat Analyst. Author “Strategic Cyber Security”, Editor “Cyber War in Perspective”, Editor “...

  • speaker photo
    Tighe Burke
    Partner, Jobplex

    Tighe Burke is a Partner and Cybersecurity Practice Lead with Jobplex Inc. in Denver, securing the next-generation of leaders on behalf of technology clients around the globe. Tighe has developed powerful domain expertise executing searches for InfoSec functional roles as well as on behalf of security providers.

    He previously spent 5 ...

  • speaker photo
    Ryan Ewing
    Special Agent, FBI Kansas City Division

    Special Agent Ryan Ewing has been with the FBI for over 8 years with assignments within Cyber Task Forces in the Miami Field Office, Columbia Field Office and Kansas City Field Office. He has had investigative cases for Cyber Criminal matters as well as Cyber National Security matters. Through the FBI continuing education program, he has held...

  • speaker photo
    Steven Shalita
    Vice President, Marketing and Business Development, Pluribus Networks

    Steven Shalita has 20+ years of technology experience across the Enterprise, Cloud and Service Provider technology segments. He has market and technology expertise spanning across Cybersecurity, network security, forensics, SDN/NFV, and IT infrastructure. He has spent a considerable amount of time in the performance monitoring marker and was ...

  • speaker photo
    Celia Cortes
    President, Seva 6 Security Consulting

    Celia Cortes, is a Certified Forensic Interviewer (CFI), Licensed Private Investigator, and an Interviewer & Interrogations instructor. She has an extensive background in corporate security, investigations, security design, and personal safety. She is adept at planning, strategizing, and executing security and surveillance operations.

  • speaker photo
    Aaron Deacon
    Founder & Managing Director, KC Digital Drive

    Aaron Deacon is the founder and managing director of KC Digital Drive, a nonprofit civic organization with a mission to make Kansas City a digital leader and help cities adapt to disruptive technology change. He works with mayors, entrepreneurs and civic leaders in Kansas City and around the world to help build ecosystems that connect infrast...

  • speaker photo
    Donna Vieira
    Security Risk and Compliance Analyst, Johnson County (KS) Government

    Donna Vieira , CRISC, has been an Information Security Awareness Professional for since 1999. She is a Certified Risk and Information Systems Control (CRISC) through ISACA, which is designed for IT professional with hands-on experience with risk identification, assessment, evaluation, response and monitoring.

  • speaker photo
    Justin Daniels
    Attorney, Baker Donelson

    Justin Daniels is a thought leader in cybersecurity who believes cybersecurity must be treated by the c-suite as a strategic enterprise business risk. He provides strategic advice to companies to help them understand cyber risk and create a comprehensive approach to address it. Justin is general counsel to one of the largest enterprise data c...

  • speaker photo
    Jon Neiditz
    Partner & Cybersecurity Practice Leader, Kilpatrick Townsend

    Jon Neiditz co-leads the Cybersecurity, Privacy and Data Governance Practice at knowledge asset protection law firm Kilpatrick Townsend & Stockton LLP. Jon has been named a “Cybersecurity Trail Blazer” by the National Law Journal and a Ponemon Fellow, is listed as one of the Best Lawyers in America® both in Information Management Law and in P...

  • speaker photo
    Joseph Muniz
    Cisco, Security Architect

    Joseph Muniz is an architect at Cisco Systems and security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and US Government. Joseph runs thesecurityblogger website, a popular resource for security and product implementation. He is the author and contributor of sev...

  • speaker photo
    Scott Swanson
    Board Member & Sector Chief Program Leader, InfraGard Chicago Members Alliance

    Scott Swanson is a former cleared national security intelligence professional who has focused for the past decade on Business Risk Intelligence and Financial Crimes as a thought leader and practitioner. He currently works for PwC’s Financial Crimes Unit, is certified in Fraud Investigations, Mobile Forensics, Anti-Money Laundering, and focuse...

  • speaker photo
    Norman Comstock
    Managing Director, UHY Advisors TAP, Inc.

    Norman is President and Managing Director of UHY Advisors TAP, Inc., a subsidiary of UHY Advisors, bringing over 25 years of experience in strategic consulting services. Norman advises clients on enterprise risk management, IT assurance and governance, and cybersecurity. He is also an Instructor for courses in Business Ethics, and Governance,...

  • speaker photo
    Mia Boom-Ibes
    Vice President, Information Security Strategy, Innovation and Analytics, Allstate Insurance Company

    Mia Boom-Ibes is Vice President, Security Innovation, Strategy and Analytics, ATSV for Allstate Insurance Company. In this role, she is responsible for Allstate's cybersecurity strategy and priorities. She manages relationships with key business and technology stakeholders to ensure alignment and oversees architectural standards to enable con...

  • speaker photo
    James “Mark” Harless
    Special Agent, FBI

    SA Harless has been a Federal Law Enforcement Officer for 24 years, including 3 years as a Special Agent with The U.S. Air Force Office Of Special Investigation (AFOSI), and 21 years as a Special Agent with the FBI. SA Harless has over 11 years of leadership experience as an FBI Supervisor, and has a broad law enforcement background in matte...

  • speaker photo
    Bruno Haring, CISSP, CIPT, CRISC, CISA
    Director and Market Leader, PwC

    Bruno is a Director and Market Leader with PwC’s Cybersecurity and Privacy practice based in Atlanta, GA. With over 21 years of experience, both nationally and internationally, in cybersecurity and IT risk management and transformation. Bruno helps Fortune 500 organizations navigate and address cybersecurity, IT, and governance risks, resulti...

  • speaker photo
    Brian Morovitz
    Director of Sales Engineering, Trend Micro

    For the past 10 years, Brian has helped organizations deploy and operationalize enterprise security solutions. With a background in customer success management, he built Trend Micro’s centralized premium support center of excellence in Las Colinas, Texas. Prior to Trend Micro, Brian led product launch, organizational change, process improveme...

  • speaker photo
    Moderator: Pamela Nigro
    Senior Director GRC, Blue Cross Blue Shield of IL

    Pamela Nigro, MBA, CRMA, CISA, CGEIT, CRISC, is a multifaceted, highly experienced IT Audit and IT Controls leader who brings unique experience with experience with external Big 4 auditing, and cost-effective management of corporate risk and regulatory compliance with the 4th largest health insurance company. Ms. Nigro is a subject matter ex...

  • speaker photo
    Moderator: Alisha Wenc
    Corporate Programs Manager, ISACA

    Alisha Wenc is the manager of corporate programs at ISACA. In her first year with ISACA, she launched the SheLeadsTech program, which has engaged over 1,000 members in its first 6 months. SheLeadsTech aims to increase the representation of women in technology leadership roles and the tech workforce. Alisha’s previous experience includes ex...

  • speaker photo
    Diana Salazar
    CISO, College of American Pathologists (CAP)

    My experience consulting with organizations, corporate and non-profit, navigate the new digital frontier advising on cyber security issues and building technology strategies that drive performance and business value. I have led and managed implementations for organizations in a wide variety of industries, Global 2000, Fortune 1000, small and ...

  • speaker photo
    Brenda Callaway
    Security Management and Risk Divisional Vice President, Blue Cross Blue Shield of Illinois
  • speaker photo
    Ted Claypoole
    Partner, Womble Bond Dickinson

    Lawyer, business adviser, lawfirm team lead for cybersecurity/privacy, licensing and FinTech, chair of American Bar Association, Business Cyberspace Law Committee, former in-house counsel for Bank of America and Compuserve, co-author of books Privacy in the Age of Big Data, and Protecting Your Internet Identity.

  • speaker photo
    Tauseef Ghazi
    Principal, RSM US LLP

    Ghazi currently serves as a principal in RSM’s security, privacy, and risk practice with more than 15 years of infrastructure security, system implementation and application security review experience. He leads RSM’s security, privacy and risk practice for the Central Region and leads RSM’s critical infrastructure practice nationally. In his ...

  • speaker photo
    Christopher Kar
    InfoSec Advisor, Fort Bend ISD

    Mr. Kar is the Information Security Advisor for Fort Bend ISD, the 7th largest school district in TX with ~74,500 students, ~11,000 employees and contractors spanning 80+ educational and administrative campuses. Chris has previously held leadership roles at both public and private sector organizations including Memorial Hermann, the U.S. Hous...

  • speaker photo
    Roy Wilkinson
    Principal, CISO/CIO Services, Rausch Advisory

    Roy Wilkinson, PhD, CISSP, CPCS, CHS-V, HISP, is a former CSO & CISO with 30+ years in Information Security and 25+ years in physical security. He is currently Principal for a virtual CIO/CISO practice with an executive advisory firm and was recently elected as Vice President of ISSA International. Dr. Wilkinson is a recognized security leade...

  • speaker photo
    Rene Kolga
    Sr. Director of Product Management, Nyotron

    Rene Kolga, CISSP, heads Product Management and Business Development for North America at Nyotron. Prior to working at Nyotron, Rene was Head of Product at ThinAir. Rene also spent eight years at Symantec where he managed multiple enterprise security product lines in the areas of encryption and endpoint security. Additionally, Rene led dozens...

  • speaker photo
    Rebecca Finnin, Moderator
    AVP, Chief Security Office, AT&T

    Rebecca Finnin is an Assistant Vice President in the Chief Security Office of AT&T. During her tenure, she has served in a variety of information security and privacy roles.

    Ms. Finnin has led teams to embed security features into the software defined network, developed tools to allow DevOps teams to self-identify relevant security r...

  • speaker photo
    Lynn Goodendorf
    Director, Information Security / CISO, Mandarin Oriental Hotel Group

    Lynn Goodendorf is the Director of Information Security for the Mandarin Oriental Hotel Group with a global scope of responsibility for the information security program at all hotels and corporate offices. She is known for a strategic and risk-based approach with over 25 years of leadership in technology, cybersecurity, data privacy and risk ...

  • speaker photo
    Paul Brager
    Technical Product Security Leader, Digital Technology, BHGE (Baker Hughes, a GE Company)

    Paul W. Brager, Jr has been a contributing member of the cyber security community for over twenty-three (23) years, with expert level knowledge of security architecture and defense-in-depth design, critical infrastructure/industrial cyber, IoT, and IIoT. He has extensive cyber experience in the oil and gas, manufacturing, power utility, chemi...

  • speaker photo
    Brian Engle
    CEO, Riskceptional Strategies

    Brian A. Engle, CISSP, CISA Founder and CEO Riskceptional Strategies Brian Engle is an experienced security and risk management professional who works with business leaders to create and implement successful strategies for implementing sustainable risk-based information security programs. Prior to founding Riskceptional, Brian led the Retail ...

  • speaker photo
    James Waters
    Global CISO, Black & Veatch

    Currently the Global CISO for Black & Veatch and responsible for the security of all things digital/cyber within the enterprise. Previously the Chief IT Strategist and Security Director for HNTB, and prior to that as Senior IT Architect for the Federal Reserve.

  • speaker photo
    Daniel Reither
    Manager, Information Security, Health Partners Plans
  • speaker photo
    David Ruess
    Information Security & Incident Response Team Lead, Wawa Inc.
  • speaker photo
    Louise O’Donnell
    Sr. Information Technology Manager, TD Ameritrade
  • speaker photo
    Pete Lindstrom, Instructor
    Leader in Cybersecurity Strategy, Innovation, and Economics

    Pete Lindstrom has an extensive expertise in cybersecurity but is best known as an authority on strategic cybersecurity topics such as metrics, estimating risk, and measuring the benefit of security programs. He focuses on applying these core economic and risk management principles to new cybersecurity architectures and platforms. Pete has ov...

  • speaker photo
    Blake Collins
    Director of Clinical Engineering, Christiana Health Care System

    Blake Collins has been in the Health Technology field for over 27 years and the health care industry for over 34 years. He retired from the United States Navy after 21 years in 2004. He received his basic and advanced BMET training in Aurora, Co. at the United States Army Medical Equipment and Optical School. After retirement, he became a Reg...

  • speaker photo
    Chris Thielet
    Account Executive, Wombat Security

    Chris has over 15 years' experience in training program development. For over two years at Wombat he has worked with security professionals in over 22 countries to plan, develop, and implement successful cybersecurity education programs. These programs have focused on phishing simulations, training methodologies, and engaging end users to red...

  • speaker photo
    Sonia Arista
    Principal, Healthcare Strategy: Governance, Risk and Compliance, GuidePoint Security

    Sonia E. Arista is a seasoned Information Security and Technology specialist with over 20 years' experience. As a management consultant with Dell Services and Perot Systems she has worked internationally in the financial, healthcare, telecommunications and manufacturing verticals. She has also served as a senior information technology directo...

  • speaker photo
    Michael Podemski
    Senior Manager in the Risk Advisory Services Practice, Ernst & Young LLP

    Michael Podemski, CISA, CISM, CRISC, CIPM, CIPT, is a Senior Manager in the Risk Advisory Services practice of Ernst & Young LLP. He focuses on managing and delivering high-quality IT assurance and advisory engagements, including financial statement audits/internal controls over financial reporting (SOX 404), pre- and post-implementation syst...

  • speaker photo
    Frank Downs
    Director, Cyber Information Security Practices at ISACA and DoD Instructor

    Downs, an 11-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity were two very different concepts, Frank pro...

  • speaker photo
    Arlene Yetnikoff
    Director of Information Security, DePaul University

    Arlene Yetnikoff is the Director of Information Security for DePaul University, which offers numerous degrees in Computer Science, including Masters and Bachelor's in Information Security fields. Arlene has worked in Information Security for many years as a consultant, educator and hands-on practitioner. Today, Arlene leads DePaul's Informati...

  • speaker photo
    Thomas Hart
    CISO, Cyber Guide LLC

    Thomas F Hart - Tom has been in the IT field since 1978(EDP), starting as a programmer trainee (Assembler and COBOL). First computer worked on was an IBM360 system (PCs were a long way off). He has been a Programmer, Systems Analyst, Operating Systems Programmer, Network Systems Programmer, DR / BCS Specialist, IT Auditor, GRC, Sr. Security A...

  • speaker photo
    Nicholas Davis
    Technical Product Manager, Rapid7

    Nick Davis began his career at Rapid7 in 2013 as a Software Engineer building InsightIDR. In this role, he was focused on building key detections and establishing scalability across the platform to keep up with a growing user base. Now, as the Technical Product Manager for InsightIDR, Nick works closely with engineering, SOC Analysts, and cus...

  • speaker photo
    Nuno Sousa
    Strategic Engineering Manager, Check Point Software Technologies, Inc.

    Nuno is the Check Point Strategic Engineering Manager in the Northeast. 10+ years of experience in the cybersecurity industry. He has held various positions in the vendor, system integrator and private sector including Security Engineer, Security Architect, Security Consultant and now managing Check Point SE’s responsible for Check Point’s la...

  • speaker photo
    Moderator: Mark Aiello
    Board Member, (ISC)2 Eastern Massachusetts; President, CyberSN

    Having more than 30 years of IT and cybersecurity consulting/staffing experience, Mark joined Signature Consultants, one of the largest IT Staffing Firms in the U.S., to lead, build and cultivate the cybersecurity talent and workforce throughout the organization’s 26 locations, serving 100s of clients throughout North America. Former Presiden...

  • speaker photo
    Chris DeMale, CFA
    Strategic Account Executive, ISACA

    Chris DeMale, CFA is a Strategic Account Executive for ISACA, where he serves enterprises across the globe on ISACA’s full suite of assessment, training, and cybersecurity products, and as a dedicated technical resource with expertise in the financial services sector. Before joining ISACA, Mr. DeMale served as Senior Vice President at Blueroc...

  • speaker photo
    Cindi Carter
    CISO & C-Suite Advisor, Check Point Software Technologies

    Cindi Carter is a global, multi-industry Cybersecurity and Information Technology Executive who consistently seeks the optimal outcome for any endeavor. As a transformational leader from startups to enterprises, she excels at building cybersecurity practices in highly-regulated industries, turning strategic goals into actionable outcomes, and...

  • speaker photo
    Sara Flores
    Deputy CISO, FNBO Bank
  • speaker photo
    Lewie Dunsworth
    CISO, H&R Block
  • speaker photo
    Akshay Finney
    Associate, Meditology Services

    Akshay Finney is an IT Risk Management Associate who specializes in Security risk assessments and Medical Device Security. As an Associate, he works closely with the Risk Management Team to assess and identify the client’s risks, and guide them in mitigating the identified risks. He also specializes in security and network operations to provi...

  • speaker photo
    Tyrone Jeffress
    Director of IT Risk Management, Meditology Services

    Tyrone is an experienced consultant who has over 12 years’ experience advising covered entity and business associate clients on cybersecurity, privacy and compliance matters. His expertise includes HIPAA security risk assessments, HITRUST certification, SOC 2 certification, security governance and strategic planning, vendor risk management an...

  • speaker photo
    Bob Bennett
    Chief Innovation Officer, City of Kansas City, MO

    Bob Bennett became the Chief Innovation Officer for the City of Kansas City, Missouri, in January 2016 after a 25-year career in the US Army. He leads the Smart City initiatives, a suite of projects including: data analysis, Public Wi-Fi, digital kiosk installation, and smart lighting programs in the city’s downtown core. Kansas City’s initia...

  • speaker photo
    Diane Glick
    Investigative Auditor, State of Texas

    30+ years experience in auditing and investigating white-collar crimes. Currently employed by Texas Office of Attorney General Medicaid Fraud Control Unit. Assisted Harris County DA in successfully prosecuting a case of cash theft of $150,000. Hold ACFE, CIA, and CGFM certifications. Past President of Houston Chapter, ACFE. Business Administr...

  • speaker photo
    Josh Sokol
    Information Security Program Owner, National Instruments

    Josh Sokol, CISSP, graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies, including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as the Information Security Program Owner at National Instruments. In his cur...

  • speaker photo
    Robert McKosky
    Asst. Professor, Drexel University

    Dr. Robert McKosky served as the Director of Information Security at MBNA America and was the Technical Program Director for the Network Infrastructure Laboratory at GTE. He has organized and participated in various simulated attacks (Tiger Teams) to identify weaknesses in security systems. Mac has consulted to the CTIA, NSA, Secret Service, ...

  • speaker photo
    Stephen Jones
    Vice President Managed Services, GuidePoint Security

    Stephen is the Vice President of Managed Services at GuidePoint Security and began his career in Information Security, Information Technology Management, Vulnerability Management, and Security Operations Center (SOC) operations. Before joining GuidePoint Security, Stephen worked for ManTech International at a large federal agency managing SOC...

  • speaker photo
    Matthew Gardiner
    Principal Security Strategist, Mimecast

    Matthew Gardiner is a Director of Security at Mimecast and is currently focused on email & web security, phishing, awareness training, malware, and cloud security. With more than 15 years focused in security, Matthew’s expertise in various roles includes threat detection & response, network monitoring, SIEM, endpoint threat detection, threat ...

  • speaker photo
    Katie Stebbins
    Vice President for Economic Development, University of Massachusetts President's Office

    Katie Stebbins is the Vice President for Economic Development at the University of Massachusetts. She serves as a liaison to the business community, establishing and growing research and workforce development partnerships to benefit the university and the Commonwealth of Massachusetts. Representing UMass, the state’s second-largest employer a...

  • speaker photo
    Edward Moses
    Associate Executive Director, Kennesaw State University

    Edward Moses, MS MBA CISSP CISA GSNA GCIH GPEN PCIP is the Associate Executive Director of Cybersecurity for Kennesaw State University.

  • speaker photo
    Britney Kennedy
    Global BISO & Director of Business Partnership, Cardinal Health

    Britney began the first decade of her security career in the U.S. Army where she managed over 90 teams and traveled to assess the security of international government partners. She oversaw the Information Security Department for AMC Theatres where she was responsible for the development and implementation of the global strategy. She has since...

  • speaker photo
    Ravi Thatavarthy
    VP & CISO, BJ's Wholesale Club

    Ravi Thatavarthy brings 20+ years of experience in Information Security to his role with a strong background in Security Architecture and building Security programs from ground up. His approach to Information Security is unique and well-balanced with a focus on ‘Business Value’ and ‘User Delight’. He recently appeared in ‘Profiles in Confiden...

  • speaker photo
    Rex Johnson
    Director of Cybersecurity, BKD CPAs & Advisors

    Rex is a strategic and technical leader with more than 25 years of experience in security and privacy, enterprise risk management, security management and operations, IT governance, application development, internal and external audit, regulatory compliance, and controls assurance. He has served as the lead executive with responsibility for p...

  • speaker photo
    Steven "Doc" Simon, PhD
    Professor, IT / Captain, US Navy (Ret), Mercer University

    Steven “Doc” Simon was commissioned in the Navy in October 1989. He served his first tour aboard the USS BLAKELY (FF-1072), homeported in Charleston, SC earning his Surface Warfare Qualification. Upon de-commissioning of the Blakely he cross-decked to the USS SAMUEL ELLIOT MORRISON (FFG-13) before being assigned to Naval Construction Force, ...

  • speaker photo
    Yaron Levi
    CISO, Dolby Laboratories

    Yaron Levi is the CISO for Dolby Laboratories. Prior to joining Blue KC, he was CISO of Blue Cross and Blue Shield of Kansas City; a Director of Information Security for Cerner Corporation; an Information Security Business Partner for Intuit; an Information Security Architect and Product Manager for eBay; and a Director of Cloud Security for ...

  • speaker photo
    Jim Benanti
    Sr. Partner, Consulting Engineer, Arbor Networks

    Jim comes to Arbor with over 20 years in the security field as a Pre-Sales Engineer, Sales Representative, Competitive Analyst, and Solutions Consultant. He has been with Arbor for the past six years, where he currently is a Sr. Partner Consulting Engineer.
    Jim received his Bachelor’s degree from Clarion University of Pennsylvania and h...

  • speaker photo
    Nir Valtman
    Head of Application Security, NCR Corporation

    Nir Valtman heads the application security of the software solutions for NCR Corporation. Before the acquisition of Retalix by NCR, Nir lead the security of the R&D in the company. As part of his previous positions, he was working in several application security, penetration testing and systems infrastructure security positions. Nir is a freq...

  • speaker photo
    Amy Baker
    VP of Marketing, Wombat Security Technologies

    Amy Baker, Vice President of Marketing at Wombat Security Technologies, has been in the information technology and security industry for almost 20 years and has been specifically focused on info security awareness and training for the last several years. Amy led the development of Wombat’s Best Practices Methodology for Security Education pro...

  • speaker photo
    John Kveragas
    Owner, TJM Professional Services, LLC

    John E. Kveragas, Jr., CPA, CISA, is a seasoned Internal Audit Executive with over 20 years’ experience in IT, operational, financial, and compliance auditing in multiple industries. John has extensive expertise with building effective internal audit functions, training and development, and managing regulatory exams with positive outcomes for...

  • speaker photo
    Michael Hoehl
    Security Leader, Independent Consultant

    Security Leader with experience in Health, Manufacturing, Financial Services, and Retail Industries.

  • speaker photo
    Frank Duff
    Cybersecurity Engineer, MITRE

    Frank Duff is a principal cyber operations engineer at MITRE. His work has focused in endpoint security and cyber deception. He is the current principle investigator of the Leveraging External Transformational Solutions research and development effort that seeks to assist the integration of innovative commercial cybersecurity solutions into o...

  • speaker photo
    Devon Bryan
    Executive Vice President and System CISO, Federal Reserve System

    Devon Bryan is Executive Vice President and Chief Information Security Officer (CISO) for the Federal Reserve System. As CISO, Devon oversees information security, including incident response, for the enterprise, ensuring information security architecture, standards, policies, and programs remain effective and efficient. Devon was appointed S...

  • speaker photo
    Tim Hill
    Director, Product Management & Strategy, Centrify Corp

    Tim Hill joined Centrify in the fall of 2017 as the Director of Product Management & Strategy, he is a US Air Force Veteran who post military joined Amp Inc./TE Connectivity Inc. through the embattled years as part of Tyco International Inc., as their Information Security Manager, and M&A team member, later at PHEAA as the VP of Enterprise Se...

  • speaker photo
    Vana Khurana
    Sr. Solutions Architect, Security Specialist, Cloud Security Alliance Delaware Valley

    Vana Khurana is CISSP, AWS Certified Architect (A), CCSP, CCSK, GSEC, and TOGAF certified. Vana serves as Director of Training and a Board Member of Cloud Security Alliance Delaware Valley Chapter. She is also an Adjunct Faculty at Temple University, Philadelphia. Vana has authored the book "IT Process Management," available on Amazon.

  • speaker photo
    Penny Chase
    Sr. Principal Scientist, MITRE

    Penny Chase is in the Cybersecurity Solutions and Information Technology Technical Centers at The MITRE Corporation. She leads MITRE’s support to FDA on medical device cybersecurity and preparedness and response, and is developing a Common Vulnerability Scoring System rubric tailored to medical devices.

  • speaker photo
    Margie Zuk
    Sr. Principal Cybersecurity Engineer, MITRE

    Margie Zuk is in the Cybersecurity Solutions and Information Technology Technical Centers at The MITRE Corporation. She leads MITRE’s support to FDA on medical device cybersecurity and preparedness and response and is developing a Common Vulnerability Scoring System rubric tailored to medical devices. Margie has a Bachelor of Arts in Mathemat...

  • speaker photo
    Happy Hour
  • speaker photo
    Michael Thelander
    Director of Product, Venafi

    Michael has a 20-year history in product marketing and product management, with a focus over the last seven years on cybersecurity. He held senior product marketing and product management roles at security leader Tripwire, and has other career highlights that include co-founding a successful startup and receiving patents for network technolog...

  • speaker photo
    Tom Plummer
    Cybersecurity Fellow, Lockheed Martin

    Cybersecurity Fellow to provide architecture guidance across products and programs. BS Computer Engineering. CISSP.

  • speaker photo
    Katie Greer
    CEO, KL Greer Consulting, Featured on: CNN, The O'Reilly Factor, Inside Edition, The Huffington Post, TIME Magazine, USA Today and more

    Previously of the Massachusetts Attorney General's Office and MA State Police, Katie Greer travels the country presenting to hundreds of thousands of law enforcement, communities, school staff/administration and students on the trends, safety and best digital safety/social media practices. Katie serves as a media industry expert, and has been...

  • speaker photo
    Brian Harrell
    Assistant Director, Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency (CISA), DHS

    Brian Harrell was appointed by the President of the United States in December 2018 to serve as the Department of Homeland Security’s Assistant Secretary for Infrastructure Protection. Brian now serves as the first Assistant Director for Infrastructure Security within the newly renamed U.S. Cybersecurity and Infrastructure Security Agency (CIS...

  • speaker photo
    Brian Shield
    CIO, Boston Red Sox

    Brian is responsible for the strategic direction of technology and day-to-day IT operations in support of the Boston Red Sox, their fans, and Fenway Sports Management.

  • speaker photo
    Joanne Kossuth
    CIO, Mitchell College

    Currently Joanne acts as the Chief Information Officer for Mitchell College with responsibility for academic, administrative, and enterprise computing and library information services. Joanne also serves as principal in her consulting services company, 1MountainRoad, which specializes in strategic business process re-engineering; aspirant and...

  • speaker photo
    Ben Levitan
    CEO, Cedalion Partners

    Ben Levitan serves as CEO of Cedalion Partners, a Management Advisory firm to Investors, Boards, and CEOs. Ben serves as Board Director of OGSystems, a GEOINT solutions company, and Bricata, a cybersecurity company. Ben has more than 25 years of leadership experience, having served as CEO or COO of five companies—in venture, growth equity, an...

  • speaker photo
    Vincent Campitelli
    Regional Partner with Coopers & Lybrand (now PWC), Former IT Risk Manager, Goldman Sachs, Wells Fargo, and McKesson

    Vince has extensive experience in the converged fields of information technology and risk management. As a Regional Partner with Coopers & Lybrand (now PWC) he was a member of a small team of partners who led the adaptation of technology into the traditional fields of accounting and auditing. Post public accounting, he applied his mastery of ...

  • speaker photo
    Alejandro Languren
    Information Security Officer, DLL Group

    Alejandro is a cybersecurity professional, experienced in Information Security, IT Infrastructure, and Software Development areas—with working experience in multinational organizations covering positions in the United States and Latin America. Currently working in a world class financial organization, with continuous collaboration with divers...

  • speaker photo
    Cheryl Carmel, Moderator
    Owner, Carmel Consulting LLC

    Ms. Carmel is a member of (ISC)2 where she holds her CISSP, and IAPP where she holds her CIPT. She is a member of InfraGard and has been on the Advisory Council for SecureWorld for many years.

    Ms. Carmel began her career in technology with experience in application development, infrastructure operations, technical support, and teachin...

  • speaker photo
    Stefanie Parente
    Chief Privacy Officer, Large Financial Institution

    Stefanie Parente is currently Chief Privacy Officer (CPO) at a large financial institution. Prior to that she was the CPO for Viewpost, an invoicing and payments platform. At Viewpost, she ensured that the company met their regulatory and contractual obligations regarding privacy, information security, and marketing, while also maintaining th...

  • speaker photo
    James Lam
    Director, E*Trade Financial

    James Lam is the president of James Lam & Associates and a director of E*TRADE Financial, where he chairs the risk oversight committee. He previously served as president of ERisk, partner of Oliver Wyman, chief risk officer of Fidelity Investments, and chief risk officer of GE Capital Markets Services. Lam was named to the NACD Directorship 1...

  • speaker photo
    Carlos Morales
    Vice President, ASERT and Global Pre-Sales, Arbor Networks

    Carlos is responsible for Arbor’s Security Engineering & Response Team as well as the global pre-sales organization. ASERT is one of the industry’s most respected research organizations, responsible forproviding tactical and strategic threat intelligence to Arbor’s customer base and for curating ATLAS, Arbor’s global threat intelligence infra...

  • speaker photo
    Brian Selfridge
    Partner, Meditology Services

    Brian leads Meditology’s IT Risk Management practice and has advised hundreds of healthcare organizations across the country. Brian is based in Philadelphia and has over 15 years of experience in healthcare security and privacy. He is a frequent presenter and expert speaker on an array of healthcare security topics, including: ethical hacking...

  • speaker photo
    Lena Licata
    Director, EisnerAmper LLP

    Lena Licata is a Director in the Consulting Services Group, at EisnerAmper LLP, with over 10 years of experience including public accounting and private industry. She assists clients primarily in the financial services, providing a host of IT audit and risk services including identity and access management remediation, vendor risk and interna...

  • speaker photo
    Geoff Jenista
    Chief of Cybersecurity, Region 7, DHS CISA

    Mr. Jenista serves as the Regional Cyber Security Advisor for Region VII (IA, KS, MO and NE) for the Cybersecurity & Infrastructure Security Agency (CISA), Integrated Operations Division. Based in Kansas City, KS, he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation's criti...

  • speaker photo
    Levone Campbell
    Cyber Team Lead / Incident Coordinator, Aramco Services

    Levone Campbell is the Cyber Security Lead / Incident Coordinator for his organization. Levone holds two Bachelor degrees in Management and Marketing from North Carolina A&T State University, a Masters in Business Administration from Walden University, and a Masters in Technology Management from Georgetown University. He also holds numerous c...

  • speaker photo
    David Dumas
    Sr. Principal, Security Risk Management, Verizon

    David Dumas, CISSP, CISM, ISSA Distinguished Fellow, is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. He has 32 years in the security field, working at Digital Equipment and Verizon. He has been on the ISSA New England Chapter Board since 1998.

  • speaker photo
    Charlie Lobosco
    Co-Founder, The VisionOp Group LLC

    Charlie Lobosco is a Shared Leadership Expert, Certified Agile Expert, and (agile) coach and trainer—with lessons learned in over 25 fortune ranked companies. Since 1973, Charlie has been making a difference in the workplace even as one person!

  • speaker photo
    Stephen Head
    National Director – Cyber Risk Center of Expertise, Jefferson Wells

    As the National Director for the Cyber Risk Center of Expertise at Jefferson Wells, Stephen has broad-based experience in cyber risk, regulatory compliance, IT governance and aligning controls with multiple standards and frameworks. He is the author of the internationally recognized Internal Auditing Manual and Practical IT Auditing, both pub...

  • speaker photo
    Rebecca Rakoski
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski is the managing partner at XPAN Law Partners, LLC. Rebecca advises her clients on a proactive, multi jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She uses her extensive experience to work with her clients to create and tailor a security and privacy...

  • speaker photo
    Jordan Fischer, Instructor
    Cyber Attorney, Partner, Constangy, Brooks, Smith & Prophete, LLP

    Jordan Fischer represents clients in cross-border data management, creating cost-effective and business-oriented approaches to cybersecurity, data privacy, and technology compliance. Recognized as a Super Lawyers Rising Star – Technology Law, Jordan practices in many jurisdictions throughout the United States in both state and federal courts,...

  • speaker photo
    Conor Gilsenan
    Editor in Chief, All Things Auth, Founder, Two Factor Buddy (2FB)

    Conor Gilsenan is a software engineer who has spent the past eight years focusing on security. He has worn many hats, including: programmer, architect, specification author, and UX contributor. He believes that UX is a critical and historically discounted component of any security solution, and is passionate about putting users first. He is t...

  • speaker photo
    Gary Howell
    Director of Cybersecurity, The Babcock and Wilcox Company
  • speaker photo
    Lisa Tuttle
    CISO, SPX Corporation

    Lisa Tuttle has served as an executive leader of global organizations, managing technology teams with her engaging enthusiasm and unique combination of information security, privacy, legal, compliance, project management and business management expertise. As CISO of SPX Corporation, she provides technology vision and strategic leadership for ...

  • speaker photo
    Amirali Sanatinia
    PhD Candidate / Research Assistant, Northeastern University

    Amirali Sanatinia is a Computer Science PhD candidate at Northeastern and holds a Bachelors degree in Computer Science from St. Andrews University. His research focuses on security and privacy, and has been covered by publications such as MIT Technology Review, Ars Technica, and Threatpost. He is a recipient of RSAC Security Scholar and the C...

  • speaker photo
    Peter Iancic
    VP, Threat & Vulnerability Management Officer, The Bancorp

    Peter has over 10 years of experience in cybersecurity, working for financial industry companies such as JP Morgan Chase and The Bancorp. He holds multiple certifications, including CISSP, CEH, and CHFI.

  • speaker photo
    Brian Cyprian
    Special Agent for the Cyber Intrusion Squad, FBI Charlotte Division

    Brian N. Cyprian has been the supervisor for the FBI’s Charlotte Cyber Task Force since March 2016. He worked at FBI Headquarters managing national security computer intrusion investigations prior to arriving in Charlotte. Brian has a B.S. in Computer Information Systems and an MBA in Commerce from Texas A&M University.

  • speaker photo
    Roy Zur
    Former Major in Israeli Intelligence Forces, CEO and President, Cybint Solutions/BARBRI

    Roy Zur is a cyber intelligence expert, an attorney, and the founder and CEO of Cybint Solutions, a cyber education company. Roy has over a decade of experience in cyber and intelligence operations from the Israeli security forces (Retired Major), and has developed cyber education programs and technological solutions for companies, educationa...

  • speaker photo
    Thornton May
    Futurist, Author & Professor, Named "One of the top 50 brains in technology today" by Fast Company

    Thornton is one of America’s premier executive educators, designing and delivering high impact curricula at UCLA, UC-Berkeley, Arizona State University, The Ohio State University, Harvard University, the University of Kentucky, Babson, and the Olin College of Engineering. His programs mine the knowledge of the audience delivering practical in...

  • speaker photo
    Doug Cassle
    Director, InfraGard CyberCamp

    Doug Cassle is a Board Member of the Charlotte InfraGard chapter and is the Director of the 5th annual Charlotte InfraGard CyberCamp. Doug has an extensive background and currently works for Palo Alto Networks as a Security Specialist. Doug is a highly accomplished professional with a successful 13-year career defining strategies to deliver s...

  • speaker photo
    Brent Chapman
    Chief Information Officer / Chief Information Security Officer , RoundPoint Mortgage Servicing Corporation

    Brent Chapman is a successful technology executive with 17 years’ experience and currently serves as Chief Information Officer and Chief Information Security Officer of RoundPoint Mortgage Servicing Corporation. Mr. Chapman is the senior leader responsible for technology and information security, developing short and long term corporate strat...

  • speaker photo
    James Kidwell, Moderator
    Vice President, Security & Infrastructure, E4E Relief
  • speaker photo
    Javed Ikbal
    CISO & VP, Information Security & Risk Management, Bright Horizons

    Javed Ikbal is the CISO at Bright Horizons. Prior to that, he held CISO positions at Upromise Rewards, GTECH, and Omgeo, and brings 20 years of information security experience in financial services, gaming, and scientific research sectors. He specializes in building or re-engineering information security programs, regulatory compliance, appli...

  • speaker photo
    Vani Murthy
    Risk Consultant, Cloud Security Alliance working groups contributor

    Vani Murthy (CISSP, CRISC, PMP and ITIL) is a Risk Consultant with over 17 years of experience in IT. Vani holds a MS and an MBA. She also contributes to the Cloud Security Alliance working groups.

  • speaker photo
    Sue Bergamo
    CIO & CISO, BTE Partners

    A global CIO & CISO, Sue brings broad technology and operational experience to help companies secure and grow through innovation, and optimization in cloud, on-prem environments and acquisition. She’s held strategic positions at Microsoft, ActiveCampaign, Precisely, Episerver, Aramark, and CVS Pharmacy. Sue is the author of "So, You Want to b...

  • speaker photo
    Scott David
    Director of Technology, Center for Information Assurance and Cybersecurity, University of Washington

    Scott L. David, J.D., LL.M., is the Director of Policy at the Center for Information Assurance and Cybersecurity (CIAC) at the University of Washington. Scott is a member of the World Economic Forum's Global Futures Council on Digital Economy and Society, and the WEF Initiative on Ethics of AI and Machine Learning. Previously, Scott worked as...

  • speaker photo
    Brandon Swafford
    CTO, Insider Threat, Engineering, Forcepoint

    Brandon has 12 years of experience in legal, counterintelligence, and financial security across worldwide organizations. He has worked with hedge funds, the US Intelligence community, and the International Monetary Fund.

  • speaker photo
    Jean Pawluk
    Executive Consultant, ISSA Distinguished Fellow

    Jean is an Executive Consultant, ISSA Distinguished Fellow, and honored as a 2015 SC Magazine “Woman of Influence”. With a global focus on strategy, architecture, and technology in the high tech and financial industries, she alternates between technical and executive leadership roles. Once focused on security and cryptography for the financi...

  • speaker photo
    Aravind Swaminathan
    Partner, Cybersecurity & Data Privacy, White Collar, Investigations, Securities Litigation & Compliance, Orrick LLP

    Aravind Swaminathan is global co-chair of the firm's Cybersecurity & Data Privacy team, which was named Privacy Practice Group of the Year in 2016 by Law360, and is nationally ranked by The Legal 500 in two categories. Aravind earned "particular praise" from Legal 500, as part of a team known for being "extremely responsive and client focused...

  • speaker photo
    Christopher Williams
    Advisory Solutions Architect, RSA

    Christopher is a leading voice in the convergence of operational IT practices and Identity, Audit, and Compliance programs. His career features 15 years as a practicing manager of data centers, operations & technical services and consulting teams for fortune 500 companies and DOD contractors; plus another 20 years of technical services, pro...

  • speaker photo
    Zach Forsyth
    Security Architect, Juniper Networks

    Zach Forsyth thrives on understanding advanced threats and designing solutions to combat them. His 20-year career has focused on malware delivery and weaponization, advanced malware prevention, next generation firewalls, automation, threat hunting, deception networks, adversarial response systems, intrusions, exploits, social engineering and ...

  • speaker photo
    Aaron Weller
    Co-Founder & VP, Strategy, Sentinel, LLC
  • speaker photo
    Jim Montgomery
    Principal Engineer, Trend Micro, Inc.

    Jim Montgomery has been securing Enterprise infrastructure for over 25 years. Jim has worked in all facets of the IT industry and holds several OS and security related certifications. Jim has spoken at numerous events across the country including, VMUG, ISSA, RMSIC and ISACA. As a Sales Engineer for Trend Micro, He currently assists Enterpris...

  • speaker photo
    Moderator: Michael T. Metzler
    Sr. Compliance Officer, CenturyLink Business

    Michael (CISSP, CGEIT, CISM) has over 35 years of industry experience delivering security consulting service internationally in security policy, security risk management, network design, and troubleshooting. He has designed global networks and provided security consultation for many corporations, as well as for U.S. Defense contractors and f...

  • speaker photo
    Gary Southwell
    GM & VP Security Products Division , CSPi
  • speaker photo
    Simon Gibson
    Fellow Security Architect & CISO, Gigamon

    Simon Gibson is a Fellow Security Architect at Gigamon. He provides security strategy and technology roadmap direction for Gigamon products that secure physical and virtual network traffic. Simon has been working on Internet infrastructure for nearly 20 years. From small ISP’s , to developing streaming media technology at AOL/Time Warner and ...

  • speaker photo
    Ryan Peters
    Chief Data Scientist & Development Director, BluVector

    As BluVector’s Chief Data Scientist, Ryan Peters leads the company’s efforts in data science and analytics-related efforts for updating and improving the product’s malware detection engines. Peters’ contributions have included rewriting most of the company’s supervised machine learning engine, developing “In-Situ Learning” to allow customers ...

  • speaker photo
    Kevin R. Klein
    Director, Colorado Division of Homeland Security and Emergency Management

    Kevin R. Klein is the Director of the Colorado Division of Homeland Security and Emergency Management, and Governor Hickenlooper’s Homeland Security Advisor. Kevin has been involved in public safety for over 30 years, and is well versed in the homeland security and emergency management issues facing the nation.

  • speaker photo
    Evan Glaser
    Account Executive, Darktrace
  • speaker photo
    Ken Donze
    Principal Sales Engineer, Trend Micro, Inc.
  • speaker photo
    James Christiansen
    VP, CSO - Cloud Security Transformation, Netskope

    James Christiansen is Netskope’s vice president of cloud security transformation and leader of the Global Chief Strategy Office. He is focused on enhancing Netskope’s global clients understand the challenges and solutions of cloud deployments by helping drive thought leadership in cloud security transformation.

    James brings extensive e...

  • speaker photo
    Grant Sewell
    Head of Information Security and Privacy, Safelite Group

    Grant Sewell manages the Information Security and Privacy program at Safelite Group, the largest provider of vehicle glass repair, replacement, and calibration services in the United States. He serves on the board of directors for the Retail & Hospitality ISAC, the Central Ohio Chapter of (ISC)², and has held information security leadership r...

  • speaker photo
    Cynthia Wright
    Principal Cybersecurity Engineer (The MITRE Corporation), CEO (Synthus, Inc.), The MITRE Corporation

    Cynthia Wright is a retired military officer with over 20 years’ experience in national security and cyber strategy. She also co-developed a methodology to assess the cyber needs of developing nations, and assisted DHS in drafting the National Cyber Incident Response Plan and incentivizing market-driven approaches to cyber risk management.

  • speaker photo
    Dr. Jacob Rubin
    CISO | Executive Advisor, EVOTEK

    Jacob Rubin is a successful security and risk executive with broad Fortune-class experience in technology, manufacturing, hospitality, healthcare, and consulting. Academically, Jacob holds a Doctorate of Philosophy and double Master’s degrees with a primary field of study in Behavioral Cyber Security. Jacob focused his dissertation work on th...

  • speaker photo
    Jim Wanserski
    Mobile Threat Prevention Sales Manager, Check Point Software Technologies, Inc.

    Jim has over 23 years of sales experience, from Technology Networking and Telecom to Mobile Applications and now Mobile Security.

  • speaker photo
    Frank Simorjay
    Distinguished Fellow, ISSA

    Frank Simorjay (CISSP, ISSA Distinguished Fellow) is a cloud security and compliance subject matter expert. Frank works for Microsoft Azure global ecosystem organization as the Lead PM of the Azure automation Blueprint program, that includes the PCI automation blueprint. Frank has written an extensive library of papers, and blogs (http://clou...

  • speaker photo
    Olaf Stein
    Solutions Architect - Security Specialist, Sumo Logic
  • speaker photo
    Chris Vaughn
    CISO, Unify Square

    Chris Vaughn is an information security and risk management leader with two decades of experience developing information security strategies and programs for international organizations. He is the Chief Information Security Officer (CISO) at Unify Square, the leading provider of software and managed cloud services for Microsoft Skype for Bus...

  • speaker photo
    Frank Vianzon
    Director of Security Architecture and Engineering, Instructor, OWASP Board Member, Red Rocks Community College

    Frank Vianzon works for a large corporation as the Director of Security Architecture and Engineering. He also writes and teaches courses for Red Rocks Cybersecurity Program, including Vulnerability Assessment. Frank has also served on the Board for the Denver Chapter of OWASP.

  • speaker photo
    LTC John Sutherland, PhD
    Sr. Client Technology Architect, CenturyLink

    John is a Senior Technology Architect at CenturyLink, a retired US Army intelligence officer, a former Defense Attaché, and SE Asian Foreign Area Officer fluent in Vietnamese with over 26 years of experience in information security and political-military operations. CISM, CISSP.

  • speaker photo
    JP Hill
    President , (ISC)2 Dallas/Fort Worth Chapter

    JP Hill works for Secutor Consulting and is the Chief Information Security Officer responsible for executive advisory services in auditing, enterprise architecture, metrics generation and analysis, security control assessments, penetration testing, certification and authorization cloud solutions, threat and vulnerability management, policy de...

  • speaker photo
    Bruce Lobree
    Security & Privacy Information Systems Leader, Philips

    Bruce Lobree has participated in and managed technical security, technical architecture, audit and consulting, teams as a first level manager up to having Global responsibilities at an executive level managing multi-million programs. He has working experience in government, retail, financial, software and utility industries generating cost ef...

  • speaker photo
    T.J. Adamowicz
    Sr. Solutions Engineer, North America, Mimecast

    An IT professional for over 15 years with more than half of that time dedicated to email, T.J. has worked in the university and financial sectors before coming to Mimecast, where he engages with many organizations in protecting against email-borne threats.

  • speaker photo
    Shaun Drutar
    Security Manager, Fujitsu

    A leading security practitioner with over 18 year of experience in cybersecurity, forensics, and incident
    response. Shaun leads security practice and persuits for a global technology organization.

  • speaker photo
    Kacy Zurkus
    Cybersecurity Writer, Cybersecurity Ventures

    Zurkus is an influential cybersecurity writer, covering a variety of topics on security and risk for Cybersecurity Ventures and CyberDB. She’s contributed to a variety of publications including K12 Tech Decisions, CSO Online, CIO, and The Parallax. She authored a regular blog, Security Newb, for CSO Online. In addition, Zurkus has created con...

  • speaker photo
    Chuck Davis
    Adjunct Professor of Computer Foresnics and Ethical Hacking, University of Denver

    Chuck Davis teaches ethical hacking and computer forensics graduate courses in the University of Denver's computer science program. Mr. Davis holds the CISSP-ISSAP, he has co-authored two books, has 8 patents, 3 patents-pending and 9 invention disclosures. Mr. Davis is frequently interviewed by various media on the subject of cybersecurity. ...

  • speaker photo
    Adrian Liu
    Director, Alliances and Business Development, Gigamon

    Adrian is the Director of Alliances and Business Development at Gigamon, where he is responsible for Gigamon’s Ecosystem Partners. Adrian has over 20 years' experience in the Security and Networking Industries, having worked at various hi-tech startups and large corporations in the Silicon Valley. Adrian holds a Bachelor’s Degree in Business ...

  • speaker photo
    James Carpenter
    CISO, Texas Scottish Rite Hospital for Children

    James Carpenter is a Healthcare Information Technology & Security Professional with 20 years of IT leadership experience. James is currently the Director of Information Technology & Security for Texas Scottish Rite Hospital for Children in Dallas, Texas. Over the course of his career James has created and led healthcare information security ...

  • speaker photo
    Jeff Whitney
    Certified Computer Examiner, CTIN

    Jeff Whitney is a Certified Computer Examiner at eDiscovery Inc. in Bellevue, Washington. Most of his work is for civil litigators on either the plaintiff or defense side and he has testifying experience.

  • speaker photo
    Allison Goodman
    Certified Computer Examiner, CTIN

    Allison Goodman is a Certified Computer Examiner at eDiscovery Inc. in Bellevue, Washington. Allison is the President of CTIN, a local non-profit organization that provides training to other digital examiners. She is also a dialogue leader for the Sedona Conference WG1 on transparency and cooperation in the discovery process. Most of her w...

  • speaker photo
    Doc Blackburn
    IT Risk and Compliance Manager/SANS Instructor, University of Colorado Denver/SANS Institute

    Doc Blackburn has over 30 years of experience in system and software design, server and network administration, and programming. Doc ran a successful consulting firm until he found his passion was in cybersecurity. He has vast experience at various levels of information technology from technical support to security leadership roles.

  • speaker photo
    Deanna Locke
    Sr. Enterprise IT Compliance & Risk Trainer, Bellevue College

    Deanna Locke, CIPP, CISSP, CISA, ITILv3, is a privacy/security professional with 25+ years combined IT, security, international privacy, Big 4 audit and cybersecurity advisory, and corporate risk and governance experience. Ms. Locke works with senior leadership to shift static, compliance-adverse, and vulnerable enterprise cultural behaviors...

  • speaker photo
    Ronald Watters
    Regional Cybersecurity Advisor, Region 10, DHS CISA

    Ron Watters currently serves as the Region X (WA, OR, AK, ID) Cybersecurity Advisor for the Stakeholder Engagement and Cyber Infrastructure Resilience Division of the Office of Cybersecurity and Communications (CS&C) National Protection and Programs Directorate (NPPD). Based in Seattle, WA, he supports the Department of Homeland Security (DHS...

  • speaker photo
    Esteban Morin
    Associate in Cybersecurity, Privacy and Technology Transactions Practice

    Esteban Morin is an attorney in Brownstein’s Cybersecurity and Technology Transactions, Licensing, Advanced Media and Privacy practice group. Drawing on years of experience in the private sector counseling large consumer-facing companies and in the public sector advising federal agencies, he provides clients with a unique perspective on priva...

  • speaker photo
    Tracy Lechner
    Shareholder and Head of Cybersecurity, Privacy & Technology Transactions Practice and Adjunct Professor of Law

    Tracy L. Lechner leads Brownstein’s Cybersecurity and Technology Transactions, Licensing, Advanced Media and Privacy practice groups. With more than a decade of in-house experience in the media industry, Tracy has a unique, inside understanding of the complexities that organizations face in monetizing their data and protecting their assets. S...

  • speaker photo
    Karl Weaver
    Business Development Director, Newport Technologies

    Mandarin Chinese-speaking, Mobile Device ecosystem specialist for the Smart Card sector of the Wireless industry. Newport Technologies is Karl’s public speaking vehicle to evangelize cutting edge mobile technologies within Greater China and Asia. Karl’s career in the Smart Card/Semiconductor ecosystem and embedded software World spans 13 ye...

  • speaker photo
    Philip Cox
    VP, Security & Compliance, Coupa Software
  • speaker photo
    Launa Rich
    Managing Director, CyberSN

    Managing Director Launa Rich specializes in cybersecurity recruiting services for the San Francisco office of CyberSN, a national specialized cybersecurity staffing firm. With a passion for Infrastructure and DevOps, Launa is excited to continue building her network as an integral member of the San Francisco cybersecurity community.

  • speaker photo
    Alan Levine
    Cyber Security Advisor, Wombat Security Technologies

    Alan Levine is the former CISO for two Fortune 500 companies, Alcoa and Arconic, with 20 years experience leading global cyber security programs. He has a BA from John Jay College of Criminal Justice, an MA from City College of New York, and is ABD from Carnegie Mellon University. Alan is currently an independent cyber security advisor, bas...

  • speaker photo
    Christopher Gorog
    CTO, BlockFrame Inc

    Christopher Gorog, CTO of BlockFrame Inc., Lead Faculty for Cyber Security at Colorado Technical University, and the host of the New Cyber Frontier Podcast, He is a published author, is an advisors to the Cyber Institute of the National Cybersecurity Center, and member of the BODs for Cyber Resilience Institute.

  • speaker photo
    Jim Sikes
    Sr. Solutions Engineer, Sumo Logic
  • speaker photo
    Lucia Milica Turpin
    CISO, Polycom
  • speaker photo
    Sheryl Rose
    Chief Information Security Officer, Catholic Health Initiatives

    Sheryl Rose, an experienced IT security and audit professional, has been Chief Information Security Officer since 2010 at Catholic Health Initiatives, a nonprofit, faith-based health system that is the nation's third largest, comprised of 103 hospitals and a variety of other health-based facilities spanning the inpatient and outpatient contin...

  • speaker photo
    Deon Mahaffie
    IT Security and Compliance Manager, Antero Resources
  • speaker photo
    Mary Haynes
    VP, Network Security Operations, Charter Communications

    Mary Haynes is the Vice President of Network Security Operations at Charter Communications. Mary currently leads the network security program for Charter’s core networks and Spectrum services, including High Speed Internet, Telephony, and Video products. Mary is also responsible for Charter’s Customer Security Operations, Law Enforcement Resp...

  • speaker photo
    Sara Avery
    LogRhythm
  • speaker photo
    Ben Feldman
    GDPR Solutions, OneTrust

    Ben Feldman serves on the GDPR Solutions team at OneTrust. In his role, Feldman manages relationships with leading enterprise organization's and provides resources to operationalize data privacy compliance. Prior to OneTrust, Feldman spent 3 years at a leading global provider of telecommunications services where he gained valuable experience...

  • speaker photo
    Cheyenne Goodman
    Regional Sales Director, SentinelOne

    Cheyenne Goodman is a Bay Area native & has worked in the field of cyber security for over 10 years. She has held positions at such industry leading names as McAfee & FireEye. She has a passion for helping customers address the complex challenges that we face in today's threat landscape.

  • speaker photo
    Jeremiah Cruit
    Chief Cyber Security Officer, Bremer Bank

    Jeremiah Cruit has been working in security for the past 20 plus years coving all aspects of security including penetration testing, incident response, infrastructure security and security management. Currently working as Chief Cyber Security Officer at Bremer Bank where he manages the teams that run all aspects of IT security.

  • speaker photo
    Randall Frietzsche
    CISO, Denver Health

    Randall’s career started as a Law Enforcement Officer. With the technical aptitude, he moved into technology, starting as an MCSE on Windows NT 4.0. Over the next 22 or so years, he evolved to become the Enterprise Chief Information Security Officer for Denver Health and Hospital Authority. He also teaches cybersecurity courses for Harvard an...

  • speaker photo
    John C. Powers
    Special Agent, Federal Bureau of Investigation

    FBI Agent in the Counter Intelligence and Insider Threat group.

  • speaker photo
    Gary Hopewell
    Computer Scientist, U.S. Department of Justice
  • speaker photo
    Andrew Gyenis
    Account Executive, Darktrace

    Andrew Gyenis is a Cybersecurity Account Executive at Darktrace, the world's leading machine learning company for cyber defense. He has worked extensively with clients across the numerous industry verticals, from Fortune 500 energy companies to the federal government, helping them deploy Darktrace's Enterprise Immune System, the only AI techn...

  • speaker photo
    William Sawyer
    Manager, CyberSecurity and Privacy, PwC

    Bill Sawyer is a Manager in PwC's Advisory Services. As a member of PwC’s Security Architecture Center of Excellence, he is responsible for developing and delivering PwC’s Security Architecture security offerings. Across his 17 year career, Bill’s experience in both consulting and industry includes application security, security architecture ...

  • speaker photo
    Parker Ashley
    Manager, Darktrace

    Parker Ashley is a Manager at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Finance to Aerospace, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to earl...

  • speaker photo
    Tim O'Brien
    President, (ISC)2 Silicon Valley Chapter

    Tim O’Brien is a 17-year information security professional and a subject matter expert in risk and
    incident management, intrusion and data analysis and secure architecture design. Tim is well versed in
    developing technical solutions, determining the best options for the business and its goals, and creating
    comprehensive impl...

  • speaker photo
    Mike Ehlers
    Global Director, Networking and Communications, VSecure360

    Mike Ehlers is the Director of Network Security & Communications at a global fortune 500 company. He has been in the IT industry for over 25 years, and provides consulting for enterprise corporations on cybersecurity strategies. Mike holds a BS/BA in Management Information Systems, with a Masters Certificate in IT Management.

  • speaker photo
    Michael Duff
    Chief Information Security Officer, Stanford University

    Michael completed his undergraduate and graduate degrees in physics and computer science at MIT. He founded a web-based EMR startup and later served as CTO of the acquiring organization. Michael taught computer science courses at Miami University, and then led the information security program at SRI International for the next 11 years. He joi...

  • speaker photo
    Jeffrey Pricher
    Enterprise Accounts, Security Engineer, Check Point Software

    Jeffrey Pricher has over 17 years of cybersecurity experience working in many different industries, and currently works for Check Point Software. He holds a master’s degree in Network Security, and serves part-time as a lead threat hunter for the Missouri Guard’s Computer Network Defense team, focused on providing security for the state’s cri...

  • speaker photo
    Matt Loeb
    CEO, ISACA

    Matt Loeb, CGEIT, FASAE, CAE, is chief executive officer of ISACA. Prior to joining ISACA, he completed a 20-year career as staff executive for the Institute of Electrical and Electronics Engineers (IEEE) and as the executive director of the IEEE Foundation. His experience includes enterprise strategy, corporate development, global business o...

  • speaker photo
    Kierk Sanderlin
    Director of Engineering, Check Point Software

    Kierk Sanderlin is the Director of Engineering at Check Point Software Technologies. He has been in the cyber security space for almost 20 years and has been a regular speaker at various cyber security events across the region.

  • speaker photo
    William J. Malik, CISA
    VP, Infrastructure Strategies, Trend Micro

    William Malik helps clients structure their IT environments to minimize the loss, alternation, or inadvertent exposure of sensitive information. His information technology career spans over four decades. Prior to Trend Micro, he worked at Gartner for twelve years where he led the information security strategies service and the application int...

  • speaker photo
    Ike Barnes
    Assistant to the Special Agent in Charge, U.S. Secret Service

    Assistant to the Special Agent in Charge (ATSAIC) Ike Barnes is a graduate of the United States Military Academy at West Point. After serving in the US Army, ATSAIC Barnes became a Special Agent with the Secret Service in 2000 and was assigned to the New York Field Office. While there, ATSAIC Barnes was a member of the New York Electronic Cri...

  • speaker photo
    Chris Fawcett
    Senior Bank Technical Analyst, State Farm Bank
  • speaker photo
    Mike Gibbons
    CISO, Edwards Jones
  • speaker photo
    Christine Figge
    Manager, RubinBrown LLP

    Christine has over 10 years of public accounting and consulting experience analyzing financial information and internal controls for companies. She manages SOC engagements for companies across a variety of industries. Her knowledge spans industries and includes working with companies directly as well as with third party service providers.

  • speaker photo
    Timothy Grace
    Director of Technology Risk Advisory Services, Mueller Prost

    Timothy M. Grace, CIA, CISA, CISM, CRISC, Director of Technology Risk Advisory Services - As the Technology Risk Advisory Services leader for Mueller Prost. Tim brings more than 30 years of business experience delivering solutions that drive business innovation, optimization, and change within world class organizations. He is a leader in the ...

  • speaker photo
    Louise Popyk
    Senior Technical Marketing Manager, Centrify
  • speaker photo
    Shanee Yelder
    IT Audit Specialist, Meadowbrook Insurance Group

    Shanee has Big 4 accounting firm and private sector (financial services) experience working as an IT Auditor. She holds a BS in Business Administration with a concentration in Information Systems Management and is currently pursuing a MBA.

  • speaker photo
    Gretel Egan
    Sr. Security Awareness Training Strategist, Proofpoint

    Gretel Egan is a senior security awareness training strategist for Proofpoint, a leading provider of cybersecurity services and solutions. She is a Certified Security Awareness Practitioner (CSAP) and has been working in technical, business, and consumer communications for more than 20 years. Gretel has extensive experience in researching and...

  • speaker photo
    Michael Hamilton
    Founder and President, Critical Informatics

    Mr. Hamilton is a former cybersecurity policy adviser to Washington State, CISO, City of Seattle, and VeriSign Managing Consultant.

  • speaker photo
    Bobby Buggs
    Mobility Expert, Check Point Software Technologies

    Bobby Buggs is a telecommunications professional that hails from Flint, MI. Bobby has worked in the mobile/wireless industry for over 19 years. Over the course of his career, Bobby has held numerous roles in both sales and technical disciplines. Bobby is also an MSU alumnus.

  • speaker photo
    Chris Morris
    Regional Expert, Threat Prevention, Check Point Software Technologies, Inc.

    Chris Morris is the Threat Prevention SME for Check Point's Central United States region. He has been in the IT industry for nearly 20 years, whose experiences include perimeter and endpoint security, network virtualization, disaster recovery, and network design.

  • speaker photo
    Sean Murphy
    Vice President and Chief Information Security Officer, Premera Blue Cross

    Sean Murphy is the Vice President and Chief Information Security Officer for Premera Blue Cross (Seattle, WA).

    He is responsible for providing and optimizing an enterprise-wide security program and architecture that minimizes risk, enables business imperatives, and further strengthens the health plan company’s security posture. He wor...

  • speaker photo
    Austin Winkleman
    Local Information Security Officer, Ascension Health

    Austin is currently the Information Security Manager for Ascension Health’s system office and five other service locations. He has worked over 30 years in IT, with over 20 years in non-profit educational and healthcare organizations.

  • speaker photo
    Bob Bacigal
    AVP, Information Security, Amerisure Insurance

    Bob Bacigal is the Assistant Vice President of Information Security at Amerisure Insurance. He has over 30 years of experience in information security management, risk management, incident response, disaster recovery, and business continuity planning. Prior to joining Amerisure, he held security management positions with Great Lakes BanCorp, ...

  • speaker photo
    Matt Olsen
    Former Special Counsel , Director of the Federal Bureau of Investigation

    Mr. Olsen also served at the Department of Justice in a number of leadership positions and was responsible for national security and criminal cases. He was a federal prosecutor for over a decade and served as Special Counsel to the Director of the Federal Bureau of Investigation.

  • speaker photo
    Mike Donofrio
    Director, IT Security & Compliance, Martinrea Inc.
  • speaker photo
    Patrick Turner
    Vice President and Chief Information Officer, Schoolcraft College

    Patrick Turner, VP & CIO at Schoolcraft College, oversees all areas of IT. Patrick has designed and implemented tier 3+ data centers. Patrick has presented on various topics at MMC, Cisco Academy and Data Center World conferences. Patrick holds MS (MIT) and BS (MTU) degrees in Mechanical Engineering.

  • speaker photo
    Kevin Peterson
    Director of Security and Network Transformation, Zscaler

    Kevin Peterson is the director or security and network transformation at Zscaler, where he primarily works with the largest cloud security deployments to ensure that the desired business objectives are achieved. He brings with him the advantage of having lead the security efforts for one of McKesson's (Fortune 10) major business units (75 sof...

  • speaker photo
    Joe Carusillo
    Program Director, Security Client Initiatives, IBM

    Joe Carusillo currently serves as Program Director of Client Initiatives for IBM’s Security Business Unit. His responsibilities include leading the team responsible for developing and driving the implementation of the strategy for vertical industry sales, consulting, solution development and thought leadership for IBM Security. They also in...

  • speaker photo
    Martin Bally
    VP & CSO, Diebold Nixdorf

    Martin Bally is currently the Vice President and Chief Security Officer for Diebold Nixdorf with more than 20 years of experience. Prior he spent four years in the legal and financial industry and 12 years at Chrysler. He holds a Master’s of Science in Information Assurance and the CISSP, CISM, CISO, and CRISC security certification.

  • speaker photo
    Adam Leisring
    Chief Risk Officer & CISO, Paycor

    Adam is the Chief Information Security Officer for Paycor, one of the largest independently held Human Capital Management companies in America. He oversees Information Security for Paycor’s 1,400 associates, as well as Paycor’s 30,000 clients of their award-winning SaaS product. In past positions, he has served in leadership roles including T...

  • speaker photo
    Shane Harsch
    Senior Solution Engineer, SentinelOne

    Shane Harsch is an Information Security professional with over 25 years of experience ranging from military to manufacturing to security consulting and professional services. He has managed and architected SOCs for the military and managed service providers and is a commissioned officer in the US Army, Military Intelligence. Shane holds degre...

  • speaker photo
    Eric Kapfhammer
    Founder and Executive Director, Metycus

    Eric Kapfhammer is a data scientist at Microsoft, where he focuses on applying statistical and machine learning approaches to computer and network security. Prior to joining Microsoft, Eric spent the previous decade in the quantitative trading space as a Managing Director and Portfolio Manager, leading teams of data scientists and software en...

  • speaker photo
    Russ McRee
    Principal Security GPM, Microsoft

    Russ McRee is Group Program Manager of the Blue Team for Microsoft’s Windows & Devices Group (WDG). He writes toolsmith, a monthly column for information security practitioners, and has written for other publications including Information Security, (IN)SECURE, SysAdmin, and Linux Magazine.

    Russ has spoken at events such as DEFCON, Der...

  • speaker photo
    Michael Stephen
    Security GRC Manager, Rightway Healthcare

    Michael Stephen is a 20+ year Cybersecurity and Privacy professional who has worked in multiple industries including telecommunications, healthcare, state and local government, finance and restaurant. His experience includes designing, building and supporting security solutions, and successfully implementing compliance and privacy programs to...

  • speaker photo
    Marco Fernandes
    Lead Security Architect, DXC Technology

    Born & raised in Dallas, Marco loved cyber security since youth, leading him to become a Security Architect after graduating from UNT. Marco also served as President of the North Texas Cyber Security Association to help upcoming security professionals. Marco’s hobbies include fitness, card games, & marksmanship.

  • speaker photo
    Jeffrey Groman
    Senior Manager, Mandiant Global Consulting Services

    Mr. Groman is a Senior Manager in the Mandiant Global Consulting Services organization and a senior member
    of the Mandiant Central Region leadership team. He is an Information Security veteran with over 18 years of
    experience as a practitioner, mentor, and trusted advisor. His primary focus is helping clients prepare for a
    s...

  • speaker photo
    Bob Vish
    Sr. Systems Engineering Manager, Check Point Software Technologies

    Bob Vish is a Senior Systems Engineering Manager for Check Point Software Technologies. Previously, Bob held IT leadership positions at Apple, Microsoft, Cisco, Intel, and FireEye. Bob was also a law enforcement officer specializing in cyber crime investigations for over 14 years.

  • speaker photo
    Megan Bell
    Founder, Mumuration, Inc.

    Megan Bell has 20+ years of experience in building data products and services, and 15+ working with regulated data. Currently, she consults on data anonymization, privacy-by-design, and security/ privacy analytics, as well as training programs for InfoSec analytics. Previously, she led a consulting practice focused on investigations, forensic...

  • speaker photo
    Matt Lawless
    Counsel - Global Privacy, Cybersecurity and IT Law, The Procter and Gamble Company

    Matt Lawless is a global privacy and information security attorney for The Procter & Gamble Company. He teaches information privacy law at the Northern Kentucky University Chase College of Law, the University of Dayton School of Law, and the University of Cincinnati College of Law. He has been recognized as an Ohio Super Lawyers “Rising Star,...

  • speaker photo
    Laura MacDonald
    Field CTO, RSA

    Laura MacDonald is a Field Chief Technology Officer with RSA, a Dell Technologies business. She is an extended member of the Dell Cyber Security Intelligence and Response Team (CSIRT), working to understand the latest threats in cyber espionage and attacks. With over 20 years’ experience in networking and information security, she consults an...

  • speaker photo
    Christopher Russell
    Enterprise Account Engineer, Trend Micro

    As an enterprise account engineer at Trend Micro Inc., Christopher Russell focuses on Hybrid Cloud and Data Security, xGEN Endpoint Security, and Network Security. Chris acts as a liaison between enterprise customers, the Trend Micro sales team, and the Trend Micro product teams, providing a hands-on, real-world perspective. Prior to joining ...

  • speaker photo
    Chase Norlin
    CEO, Transmosis

    Chase Norlin is the CEO of Transmosis and a veteran of the tech industry. He is dedicated to strengthening America's workforce through cybersecurity awareness training and technology training. Norlin is a national and international speaker on workforce development and cybersecurity.

  • speaker photo
    Katherine Britton
    Attorney, Law Office of Katherine Britton

    Katherine Elvira Britton is an attorney with a broad range of experience in regulatory compliance, corporate training and presentation and focuses her law practice on privacy and data security law, complex civil litigation, employment and human resources counseling, and consumer protection. Katherine advises clients and trains management and ...

  • speaker photo
    Craig Kaplan
    Cyber Security Account Executive, Darktrace

    Craig Kaplan is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Financial Services to Healthcare, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting...

  • speaker photo
    Aaron Schubert
    Security Infrastructure Manager, Office of Cyber Security, State of Missouri

    Aaron Schubert joined the State of Missouri in 2003 after graduating college in 2001 with a degree in Networking Systems Technology. His roles as both a network and Unix/Linux administrator reinforced an interest in the Office of Cyber Security, which he joined in 2009. Aaron is now responsible for the deployment, integration and administrati...

  • speaker photo
    Theresa Frommel
    Security Analyst, Office of Administration, IT Services Division, State of Missouri

    Theresa Frommel is a network security analyst for the Office of Administration, Information Technology Services Division for the State of Missouri. She is responsible for incident response and coordinating end user awareness for the SOC within the Office of Cyber Security. She has a background in access controls, policy development and end us...

  • speaker photo
    David Hartley
    Principal and Virtual CIO, UHY LLP

    Dave Hartley serves as a ‘Virtual CIO’ and ‘Virtual CISO’ helping clients with technology strategy and projects including strategic roadmap development, third party risk management including SOC reports, cyber risk assessments and cybersecurity programs, and digital transformation including cloud, mobile, etc. Dave joined UHY in 2015 followin...

  • speaker photo
    Kevin Hardcastle
    Associate CISO, Washington University in St. Louis

    Kevin Hardcastle, Chief Information Security Officer (CISO) for Washington University in St. Louis, is a member of the CIO Leadership team and serves a key role in University leadership, working closely with senior administration, academic leaders and the campus community. The CISO is responsible for the development and delivery of a holisti...

  • speaker photo
    Rob Fry
    Sr Architect, StackRox

    Rob Fry is an accomplished architect, inventor and public speaker with 20 years of experience. In his current role, he is part of the executive engineering team and oversees architecture and security detection strategy. Previously at Netflix, he patented a security orchestration platform and specialized in cloud security and automation. In hi...

  • speaker photo
    Douglas DeGrote
    Chief Information Security Officer, Allianz Life

    Senior Leader with 28+ years experience of delivering solutions and services in cyber security, risk management, enterprise architecture, business continuity, operations, development and program management.

  • speaker photo
    Christopher Rence
    President, Rimage Corporation; CSRO, Equus Holdings

    Christopher is President and CEO of Rimage Corporation. He has more than 25 years of experience leading global security and technology transformation for Accenture, FICO, Digital River, and EQ Holdings, with deep expertise in governance and compliance, business continuity and disaster recovery, cloud architecture computing, and sustainability...

  • speaker photo
    Dione McBride, CISSP, CIPP/E
    Consulting Director, PS Innovations

    Dione McBride is a data protection expert for PS Innovations, who consults, trains, and tutors customers in privacy, information security and operational processes across multiple regulatory standards. Formerly a CISO for a publicly held healthcare organization, her 15 years of information security experience started as a consultant and inc...

  • speaker photo
    Phil Lerner
    Professor, St. John's University, Distinguished Engineer, United Healthcare Group / Optum

    Phil Lerner has been a professor at St. John’s University for the past 10 years. He is the first Distinguished Engineer at United Healthcare Group. He has 26 years of progressive cyber, network and systems security experience in vast enterprises as a customer side senior technology leader. Phil provides consultative guidance and programmatic ...

  • speaker photo
    Victor Devine
    Principal Engineer, Trend Micro

    Victor Devine has been focused on IT Security for the last 10 years of his 20 year IT career. While playing a big role with securing data centers, endpoint protection and gateways; he joined Trend Micro as a Principle Engineer to expand client education on the importance of IT Security both in and out of the workplace. When he is not talking ...

  • speaker photo
    James Norberg, Moderator
    VP Segment & Technology Product Security, Humana

    James Norberg was formerly the Information Risk Management Director at Express Scripts and has been in the Technology field since 2002. His areas of responsibility include the Security Operations Center, Incident Response, eDiscovery, and Cyber Threat Intel & Hunting. He earned his undergrad from Drury University and MBA from Texas A&M. Curre...

  • speaker photo
    Marrci Conner
    CIS - Cybersecurity Program Lead, CyberPatriot Mentor, Henry Ford College

    Marrci has been a Full-time Faculty member of Henry Ford College for the past 10 years. She has over 15 years’ experience as an IT Professional specializing in computer Security. She currently teaches computer programming, digital forensics and cybersecurity courses. Her educational background includes a Bachelor's degree in Business Informat...

  • speaker photo
    Michael Roling
    Lead Technical Project Manager, US eDirect

    Michael Roling was the Chief Information Security Officer for the Office of Administration, Information Technology Services Division, for the State of Missouri since 2009. He led the Office of Cyber Security and was responsible for overseeing the information security posture for the State of Missouri.

  • speaker photo
    Barbara Hiemstra
    Privacy Engineer, IT Security and Compliance , Steelcase Inc.

    Barbara leads the Global Security Awareness/Phishing program to reduce risk and improve the cybersecurity culture at Steelcase. This includes creating content for employee awareness articles, training classes, and conducting multi-language phishing simulation and reporting.

    Prior to joining Steelcase, Barb was the Information Security-...

  • speaker photo
    Sean Henry
    Director of Sales, Bugcrowd

    Sean Henry has been in the cybersecurity industry since 2007 when he started his career in recruiting. Sean's career path includes being a key member of building out the east coast sales team at Rapid7. He was a Partner and helped launch CyberSN's go to market strategy around the Boston market. Sean has also had key stops at GuidePoint Securi...

  • speaker photo
    Swarnika Mehta
    Manager, KPMG LLP

    Swarnika- Swarnika is a Manager in KPMG’s Cyber practice a frequent speaker at global information security and governance, risk and compliance industry events. She leads Cyber Security and Governance, Risk and Compliance (GRC) related business transformation initiatives for technology and telecommunication industries in the PNW. She has over ...

  • speaker photo
    Eva Benn
    Program Manager 2, Microsoft

    Eva Benn is a Program Manager at Microsoft, responsible for coordinating some of the enterprise’s most critical governance, risk and compliance (GRC) efforts. With over 4 years of consulting experience, Eva brings a strong background GRC and Cyber program development, 3rd party risk management and RSA Archer technology solution enablement. He...

  • speaker photo
    Ravila White
    Deputy Director Strategic Programs, UHG

    Ravila Helen White is the Deputy Director of Strategic Programs – Enterprise Security Architecture for UHG. Prior to that, she headed up the information security programs for Providence Health & Services, The Bill & Melinda Gates Foundation and drugstore.com. Ravila has more than 15 years of professional IT experience, with experience as a st...

  • speaker photo
    Mitchell Parker
    Executive Director, Information Security & Compliance, Indiana University Health
  • speaker photo
    Moderator Shamoun Siddiqui, PhD
    VP & CISO, Neiman Marcus

    Dr. Shamoun Siddiqui is currently the Vice president and Chief Information Security Officer at the Neiman Marcus Group of companies located in Dallas, Texas. has been a leader in the information security space for over 15 years. He possesses a Bachelor’s and a Master’s degree in Mechanical Engineering and a Doctorate in Aerospace Engineering ...

  • speaker photo
    DrPH Gregory "Junkbond" Carpenter
    Owner, GCE, LLC

    Former NSA/CSS & retired military, owner: GCE, National & Cyber Security contributer - newsl.org, BOD ATNA Systems, International Board of Advisors MacKenzie Institute; radio host, author: Reverse
    Deception translated into 4 languages. Frequently on Fox, ABD & SiriusXM; International Keynote Speaker. Recipient of NSA Military Performer ...

  • speaker photo
    Hudson Jameson
    Co-Founder, Oaken Innovations

    Hudson Jameson is a blockchain enthusiast and smart contract developer exploring the intersection of decentralized technologies and security. He is the co-founder at Oaken Innovations, an IoT blockchain start-up that builds identity and security solutions to smart cities and IoT devices.

  • speaker photo
    Barry Caplin
    VP & CISO, Fairview Health Services

    Barry is the first CISO for Fairview Health Services. He has 35 years in technology/security, an MS in applied mathematics from Virginia Tech, and CISSP, ISSMP, CISA, and CISM certifications. Barry is a frequent speaker on a variety of security, safety and privacy topics. Follow him on Twitter @bcaplin and read his blog http://securityandcoff...

  • speaker photo
    David Strom
    President, David Strom Inc. 

    David Strom is one of the leading experts on network and Internet technologies and has written and spoken extensively on topics such as VOIP, convergence, email, cloud computing, network management, internet applications, wireless, and Web services for more than 30 years. He was the founding editor-in-chief of Network Computing magazine, writ...

  • speaker photo
    Robin Austin
    CTO / CISO, Colliers Group

    As a CTO/CISO, Robin is responsible for overseeing all technical aspects of the company including Cyber Security, Risk and Compliance. Using an active and practical approach, Robin oversees all employees in IT, IO and OT departments to attain the company's strategic goals established in the company's digital strategic plan. Robin has also bui...

  • speaker photo
    A. N. Ananth
    CEO, EventTracker

    As the co-founder and CEO of EventTracker, Ananth was one of the architects of the EventTracker SIEM solution. With an extensive background in product development and operations for telecom network management, he has consulted for many companies on their compliance strategy, audit policy and automated reporting processes.

  • speaker photo
    Robert Hergenroeder
    ESD Tech Analyst, Army Corp of Engineers - ACE-IT

    Hugh cyber security buff. Worked in Computer IT over the past 10 years and would like to do my part training people in online safety.

  • speaker photo
    Marcia Mangold
    Information Security Control Assurance Manager , Experian

    Marcia has spent the past 17+ years using her abilities to be a business enabler for IT and IS, and has worked for several organizations, including IBM, GE, and Blue Cross Blue Shield of Michigan. Marcia focuses on Information Security awareness training, risk, and policy lifecycle management. Marcia is a Certified Information Systems Securit...

  • speaker photo
    Scott Galt
    Partner, Armstrong Teasdale

    As a member of the firm’s International practice group and a Certified Information Privacy Professional/Europe (CIPP/E), Scott helps clients navigate overseas data protection waters in the wake of the Schrems decision, the advent of the EU General Data Protection Regulation (GDPR), and the ongoing Privacy Shield negotiations. Scott assists cl...

  • speaker photo
    James Beeson
    CISO, Cigna

    James has over 28 years of experience in cyber security and technology. He has 17 years of direct experience as an information security leader and is currently the Chief Information Security Officer at Cigna, a global health insurance company. James previously worked 20 years for General Electric in various security and technology leadershi...

  • speaker photo
    Demetrios 'Laz' Lazarikos
    Former CISO of vArmour, Sears, and Silver Trail Systems, Founder and IT Security Strategist, Blue Lava Consulting

    Demetrios Lazarikos (Laz), a recognized visionary for building Information Security, fraud, and big data analytics solutions, is the Founder and IT Security Strategist for Blue Lava Consulting.

    Laz has more than 30 years' experience in building and supporting some of the largest InfoSec programs for financial services, retail, hospital...

  • speaker photo
    John DiMaria
    STAR Program Director, Cloud Security Alliance

    John DiMaria has 30 years of successful experience in Standards and Management System Development, including Information Systems, Business Continuity, and Quality. John was one of the innovators and co-founders of the CSA STAR program for cloud providers, a contributing author of the American Bar Association’s Cybersecurity Handbook, and a wo...

  • speaker photo
    Craig Jackson
    Chief Policy Analyst, NSWC Crane Division

    Craig Jackson is Chief Policy Analyst at the Indiana University Center for Applied Cybersecurity Research and works with NSWC Crane Division and the NSF Cybersecurity Center of Excellence.

  • speaker photo
    Lieutenant Colonel Ernest Wong
    Asst. Professor of Systems Engineering, U.S. Military Academy, Research Scientist, Army Cyber Institute

    Ernest Wong is a Research Scientist at the Army Cyber Institute and a United States Military Academy Assistant Professor of Systems Engineering.

  • speaker photo
    James Farwell
    Counsel, Elkins PLC; Associate Fellow, Kings College, University of London

    James counsels clients in the areas of Cybersecurity and Privacy Protection. He has a CIPP/US certification from the International Association of Privacy Professionals. James advised the U.S. Department of Defense and U.S. Special Operations Command on cybersecurity and strategic communication. He served as consultant to the U.S. Department o...

  • speaker photo
    Jeff Stapleton
    VP Security Architect, Wells Fargo

    Jeff Stapleton is a security professional with 30 years’ experience in the financial services industry, focusing on cryptography and key management. He has been an ASC X9 standards participant during his career, developing dozens of informational security standards. Jeff has published a three-book series called Security Without Obscurity, wri...

  • speaker photo
    Alex Akyuz
    IT Consultant, CyberTimesToday.com

    Alex A. Akyuz
    BS - University of Detroit Mercy
    MS - Technology Studies Concentration in Information Security Management/Cybersecurity
    Professional Speaking Events
    -2015: Southeast Michigan Chapter of Fraud Examiners - Cybersecurity
    -2015: Keynote speaker for Secure World Detroit Conference - Cybersecurity: Past, ...

  • speaker photo
    Jacqueline Scarlett
    VP, Information Security, Financial Institution

    Over 20 years of experience within information technology management and information security applied within operations, cyber training and awareness and enterprise risk assessment and process auditing and partnering with financial services, automotive and legal industries. Proven track record developing, implementing strategies and systems ...

  • speaker photo
    Michael Muha, PhD, CISSP, CISM, CIPM, Certified GDPR Practitioner
    Chief Information Security & Privacy Officer, WorkForce Software

    Mike drove the global expansion of WorkForce Software’s cloud-based workforce management products from one data center to eight across the US, Europe, Canada, and Australia, and directed all compliance efforts (starting with SAS 70 and moving onto SOC 1, ISAE 3402, SOC 2, ISO 27001 certification, and EU-US Privacy Shield certification). Havin...

  • speaker photo
    Michael Kearn, CISSP, NSA-IAM
    Director, Threat Informed Defense, U.S. Bank Information Security Services

    As Managing BISO for Community Banking and Consumer Banking lines of business, he regularly consults with technology, risk and business executives as an information security subject matter expert. Mr. Kearn also manages the relationship between Community and Consumer Banking technical leaders, their teams and ISS. Mr. Kearn brings more than n...

  • speaker photo
    Andy Willingham
    Information Security Program Management, The Christ Hospital Health Network

    Andy has over 15 years' experience in information security. He has been in the trenches, building programs from the ground up, and helping the business understand risk and how to best manage it. He has been involved in both great and not-so-great audit engagements, and has learned from all of them. He currently serves as President of the Cinc...

  • speaker photo
    Rebecca Herold
    CEO, The Privacy Professor; CEO, Privacy & Security Brainiacs

    Rebecca Herold has more than 30 years of security, privacy, and compliance experience. She is founder of The Privacy Professor Consultancy (2004) and of Privacy & Security Brainiacs SaaS services (2021) and has helped hundreds of clients throughout the years. Rebecca has been a subject matter expert (SME) for the National Institute of Standar...

  • speaker photo
    Mark Testoni
    President & CEO of SAP National Security Services (NS2), President of NS2 Serves

    Testoni is among the nation’s leading experts in the application of technology to solve problems in government and industry, in the U.S. national security space. With more than 15 years of tech industry experience, 20 years in the U.S. Air Force and 30 years of public-sector management experience, Testoni is a sought-after business strategist...

  • speaker photo
    Jason Witty
    EVP & CISO, U.S. Bank

    Jason Witty is the EVP, CISO at U.S. Bancorp, providing singular accountability for information security controls in the company. An award winning CISO, Jason has 23 years of information security and risk management experience and was recently named the 2017 SecureWorld Ambassador of the Year in addition to a “CISO Superhero” at I.S.E. North...

  • speaker photo
    Steven Aiello
    vCISO, AHEAD

    Mr. Aiello holds a BA in Technology Management and a Master's of Science with a concentration in Information Assurance. Currently, he is a CISO with AHEAD, a consulting firm based in Chicago. Steven works closely with clients working across storage, virtualization and security silos.

  • speaker photo
    J. Wolfgang Goerlich
    Advisory CISO, Duo Security, Cisco

    J. Wolfgang Goerlich is an active part of the Michigan security community. He hosts a YouTube video series and the Encode/Decode Security podcast. Wolfgang regularly advises on and presents on the topics of risk management, incident response, business continuity, secure development life cycles, and more.

    Prior to his current role, Wolf...

  • speaker photo
    James Habben
    Digital Forensics Investigator , Verizon RISK Team

    James is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures.

  • speaker photo
    Hayden Williams
    Digital Forensics Investigator , Verizon RISK Team

    Hayden Williams is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Hayden responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures. Prior to Verizon Hayden worked as a DOD Special Agent performing Cyber invest...

  • speaker photo
    John Turner
    Senior Director, Cloud Security, Optiv

    John Turner is an accomplished IT executive with more than 20 years of leadership and operational IT experience. As the director of cloud security enablement at Optiv, Turner’s team of cloud architects are responsible for helping to ensure the successful integrated delivery of cloud security solutions. Turner plays a key part in bringing diff...

  • speaker photo
    Moderator--Bill White
    DevOps Revolutionary - Information Security, State Farm

    Bill is an Information Security professional with 30 years’ experience in IT, Fraud investigation, Information Security, and Risk Assessment processes. He is a member of the team responsible for Information Security architectural at a Fortune 50 company. He started as a bench technician while learning his way up to Information Security Manage...

  • speaker photo
    Justin Bauman
    Manager, IBM Cloud - Penetration Testing, IBM

    JJustin is currently a leader in Information Security for IBM Cloud and Watson Platform. With a background in red teaming and blue teaming over the past ten years, multiple degrees in his field, and SIEM and hacking certifications, he has affected positive change in securing some of the largest environments and cloud deployments in the world ...

  • speaker photo
    Chad Childers, Moderator
    Automotive Solutions Director, Sec eDGE

    Internationally recognized security thought leader. Expert on Threat Modeling, IoT Security, Threat Analysis and Risk Assessment (TARA), Cryptography, Application Security, and Agile Development Security.

    Chad is a voting member of SAE Vehicle Cybersecurity Committee TEVEES18A that shapes the future of automotive security and leading a...

  • speaker photo
    Natasha Taymourian
    Consulting Systems Engineer, Cisco
  • speaker photo
    Jason Lancaster
    Cloud Security Architect, CloudPassage

    Jason Lancaster is a Cloud Security Architect at CloudPassage where he helps customers implement security automation solutions in DevOps and Cloud environments. Jason has over eighteen years of experience working in information security. Previously he lead a team of researchers with Hewlett Packard Enterprise Security Research publishing rese...

  • speaker photo
    Nick Schilbe
    Sr. Director of Security Solutions, SentinelOne

    Avid Video game player turned video game hacker turned professional hacker. Joined WhiteHat Security at a young age and quickly became the head of their Threat Research Center. While at WhiteHat, Nick performed penetration tests on thousands of websites while creating new attack techniques to evolve the WhiteHat Sentinel platform. In 2014 ...

  • speaker photo
    Nathaniel Gleicher
    Head of Cybersecurity Strategy, Illumio

    As head of Cybersecurity Strategy, Nathaniel is responsible for thought leadership and Illumio’s cybersecurity technology strategy. Prior to Illumio, Nathaniel managed and secured networks, investigated and prosecuted cybercrime at the U.S. Department of Justice, and served as director for cybersecurity policy on the National Security Council...

  • speaker photo
    Mark Stanford
    SE Manager, Cloud Security, Cisco

    Mark Stanford is a 22-year vet of the security industry, running the gamut of positions: from crypto engineer to solutions architect to manager/director of SE’s. He’s had the opportunity to work with incredible teams and great technology with several companies, including F-Secure, Blue Coat, F5, FireEye, and currently Cisco Cloud Security. Ex...

  • speaker photo
    John Waid
    Founder & CEO, American Club, U.S. Chamber of Commerce

    John Waid is the Founder & CEO of C3-Corporate Culture Consulting. C3 believes that in companies it's all about people and how they behave. Culture is the driving force behind this. Security is a systemic issue and needs an approach that focuses on people's daily behaviors to solve this.

  • speaker photo
    Joshua Horne
    Security Analysis Manager II, Cyber Threat Analysis Center (CTAC) at SecureWorks
  • speaker photo
    Nicole Keaton Hart
    CxO - Deputy CIO , Nicke Consulting Group

    Nicole Keaton-Hart has served as a fractional CxO in Financial Services, Consumer Packaged Goods, Retail, Oil & Gas and Health IT industries as Chief Information Security Officer, Chief Information Officer and Chief Strategist. As a visionary and pragmatic leader with a keen focus on Business, IT and Information Security operating in harmony ...

  • speaker photo
    Scott Gordon
    Sr. Cloud Security Specialist, Symantec

    Scott Gordon is a Senior Cloud Security Specialist at Symantec and has several years of experience with the industry leading CASB solution. Scott’s experience in International managed services product engineering and operations has given him fantastic insight into securing cloud-based applications and platforms.

  • speaker photo
    David Barton
    Managing Director, UHY Consulting

    David Barton is a Managing Director with UHY Consulting and practice leader of the Technology, Risk, and Compliance practice, which provides cybersecurity consulting and compliance services focused around information technology. He has over 30 years of practical experience in information systems and technology risk and controls.
    David i...

  • speaker photo
    Tamika Bass
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys ...

  • speaker photo
    Clay Carter
    Director of Security Architecture, GE Digital

    Clay Carter is the Director of Security Architecture at GE Digital and promotes secure, practical design throughout the company. In his five years at GE he has built secure enclave environments, consulted on multiple acquisitions and divestitures, and designed an agile policy & controls program. His current focus is rebuilding an agile sec...

  • speaker photo
    Paul Yates
    Assistant Director, Information Security, ISC2, SANS

    Paul Yates currently serves as the Assistant Director for Information Security at the University of Chicago Medical Center. He is responsible for building and executing the strategy for the Security Operations and Risk Management teams within UCM’s Information Security Office. Mr. Yates has worked in the Healthcare, Consulting and DoD industr...

  • speaker photo
    David Keating
    Partner, Alston & Bird LLP

    David Keating is one of the co-leaders of the Privacy and Security Practice at Alston & Bird. David’s practice is focused on advising clients on privacy and security issues arising along the entire data lifecycle. He assists clients with compliance strategies, policy development and implementation, data monetization and data use analyses, new...

  • speaker photo
    Brett Williams
    Major General, U.S. Air Force (Retired)

    Major General (Ret) Brett Williams co-founded IronNet Cybersecurity and is the President of the Operations, Training and Security Division. Providing strategic vision and the foundational security platform solutions for IronNet, General Williams also serves as the Chief Security Officer responsible for product, enterprise and physical securit...

  • speaker photo
    Kurt Wescoe
    Chief Architect, Wombat Security, a division of Proofpoint

    As Chief Architect at Wombat Security, Kurt is responsible for ensuring Wombat's software and systems are built on a sound foundation. He brings over 10 years of experience in engineering, across multiple industries. He also serves as a faculty member in the School of Computer Science’s master’s program in e-Business at Carnegie Mellon Univer...

  • speaker photo
    Christian Fontaine
    Senior Security Engineer, Trend Micro

    Christian Fontaine serves as a Senior Security Engineer for the Southeast region. He sits on several security committees at Trend Micro that evaluate and architect solutions that meet current demands for virtual and cloud environments. He has served as CISO at Humber College / University of Guelph at Humber in Canada. He has also served as a ...

  • speaker photo
    Hien Nguyen
    Senior Security Architect, Booz Allen Hamilton, Inc

    Hien Nguyen brings more than 16 years of IT & OT experience in the public and commercial sectors which includes information security programs, network/system security architecture, and regulatory compliance.
    Hien has also developed a growing professional service business inside a multinational management consulting firm with more than 5...

  • speaker photo
    Michael Holcomb, Moderator
    Fellow and Director of Cybersecurity, Fluor

    Michael Holcomb is the Fellow and Director of Information Security for Fluor, one of the world's largest construction, engineering, and project services companies with 60,000 employees around the world. In his role at Fluor, Michael is responsible for vulnerability management, incident detection/response, penetration testing and industrial co...

  • speaker photo
    Kim Jackson
    Director, Business Resiliency, Automatic Data Processing

    Kim Jackson is a certified business resiliency professional with over 20 years of experience in incident management, disaster recovery, and business continuity, with a specialization in program development. Kim has successfully created programs for several major banking entity's, as well as large insurance and financial firms to ensure the v...

  • speaker photo
    Gregg Braunton
    Banking, Insider Threat Operations

    A strategic security partner blended with deep operational, architecture, and compliance expertise. Innovative, strategic, and tactical security leadership utilizing "business aligned" and "data-driven" cybersecurity models and frameworks. Gregg has 20+ years extensive cyber expertise leading and delivering cybersecurity operations, architect...

  • speaker photo
    Matteo Valles
    Strategic Partnership Coordinator, FBI

    Matteo Valles has been a Special Agent with the FBI for 30 years. His office of assignments have included Anchorage, AK; Boston, MA; Washington D.C.; Gulfport, MS; Vienna, Austria; Nairobi, Kenya; and now Atlanta, GA.
    While based in Nairobi, Kenya for 3 years, SA Valles was in-charge of all FBI operations in East Africa, to includ...

  • speaker photo
    Todd Truitt
    Director of Systems Engineering, US West, Illumio
  • speaker photo
    Cameron Michelis
    Sr. Director, Business Security Office, Automatic Data Processing

    Cameron currently serves as Senior Director of the ADP Business Security Office, has over 20 years of experience in Information Security, Data Science and Incident Management. Cameron holds a BS in Mathematics from the University of Florida, multiple professional certifications and is a member of the SANS Institute GIAC Advisory Board.

  • speaker photo
    Wes Connell
    Threat Researcher, BluVector

    As the Threat Researcher for BluVector, Wes Connell is especially motivated and passionate for dramatically improving data hunting tradecraft within the cyber security domain. Wes has a broad range of technical interests – particularly in the security dimension of hardware, software, systems, and networks.

  • speaker photo
    Nathan Chu
    Cyber Security Systems Engineer, Cisco

    Nathan Chu is a Systems Engineer who stands at the forefront of the Cyber Security Realm to help organizations prepare for inevitable intrusions. Prior to joining Cisco’s Cyber Security team, Nathan spent 4 years as a Generalist Systems Engineer, consulting design strategies with clients to construct best practice networks.

  • speaker photo
    Jaeson Schultz
    Technical Leader, Cisco Talos

    Jaeson Schultz is a Technical Leader for Cisco Talos Security Intelligence & Research Group. Cisco's
    Talos Group is dedicated to advancing the state-of-the-art of threat defense and enhancing the value of
    Cisco's security products. Jaeson has over 20 years’ experience in Information Security.

  • speaker photo
    Aaron Weissenfluh
    CISO, Cboe Global Markets

    Aaron Weissenfluh currently serves as the Chief Information Security Officer of one of the largest stock exchanges in the world. He has presented internationally and leads the charge to forever end the metrics based approach to security.

  • speaker photo
    Earl Carter
    Senior Threat Researcher, Cisco Talos

    Earl Carter is a Senior Threat Researcher in Cisco’s Talos Group. Talos is a team of researchers that constantly examines the threat landscape to drive updated threat intelligence into Cisco security products as well as providing tools and information to the general security community through blogs, whitepapers and security tools.

  • speaker photo
    Jason Cradit
    CIO / CTO, Summit Carbon Solutions

    Jason Cradit is a highly-skilled technology executive with a passion for creating innovative solutions in the energy and utilities industry. For two decades, Jason has helped companies use technology to streamline their processes, reduce costs, and increase efficiencies by challenging the status quo and leading teams to set higher bars with m...

  • speaker photo
    Alex Chiu
    Threat Researcher, Cisco Systems, Inc.

    Alex is a Threat Researcher for the Talos Group at Cisco Systems, a group that specializes in early-warning intelligence and threat analysis necessary for maintaining a secure network. Much of his time is spent hunting for new and evolving threats and making sure customers are protected from them.

  • speaker photo
    Preston Perich
    Regional Director, SentinelOne
  • speaker photo
    Phillip Mahan
    Director, Privacy Program, GoTo Foods

    A standard biography for Phillip would mention his years of experience in Privacy, Security, Governance, and Audit. It would tell of the business sectors he has worked with, and perhaps even the companies and professional organizations he’s been affiliated with for the last 25+ years. This is not the standard bio.

    Telling stories and ...

  • speaker photo
    Ricardo Lafosse
    CISO, The Kraft Heinz Company

    Ricardo Lafosse is responsible for IT risk governance, software and product security, incident management, technical disaster recovery, and determining enterprise-wide security policies and procedures. Lafosse regularly presents on security topics at global conferences, including Defcon, MirCon, and ISACA CACS. Lafosse has more than 15 years ...

  • speaker photo
    Chris Bates
    Principal Architect, SentinelOne

    Chis Bates has over 22 years of experience in the Cyber Security and Information Technology field. As the Principle Architect for SentinelOne, he leverages his years of experience in Incident Response, Cyber Security Operations, Security Architecture, and Cyber Security Strategy to continually improve and transform how SentinelOne approaches ...

  • speaker photo
    M.J. Vaidya
    Principal, Advisory Services, Ernst & Young LLP

    M.J. Vaidya is a Partner/Principal in the Advisory Services
    practice of Ernst & Young (EY) LLP. He has over 20 years of
    experience including holding CISO positions at Fortune 10 and
    Fortune 200 companies. He also previously held leadership
    positions at PwC, Deloitte, and Accenture. M.J. has provided
    security and ...

  • speaker photo
    Meenaxi Dave
    Information Security Instructor/Consultant, Gwinnett Technical College

    Meenaxi Dave is an experienced Information Security educator with proven success developing, delivering and evaluating IT security training programs. She holds her Masters in Computer Science from the University of Memphis and a Diploma in Cybersecurity from GTC. She also holds professional certifications in CISSP, CEH, COMPTIA Security+, Net...

  • speaker photo
    Anita Bateman
    IT Executive

    Anita is a 19-year technology veteran with experience at Fortune 500 and premier energy/utility firms. She has a demonstrated track record in management, delivery, architecture and cybersecurity. She holds a Master of Sciences in Computer Science from the University of Texas at Austin.

  • speaker photo
    Bill Lapp
    Sr. Director, Sales Engineering, Zscaler

    As the Leader for Solution Engineering and Architecture at Zscaler Bill Lapp is responsible for all pre-sales engineering efforts in North and South America. His primary focus is assisting large enterprises to rethink how they approach network and business transformation through the use of security and policy.

  • speaker photo
    Damien Suggs
    Sr. Application Security Architect , Metro Atlanta Chapter of ISSA

    Mr. Suggs is a leader in the IT Security area and is the current president of the Metro-Atlanta ISSA chapter. He served as president for seven years; however, during his eleven-year relationship with the Metro-Atlanta ISSA chapter he assisted the chapter grow in roles such as Director of Membership, Director of Training, Conference Chair and ...

  • speaker photo
    Aaron Riley
    Network Security Analyst CIT III, Office of Cyber Security, State of Missouri

    Born and raised in Kansas City, I'm a proud Missourian. I have received two degrees from Moberly Area Community College in computer science and working on a third. I have been with the state for 3 years and am currently with the SOC team in the Office of Cyber Security.

  • speaker photo
    Chris Shull
    vCISO, Salem Medical Center

    Chris Shull (CISSP, CIPP/E, CIPP/US, CIPM, FIP) is the vCISO for Salem Medical Center, vCISO and vDPO for several other organizations, and an Information Security and Privacy consultant and advisor.

    With over 35 years in IT, information security, and privacy, Chris specializes in Keeping Information Security Simple so businesses can un...

  • speaker photo
    SSA Eric Shiffman
    Squad CY-3, FBI Chicago
  • speaker photo
    Rob Arnold, Moderator
    Director of Information Security & Privacy Officer, Children International

    Rob Arnold is Director of Information Security at Children International, where his job is protecting the data and systems we use to fight to end global poverty. Twenty-eight years of working in Information Technology in the public and private sector has given Rob the conviction that successful outcomes happen when you don’t let the technolog...

  • speaker photo
    Tony Meholic
    Director of Cybersecurity / CISO, The Bancorp Bank

    Anthony is currently Director of Cybersecurity, Chief Security Officer at The Bancorp Inc. in Wilmington, Delaware. He has worked extensively with application development including creation of simulation software for emergency medical providers, work with local government agencies on EMS trending and metrics and customized user interfaces for...

  • speaker photo
    Robert Dewhirst
    Information Security and Infrastructure Manager, Educational Testing Service

    Mr. Dewhirst is a senior information security professional with 24 years of experience in software development and IT systems management. He currently manages information security, infrastructure and system administration for the K-12 testing systems of the world's largest private nonprofit educational testing and assessment organization.

  • speaker photo
    Edward Marchewka
    Director, Information and Technology Services, Gift of Hope Organ and Tissue Donor Network

    Edward Marchewka is the Director of Information Technology for Gift of Hope Organ & Tissue Donor Network. He is also the creator of CHICAGO Metrics™, a platform to help manage your company's key IT and Information Security risks. Edward has completed, from Northern Illinois University, an MBA and an MS in Mathematics and, from Thomas Edison S...

  • speaker photo
    Jack Richard Dougherty
    Asst. Commandant, Texas A&M Maritime Academy

    Jack Dougherty has a B.S. in Maritime Administration from Texas A&M and is obtaining a Masters of security management in Cyber Security. He is a USN veteran, Maritime Security contractor and holds certifications with the DOS as a Maritime Anti-terrorism instructor as well as with the USCG.

  • speaker photo
    Lance Howard
    Deputy Cyber Security Director, Portland General Electric

    Lance Howard has been in the Utility industry for 15 years, beginning in a security operation center and most recently the Manager of Security Assurance of a local Utility company. He has also held positions that have included risk assessments, security architecture and design.

  • speaker photo
    David Missouri
    Senior Agency Information Security Officer, SAISO, GA Department of Juvenile Justice

    David Missouri is a former federal Information System Security Officer for the Department of Labor, Wage & Hour, currently a State of Georgia Senior Agency Information Security Officer. David is the Vice President of Governance for the ISACA Atlanta chapter. He holds a Master of Science in Information Systems degree.

  • speaker photo
    Mark Gelhardt
    CIO, Georgia State Defense Force, Former CIO, The White House

    Colonel Gelhardt, at the pinnacle of his military career was selection to work at The White House as the CIO, supporting President Clinton, the VP, the White House Staff, and the U.S. Secret Service managing all the classified automation and telecommunications. Colonel Gelhardt is a combat veteran. Colonel Gelhardt is a well-known speaker and...

  • speaker photo
    Karen Worstell
    CEO & Founder, W Risk Group LLC

    Karen Worstell began her cyber career 30 years ago when her Programming professor in grad school encrypted the final and unique code breaking tools were required to be used in order to decrypt and read each question.

    She has provided cybersecurity support for programs like the Advanced Tactical Fighter prototype and B2 Bomber, develope...

  • speaker photo
    Dr. Paul Berryman
    Cyber Risk Strategy Manager, Deloitte

    Paul Berryman, EdD, CISSP, CISA, is a Cyber Risk Strategy Manager. He’s worked in IT security for almost 2 decades protecting against the usual suspects of hackers, criminals, and bored teenagers. After 6 years of swashbuckling adventures with the US Navy, he’s led several security operation teams. He’s a big fan of colleges, having attended ...

  • speaker photo
    Quincy Jackson
    Red Team Lead, Oil & Gas Company

    Quincy Jackson (CISSP, C|EH, GCIA, GWAPT, GREM) currently works as a Red Team Lead with over 20 years experience. His primary responsibilities include programs to evaluate and measure the actual effectiveness of the Security Operations Center. His Cyber Readiness and Defense Capability Testing Programs were created to reduce uncertainty and ...

  • speaker photo
    Herbert Mattord
    Associate Professor, Kennesaw State University

    Herbert Mattord, Ph.D., CISM, CISSP completed 26 years of IT industry experience before joining the faculty at Kennesaw State University in 2002. He was formerly with Georgia-Pacific Corporation. He is on the Faculty at Kennesaw State University with the rank of Associate Professor, teaching Information Security, Cybersecurity, and Informatio...

  • speaker photo
    Ben Smith
    Field CTO (US) & Principal Sales Engineer, RSA

    Ben Smith is Field CTO (US East) with RSA, and a technically-focused risk management executive with over 25 years’ experience. He holds the CISSP and CRISC certifications and has presented on RSA's behalf at cybersecurity events sponsored by Gartner, FS-ISAC, ISSA, BSides, ICI, (ISC)2, ISACA, InfraGard, HTCIA and other organizations.

  • speaker photo
    Uday Shah
    IT Policy Risk & Compliance Manager, Fulton Financial
  • speaker photo
    Steve Naphy
    CIO, Morgan, Lewis & Bockius LLP

    Steve Naphy serves as Morgan Lewis's Chief Information Officer. In his role, Steve concentrates on leveraging data analytics and process to drive efficiency and effectiveness in both business operations and the delivery of legal services. He has over 20 years of experience working in information technology (IT), including previously running i...

  • speaker photo
    Alex Petrow
    VP Information Security & Compliance, Ascensus
  • speaker photo
    Chris Hoff
    Field Product Manager, Cisco

    Chris Hoff is a Field Product Manager with over 20 years in network and information security operations, sales and marketing. During this time Chris has helped numerous organizations build and manage their IT operations. In his current role, he helps educate organizations on the current threat landscape and understand how they can pro-activel...

  • speaker photo
    Amy Mushahwar
    Data Privacy, Security, and Management Attorney

    Amy Mushahwar is a data privacy, security, and management attorney with over 15 years of experience in the technology industry in legal and engineering capacities. Amy defends companies in privacy-related matters as well as assists clients in the development of integrated digital platforms, such as cloud computing and database APIs.

  • speaker photo
    Brian Howell
    Sr. Manager, Internal Audit, Spirit AeroSystems

    Brian is a business and technology risk advisor with nearly 25 years of experience in various risk management, audit and business process functions. In his current role at Spirit, he serves as a Senior Manager within the Internal Audit group focused on operational and IT audits.

    He is a member of both the IIA and ISACA and is a Certifi...

  • speaker photo
    Robert Block
    SVP, Identity Strategy, SecureAuth

    As a Senior Vice President of Identity Strategy at SecureAuth, Robert Block is responsible for helping execute on SecureAuth’s strategic vision. Considered a thought leader in IAM, Robert interacts with customers, vendors, and leading industry analysts on the state of Identity and Access Management on a regular basis. Robert has over 19 years...

  • speaker photo
    Jeff Korte
    Director Community Institutions & Associations, Financial Services - Information Sharing & Analysis Center

    Jeffrey is a former banking security practitioner possessing over 24-years’ experience in the financial services sector and ten security domains. As a BSO and ISO, he specialized in developing cybersecurity and fraud programs. He currently manages a council with FS-ISAC assisting over 3,800 members achieve cyber-security maturity.

  • speaker photo
    Aaron Weaver
    Director of Cloud Security, Financial Services

    Aaron Weaver has over 20 years' experience specializing in application and cloud security and providing training sessions at various international industry events. His work includes security consulting, penetration testing, threat modeling, and code reviews. Aaron also enjoys honey bees and recently has been experimenting with hive designs.

  • speaker photo
    Thomas Handlon
    Chief Information Security Officer, Kennedy Health System

    Thomas Handlon - Chief Information Security Officer at Kennedy Health System, NJ. Thomas (Tom) Handlon is the chief information security officer at Kennedy Health System in NJ. Prior to Kennedy, he was director of information security at American Realty Capital, a financial investment firm. Tom has almost 20 years’ experience in informat...

  • speaker photo
    Jared Cheney
    Senior Vice President of Client Operations, Atmosera

    Jared Cheney excels at delivering a consistent and outstanding customer experience. He oversees networking, computing, storage, application services, monitoring, and a 24x7x365 Technical Assistance Command Center (TACC).

  • speaker photo
    Ray Espinoza
    Vice President of Information Security, Atmosera

    Ray Espinoza is an expert delivering complex InfoSec capabilities and strategies. He is responsible for all security and compliance initiatives and customer solutions.

  • speaker photo
    Jeff Moncrief
    Systems Engineering Manager, Cisco

    Jeff Moncrief is a Systems Engineering Manager at Cisco. Jeff has over 17 years of Information Security Industry experience, holding leadership roles in Support, Sales Engineering and Pre/Post-Sales Technical Account Management.  Jeff’s specializations include compliance, vulnerability management, incident response and security architecture....

  • speaker photo
    Tanya Zlateva
    Dean, Boston University Metropolitan College

    Tanya Zlateva is the Dean of Boston University’s Metropolitan College and founding director of the Center for Reliable Information Systems and Cyber Security. She spearheaded the development of cybersecurity programs both face-to-face and online. She holds a Ph.D. in computer science and pursues research in cybersecurity, educational technolo...

  • speaker photo
    Peter Beardmore
    Sr. Consultant, Solutions Marketing, RSA

    Peter Beardmore has nearly two decades of IT, security, and software marketing and business development experience. He began his career as a Signal Corps Officer in the U.S. Army. Prior to joining RSA to help lead messaging and solutions development, Peter led product marketing at Kaspersky Lab.

  • speaker photo
    Robertson Pimentel
    Product Manager, Centrify

    Robertson Pimentel is a product manager and evangelist at Centrify Corporation. He has held security-related positions at Ford Motor Company and Intel Corporation. His focus is primarily in Centrify Server Suite and Privilege Service and his goal is to balance product capability and operational efficiency.

  • speaker photo
    Matthew Perry
    Experienced Manager, Grant Thornton’s Risk Advisory Services

    Matt has over 25 years Information Technology (IT) experience; 12 years in Information and Cyber Security. Prior to joining Grant Thornton, Matt served 8 years as the Director of Information and Cyber Security for a global manufacturing and energy production company. While there he was responsible for the design, application and oversight of ...

  • speaker photo
    Ed Metcalf
    Senior Director of Product Marketing, Cylance

    Ed brings more than 20 years of security and technology industry experience to his role at Cylance, where he’s leading the endpoint security product marketing strategy, while championing the voice of the customer. His mission is to provide the glue that links together the market needs, what to build and how to go-to-market.

    Prior to ...

  • speaker photo
    Michael Dalgleish
    Director, Sales Engineering, LogRhythm

    Michael Dalgleish is a Director of Sales Engineering at LogRhythm, where he has built a team of security professionals who are growing strategic relationships with the partner community. Michael is an industry veteran, spending the last 15 years deeply entrenched in the network and security world. When not on the road evangelizing security in...

  • speaker photo
    Pete Ryan
    Director of ClearPass Sales East, HPE Aruba

    Pete Ryan is a sales professional with over 25 years of experience in building and leading motivated sales teams in the networking and networking security industry. He accepted his current position as ClearPass Sales Director for the East for Aruba HPE in 2013. In this role, he is responsible for strategy, promotion and sales execution on the...

  • speaker photo
    Wayne Machuca
    Doctor & Professor, Information Systems and Technology Management, Mt. Hood Community College

    Dr. Machuca is the PI and lead instructor for the AAS / CyberSecurity & Networking degree at Mt. Hood Community College in Gresham, OR. MHCC has the only cyber security Associates degree in Oregon. It was awarded CAE-2Y by DHS and NSA. MHCC will award Cyber 40 graduates in 2017.

  • speaker photo
    Tom Stumpek
    CISO, Lahey Health

    Tom Stumpek currently serves as the CISO at Lahey Health. Prior to Lahey Tom spent over 20 years with the General Electric Company in various IT C-level positions (CISO, CTO, CIO) in the financial services, insurance, manufacturing and corporate sectors. Recently Tom has presented at several executive IT events on technology strategy, enterpr...

  • speaker photo
    Jason Garbis
    Co-Chair for the Cloud Security Alliance

    Jason Garbis, CISSP, is a leader of the Software-Defined Perimeter working group at the Cloud Security Alliance. He’s Vice President of Products for Cryptzone, responsible for product strategy and product management. He has over 25 years of experience at technology vendors, including roles in engineering, professional services, and product ma...

  • speaker photo
    David Bressler
    Managing Security Consultant - Application Security, GuidePoint Security

    David is a Managing Consultant at GuidePoint Security within the Application Security Team. David has broad-based experience managing and conducting application penetration testing, source code review, application architecture review, network penetration testing, digital and physical social-engineering assessments, dating back to 2008. Davi...

  • speaker photo
    John Grim
    Head of Research, Development, Innovation, Verizon Threat Research Advisory Center

    John has over 17 years of experience investigating, and leading teams investigating, data breaches and cybersecurity incidents within the government and civilian security sectors. Currently, John heads the Verizon Threat Research Advisory Center (VTRAC) research, development, and innovation effort. In this role, he focuses on researching cybe...

  • speaker photo
    John DuMont
    Digital Forensics Investigator, Verizon RISK Team

    John DuMont is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, John responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures. Prior to Verizon, John worked as a defense contractor performing computer network de...

  • speaker photo
    Joel Brenner
    Legal and Consulting Services, Former Senior Counsel at the National Security Agency

    Joel F. Brenner specializes in cyber and physical security, data protection and privacy, intelligence law, the administration of classified information and facilities, and the regulation of sensitive cross-border transactions. He has represented companies and individuals in a wide variety of transactions and proceedings including sensitive fo...

  • speaker photo
    Caleb Christopher
    Director of Technical Operations - Cino Ltd | Director of IT, Challenger Sports

    Caleb Christopher is the Director of Technical Operations at Cino Ltd - a national cybersecurity and risk
    management firm; and the Director of IT at Challenger Sports - a global soccer camp organization. He has 9+ years experience in security.

  • speaker photo
    Andrew Wild
    CISO, QTS Datacenters

    Andrew Wild is the chief information security officer at QTS Data Centers, the only fully integrated data center, managed hosting and cloud services provider. Wild has spent more than 25 years developing effective, customer-driven information security, incident response, compliance and secure networking programs for technology and telecommuni...

  • speaker photo
    Phil Curran
    CISO & CPO, Cooper University Health Care

    Phil Curran has more than 25 years of experience in information security and privacy in the military, government and private sectors. As the Chief Information Assurance Officer and Chief Privacy Officer at Cooper University Health Care in Camden NJ, he is responsible for managing governance and regulatory compliance, risk assessment and manag...

  • speaker photo
    Steven Dougherty
    Sales Engineer, Gigamon
  • speaker photo
    Gerardo Cruz
    Electrical Engineer, Security Consultant

    Gerardo is an Electrical Engineer and security consultant.

  • speaker photo
    Stephanie J. DeFrangesco
    CEO, DataTech

    Stephanie is the CEO of DataTech, a cybersecurity company providing security analysis

  • speaker photo
    Ralph DeFrangesco
    Professor, Drexel University

    Ralph is a professor at Drexel University and a cybersecurity consultant.

  • speaker photo
    Special Agent David Katowski
    Charlotte Cyber, FBI
  • speaker photo
    Joseph Szczerba
    Charlotte Supervisory Intelligence Analyst for Cyber, FBI
  • speaker photo
    Joshua Costa
    Digital Forensics Investigator, Verizon RISK Team

    Joshua is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Joshua responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures. Prior to Verizon, Josh worked in various consulting roles where he performed digital fo...

  • speaker photo
    Eric Sun
    Solutions Mgr., Incident Detection & Response, Rapid7

    As a solutions manager for Rapid7’s Incident Detection & Response offerings, Eric works closely with Metasploit, their penetration testers, and managed SOC to help security teams model their programs after the intruder attack chain. Eric brings a layer of behavior analytics and risk management from his many years in Asia as a professional pok...

  • speaker photo
    Ariel Siegelman
    President, DRACO GROUP

    Certified by GA POST as a firearms and Defensive Tactics instructor and by the Israeli government as an instructor of Counter Terrorism, Tactical Firearms, and Krav Maga. Operated in a Special Operations Unit in the Israeli military and is regarded as an international expert in the mitigation and response to violent confrontation, especially ...

  • speaker photo
    Bill Kwak
    Chief Security Architect, Vaxient

    Bill Kwak has almost 20 years of combined IT and Information Security experience in the healthcare, banking & financial, government, and consulting sectors.

  • speaker photo
    Mark Arnold
    Senior Research Principal, Optiv

    Mark Arnold brings more than 20 years of technical and leadership experience to his role as a senior
    research principal for solutions research and development at Optiv. Arnold develops strategy deliverables
    and frameworks to help industry verticals mature and grow efficient security programs.

    Prior to joining Optiv, Arnold...

  • speaker photo
    Julie Villegas
    Teleion Consulting
  • speaker photo
    Thomas Pace
    VP, Global Enterprise Solutions, BlackBerry

    Thomas Pace has an extensive background in building incident response programs, policies, procedures and playbooks at multiple top-tier organizations. Thomas has 11 years of security experience in various fields including physical security, intelligence gathering and analysis, sensitive site exploitation, incident response, intrusion analysis...

  • speaker photo
    Jeff Schultz
    Partner and Co-Chair of the Data Security and Privacy Practice, Armstrong Teasdale

    Jeff Schultz is an experienced business litigator with extensive knowledge about the field of data security and privacy. He is co-chair of Armstrong Teasdale’s Data Security and Privacy practice group and a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals.

  • speaker photo
    Ed Cabrera
    Chief Cybersecurity Officer, Trend Micro

    Eduardo E. Cabrera is a trusted advisor and a proven cybersecurity leader. He is responsible for analyzing emerging cybersecurity threats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran of the United States Secret Ser...

  • speaker photo
    Carlos Gonzales
    Global VP, Hybrid Cloud Security, Trend Micro

    Carlos has over 20 years of expertise in enterprise software and infrastructure. Prior to joining Trend Micro, Mr. Gonzalez was a Sr. Sales Director at Oracle, responsible for sales and services of Oracle’s Cloud Computing and security initiatives for Latin America.

  • speaker photo
    Ken Pyle
    Partner, Information Security, DFDR Consulting

    Ken Pyle is a partner of DFDR Consulting specializing in Information Security, Computer Forensics, Enterprise Virtualization, and Network Engineering. Ken has an extensive background in Network Penetration and Remediation, Compliance, and exploit development. Ken has published exploit research and vulnerabilities for a large number of compani...

  • speaker photo
    Brad Antoniewicz
    Sr. Security Researcher, Cisco Cloud Security

    Brad Antoniewicz works in Cisco Umbrella’s security research group. He is an Adjunct Professor teaching Vulnerability Analysis and Exploitation and a Hacker in Residence at NYU’s Tandon School of Engineering. Antoniewicz is also a Contributing Author to both the Hacking Exposed and Hacking Exposed: Wireless series of books.

  • speaker photo
    Sheri Donahue
    Cyber Security Strategic Partnerships Director, Humana

    Sheri Donahue spent 20 years as a civilian Navy engineer, most recently as Program Manager for Security & Intelligence (Indian Head Division). She is President-Emeritus of InfraGard National where she served on the national board for 11 years. Currently, she is the Cyber Security Strategic Partnerships Director for Humana.

  • speaker photo
    Michael Lipinski
    CISO and Chief Security Strategist, Securonix

    Michael J. Lipinski is CISO and chief security strategist at Securonix. He has over 28 years of experience in risk and information security, digital forensic investigations including HR interrogation, legal process support and testimony. Lipinski has helped organizations of all sizes design, build and run risk, IT governance and information s...

  • speaker photo
    Shreyas Kumar
    CISO, Deserve

    Chief Information Security Officer Shreyas Kumar has spent more than 18 years in cybersecurity related roles. He most recently built the security program at Fintech startup Deserve, from the ground up. This follows previous roles which included securing Uber's global payments and the operational security and compliance of the Adobe Doc Cloud ...

  • speaker photo
    Alex Villegas
    Security Engineer, Amazon

    Alejandro Villegas is a seasoned security engineer with 16 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001

  • speaker photo
    Bill Wilder
    CTO, Finomial

    Bill Wilder is a cloud computing veteran and CTO at Finomial, providing SaaS solutions to the global hedge fund industry from the public cloud. Bill is recognized by Microsoft as a 7-time Azure MVP awardee for his cloud expertise and community leadership. Bill is the author of Cloud Architecture Patterns (O’Reilly Media, 2012).

  • speaker photo
    Tom Cooper
    Principal Geek, BrightHill Group

    Tom Cooper, PMP is the founder of BrightHill Group, where he believes that "Because People Matter, We Must Lead Them Well.” Because of his deep experience in software development and enterprise IT implementation, Tom specializes in working with highly technical experts.

  • speaker photo
    Deidre Diamond
    Founder and CEO, CyberSN and Secure Diversity

    Deidre Diamond is the founder and CEO of CyberSN, the largest cybersecurity talent acquisition technology and services firm in the U.S., transforming job searching and hiring for the cybersecurity industry. Standardizing all cybersecurity job functions into a common taxonomy of 45 roles, the CyberSN platform allows professionals to make anony...

  • speaker photo
    Scott Schober
    President / CEO of BVS, Cybersecurity Expert, Author, BVS

    Scott Schober is the president and CEO of Berkeley Varitronics Systems, an experienced provider of wireless test and security solutions. He is considered one of the foremost wireless technology and cybersecurity experts in the world, and is regularly interviewed for leading national publications, as well as appearing on major network televisi...

  • speaker photo
    Steven Weber
    Director - Isaac L. Auerbach Cybersecurity Institute, Drexel University

    Steven Weber is professor in the Department of Electrical and Computer Engineering, founding director of the Isaac L. Auerbach Cybersecurity Institute, and founding director of the Modeling and Analysis of Networks Laboratory (MAN Lab) at Drexel University.

  • speaker photo
    Claire LaVelle
    Event Director, ISSA

    Claire LaVelle is a Security Consultant for the North America PCI team at Verizon with over 15 years of Information Technology experience, including a decade dedicated to all facets of Information Security (compliance, architecture, operational, privacy and forensics).

    Claire has two Masters Degrees in Computer Science. She earned her ...

  • speaker photo
    Dave Keene
    Penetration Tester, Wells Fargo, Charlotte ISSA Board Member

    Dave enjoys the outdoors as much as he can get away from his computer. He is active in the security community in Charlotte as well as international endeavors.

  • speaker photo
    Mark Bloom
    Director of Product Marketing, Security & Compliance, Sumo Logic

    Mark Bloom has more than 15 years of experience in sales, marketing and business development across financial services and high tech industries. His previous roles include Cisco, Compuware, SonicWall/Dell, Trend Micro and more.

  • speaker photo
    Danielle L Fritzler, CBCP
    Global Business Continuity Program Manager, Vanguard

    As part of Vanguard's corporate business continuity management team, Danielle has responsibility for the International business continuity program. Her areas of focus include workspace resilience, workforce resilience, supplier/business partner resilience, technology resilience, crisis management, and communication. She is a member of SecureW...

  • speaker photo
    Scott Margolis
    CISO, Massachusetts Bay Transportation Authority (MBTA)

    Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business cont...

  • speaker photo
    Jared S. Hosid
    Senior Counsel, U.S. Dep't of Justice, Criminal Division, Computer Crime and Intellectual Property Section

    Jared Hosid is Senior Counsel in the U.S. Department of Justice’s Computer Crime and Intellectual Property Section, where he focuses on cybersecurity, electronic surveillance, and the growing challenge in obtaining lawful access to electronic evidence in criminal investigations. Jared also investigates cases involving various types of cyberc...

  • speaker photo
    Dan Walsh
    InfoSec Protagonist, Act 1 Security, (ISC)² , (ISC)² Eastern Chapter, HIMSS

    Dan Walsh, MBA, CISSP
    Act 1 Security founder & principal protagonist, consulting on the information security challenges facing the healthcare, public, and retail sectors.
    • Commonwealth of Massachusetts’ Chief Security Officer (2006-2011)
    • Information Security Officer - South Shore Hospital
    • Information Systems Secur...

  • speaker photo
    Jason Elmer
    Managing Director, Global Cybersecurity Services, Duff & Phelps

    Jason Elmer is a Managing Director at Duff & Phelps, instrumental in launching the Cybersecurity practice. Jason brings 15 years of experience in financial services, with technology positions serving hedge fund, private equity and alternative investment markets. Jason holds a BS in Finance from Fordham University College of Business Administ...

  • speaker photo
    Gene Kingsley
    Director, Information Security, Farm Credit Financial Partners; VP, InfraGard National Members Alliance

    Gene has worked as a dedicated resource in the Information Security space for over 25 years, among industries such as Higher Ed, Healthcare, Finance, Federal Government agencies, and others. He has focused on Operations, Strategy, and Resiliency. In his spare time, he volunteers as a national leader among the InfraGard National Members Allian...

  • speaker photo
    Michael Horsch Fizz
    Principal Advisor, NSA, ISSA, ISACA, FCI

    With more than 20 years of experience, Michael brings an in-depth understanding of currently available solutions empowering clients to achieve operational excellence. Over his career, Michael has delivered over three thousand consultations to technology and financial organizations.

  • speaker photo
    Esmond Kane
    CISO, Steward Health Care

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuab...

  • speaker photo
    Terry Ziemniak, CISSP
    Chapter Member, (ISC)2

    Terry has over 25 years' experience in the information security field with work ranging from hands on security penetration testing to the build out of complex, state of the art cyber protections. Additionally, he has spent over a decade in the role of Chief Information Security Officer for very large organizations (including Atrium Health her...

  • speaker photo
    Joan Antokol
    Partner, Park Legal LLC

    Joan has experience as an in-house global privacy officer for a Fortune 500 company, and also served as a Partner and chair of the data privacy practice for a large international law firm. Since 2010, she has operated her own law firm, Park Legal, LLC, with offices in New Jersey and Indianapolis. Since 2003, Joan has been invited to be a memb...

  • speaker photo
    Cheri Sigmon
    vCISO, Confidential

    Leveraging 21 years of experience in leadership, information security and workforce development, as a Chief Information Security Officer (CISO), Office of the Secretary of Defense (OSD), Cheri secured sensitive military networks/communications/technology. The Joint Staff; USSTRATCOM Joint Task Force-Global Network Operations; Headquarters Air...

  • speaker photo
    Jonathan Lange
    Executive Manager, baramundi software USA, Inc.

    Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.

  • speaker photo
    Colleen Moss
    Special Agent, Federal Bureau of Investigation

    Special Agent Colleen Moss joined the FBI in November 1996. Eight days into her new assignment in the Baltimore Division, Agent Moss chased down a bank robber and made her first arrest. Agent Moss served on the ground breaking Innocent Images National Initiative Squad in Baltimore for four years. She worked as an undercover Agent online lu...

  • speaker photo
    Greg York
    CISO, Follett Learning

    Greg enjoys inspiring, innovating, and collaborating to drive business value; time with family; backpacking adventures; and craft beer.

  • speaker photo
    Diane McCarthy
    Senior Associate, PwC

    Diane holds a Bachelor’s in Telecommunications\Network Management, CISSP, CISA, and CRISC. She has 15 years of technical knowledge including 13 years in IT risk and cybersecurity. She is currently collaborating on multiple projects to automate security assessments including compliance to policy and controls, issue management and exception pro...

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Com...

  • speaker photo
    Sandy Bacik
    Director, Audit and Compliance, CipherTechs, Inc.

    Sandy Bacik, CISSP, ISSMP, CGEIT, CISA, CDPSE, PCI QSA, is CipherTechs’ Director Audit & Compliance, has over 20 years’ direct information security and operational experience in the areas of IT Audit and Compliance, BCP/DR, Incident Response, Physical security, Privacy, Regulatory Compliance and Audit, Policies/Procedures, Operations, and Man...

  • speaker photo
    Michael Corby
    Executive Consultant, CGI

    Mr. Corby has more than 40 years in IT strategy, operations, development and security. He is the founder of (ISC)², Inc. the organization that established the CISSP security professional credential. A frequent Secureworld speaker and author, he was CIO for a division of Ashland Oil and for Bain & Company.

  • speaker photo
    Christopher Hadnagy
    CEO, Social-Engineer, Inc.

    Christopher Hadnagy, is the founder and CEO of Social-Engineer, LLC. Chris possesses over 16 years experience as a practitioner and researcher in the security field. His efforts in training, education, and awareness have helped to expose social engineering as the top threat to the security of organizations today.

    Chris established the ...

  • speaker photo
    Dr. Peter Stephenson
    Technology Editor and author of "Threat Hunter" blog, SC Magazine

    Dr. Peter Stephenson is the Technology Editor and author of the “Threat Hunter” blog in SC Magazine, a leading industry publication for which he has written for over 20 years. He is a cyber criminologist, digital investigator and digital forensic research scientist, as well as being a writer, researcher and lecturer on cyber threat analysis, ...

  • speaker photo
    Nick Multari, PhD
    Program Manager, Pacific Northwest National Lab

    Nick Multari provides programmatic and technical guidance to cybersecurity research programs at the Pacific Northwest National Lab (PNNL). Prior to joining PNNL, he led the trusted cyber technology group at Boeing Research and Technology. He received his PhD in Computer Science from the University of Texas at Austin

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial ...

  • speaker photo
    Patti Sauder
    Senior Sales Engineer, Cylance
  • speaker photo
    Brent McKinnon
    Enterprise Sales Manager, Cylance
  • speaker photo
    Chuck Craft
    Senior Sales Engineer, Tavve

    Chuck's role at Tavve is making customers successful in moving network protocols such as SNMP, Syslog and Netflow into and out of the DMZ. He draws on over 30 years of IT/computer experience; 24 years (NNM 3.31) of that in network and systems management working for HP resellers and vendors.

  • speaker photo
    Chris Luedde
    Product Manager, Wombat Security
  • speaker photo
    Kevin Kin
    Global Director, Systems Engineering, CSS, Palo Alto Networks
  • speaker photo
    Barbara Endicott-Popovsky
    Executive Director, Center for Information Assurance and Cybersecurity, University of Washington

    Barbara Endicott-Popovsky, Ph.D., is Executive Director of the Center for Information Assurance and Cybersecurity at the University of Washington, recently re-designated by NSA/DHS as a Center of Academic Excellence in Cyber Defense Education, headquartered at UW Bothell, and a Center of Academic Excellence in Research, headquartered at the A...

  • speaker photo
    Alejandro Villegas
    Security Engineer, Amazon

    Seasoned security engineer with 15 years of cybersecurity experience working for leading IT companies such as: Amazon, Microsoft, F5 Networks, Hewlett Packard, and cPanel. Education: JD, MS, MBA, BBA. Certifications: CISSP, CEH, CISA, CHFI, LPT, ECSA, MCITP, Lead ISO 27001

  • speaker photo
    Mary Gardner
    VP & CISO, F5 Networks

    Mary Gardner’s background provides a wealth of security, compliance, and risk management expertise from a variety of industries, including healthcare, finance, and transportation/logistics. She joined F5 as chief information security officer (CIS)) from Seattle Children’s, where she served as CISO. She has also held security leadership positi...

  • speaker photo
    Eddy Cruz
    Chapter President, Evergreen InfraGard
  • speaker photo
    Jordan Wiseman
    PCI Environments, AWS
  • speaker photo
    Mark Miller
    Director Customer Support, Venafi

    Mark Miller has been working with security software products for over 16 years. Before that and without realizing it he was preparing for his computer software career by playing games in DOS and Windows. He grew up as a middle child in a large family teaching him how to work with all personality types. His main focus over his career so far ha...

  • speaker photo
    Carla Hough
    Risk & Threat Analyst, UW Medicine IT Services & Security
  • speaker photo
    Bill Kine
    Network Consulting Engineer, Juniper Networks
  • speaker photo
    Craig Schippers
    Principal Engineer, Trend Micro, Inc.

    Craig Schippers is a CISSP Certified Principal Sales Engineer at Trend Micro. He has worked in the Security Industry for approximately 17 years assisting customers with their Infrastructure Security needs. He lives in the Kettle Falls, WA.

  • speaker photo
    Omar Chaudhry
    Chief Engineer of Information Security, Mitre Corp

    Omar Chaudhry is currently pursuing a Doctor of Philosophy (Ph.D.) in Systems Engineering at The George Washington University. He is also the Chief Engineer of Information Security at The MITRE Corporation. Omar is a cybersecurity practitioner with almost 15 years of experience in operational security and compliance.

  • speaker photo
    Jake Bernstein, Esq.
    Partner, Data Protection, Privacy & Security Group, K&L Gates LLP

    Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense cou...

  • speaker photo
    Kathryn Haun
    U.S. Dept. of Justice, Stanford University

    Please note: Kathryn will be speaking in her personal, not official capacity.
    Based in San Francisco, Kathryn Haun is a federal prosecutor with the U.S. Department of Justice and is its first-ever coordinator for emerging financial technologies. Since 2006, she has served as an Assistant U.S. Attorney, first in the Washington D.C. area ...

  • speaker photo
    Jeremy Heffner
    Senior Cloud Security Engineer, Netflix

    Mr. Heffner is a software and security professional who has worked on numerous commercial and government projects. His passion is for securing and building scalable, survivable, and fault-tolerant distributed systems. His focus includes cyber attack and defense, information gathering and analysis, and scaling systems globally through automati...

  • speaker photo
    Sue Horn
    Audit Senior Manager - IT Assurance, Crowe Horwath LLP

    Sue is a Senior Manager in the IT Assurance Group within the Audit practice of Crowe Horwath, LLP with over 12 years of experience. Sue specializes in IT Assurance services such as support for all areas of computer based controls evaluated as part of Crowe’s financial audits, Service Organization Controls (SOC) attestation reports, and HITRU...

  • speaker photo
    Jack Greiner
    Partner, Graydon Head

    Jack Greiner is a commercial litigator who has is heavily involved in the areas of data privacy, Information Law, and social media. His peers selected him for inclusion in The Best Lawyers in America for his work in Commercial Litigation, Litigation-Banking and Finance, Litigation-First Amendment, and Litigation-Intellectual Property from 200...

  • speaker photo
    Amy Zimmerman
    Senior Communications Manager, American Financial Group
  • speaker photo
    JD Rogers
    CISO, American Financial Group

    JD Rogers is the Chief Information Security Officer for American Financial Group, where he leads the IT security vision, strategy and function for the insurance holding company. JD has more than 20 years of information security experience working in the energy, manufacturing, finance and insurance industries. He joined American Financial Gr...

  • speaker photo
    Kevin Dye
    Resident Agent in Charge, United States Secret Service/Dayton

    Kevin is the new manager of the Southern District of Ohio Financial and Electronic Crimes Task Force. The task force is responsible for criminal investigations of electronic crimes from Columbus, Ohio to Northern Kentucky and partners with hundreds of task force members from numerous federal, state and local law enforcement agencies. He retur...

  • speaker photo
    Emma Sutcliffe
    Senior Director, Data Security Standards, PCI Security Standards Council

    Emma Sutcliffe oversees a number of PCI Security Standards, including the PCI DSS and PA-DSS. She chairs the PCI SSC’s Technical Working Group (TWG) and the Tokenization Working Group, where she works closely with the Payment Brands and Affiliate members to develop standards, supporting documentation and guidance papers. Sutcliffe has over 15...

  • speaker photo
    Jeff Dolence
    Systems Engineer, Radware
  • speaker photo
    Sean Brady
    Sr. Director, Product Marketing, Arbor Networks
  • speaker photo
    Jon Litchfield
    Global Product Security Manager, Johnson & Johnson

    Jon Litchfield is the Global Product Security Manager at Johnson & Johnson. Jon has 15 years of information technology experience and 8 years of information security experience. Jon holds several industry and security certifications including CISA, PMP, and has recently applied for his CISM certification. Jon started his career in information...

  • speaker photo
    Paul Singleton
    Systems Engineer, OpenDNS, now part of Cisco
  • speaker photo
    Mike Rock
    Information Technology Chief Security Officer, Western & Southern Financial Group

    Michael Rock is the information technology chief security officer for Western & Southern Financial Group (Western & Southern) based in Cincinnati. In this role, Rock oversees security efforts across the enterprise and identifies security initiatives and standards. He leads three functions: information technology risk, information security ris...

  • speaker photo
    Dr. Christopher Pierson
    Founder & CEO, BlackCloak

    Dr. Chris Pierson is the Founder & CEO of BlackCloak, a pioneer of personal digital protection for corporate executives, high-profile and high-net-worth individuals and their families. Chris has been on the front lines of cybersecurity, privacy protection, and fighting cybercrime in both the public and private sectors over 20 years. At the De...

  • speaker photo
    Ted Swailes
    Chief Digital Forensic Investigator, Swailes Computer Forensics

    As a digital forensic expert and licensed private investigator in the state of Texas, Ted Swailes has over twenty-four (24) years of investigative and technical security experience working with major corporations and law firms. He has brought expertise and support services to engagements in intellectual property theft investigations, non com...

  • speaker photo
    Pierre Grosdidier
    Attorney, Haynes and Boone, LLP

    Pierre Grosdidier’s litigation practice focuses on complex commercial litigation, especially lawsuits and arbitrations with strong technical elements. He has litigated cases involving unauthorized computer access, trade secret theft, construction, oil and gas, and software copyright claims. Pierre also advises on data security, data breach an...

  • speaker photo
    Jae Shin
    Head of Strategic Partnerships, Mobile, Check Point Software Technologies

    Jae Shin is the current Global Head of Mobile Strategic Partnership for Check Point Software Technologies based in San Carlos, California. Jae is responsible for creating and managing all mobile security ISV partners, carriers, and device OEM relationships. Jae is focused on integrating Check Point’s Mobile Threat Prevention into the enterpri...

  • speaker photo
    John E. Ode
    Sr. Information Security Consultant

    John Ode has been involved in forensic computer analysis for over ten years. Well-versed in data recovery and analysis, Ode's broad experience includes computer forensics analysis, advanced data recovery and analysis, networking and telecommunications, computer security, client/server applications and implementations, and Internet Information...

  • speaker photo
    Siobhan Gorman
    Director, Brunswick Group, Former Wall Street Journal Reporter

    Siobhan Gorman is a Director in Brunswick’s Washington, DC, office, where she co-leads the Cybersecurity & Privacy practice. Prior to joining Brunswick, Siobhan had a successful 17-year career as a reporter, most recently at The Wall Street Journal. There she covered hot and critical topics including cybersecurity, data and privacy issues, an...

  • speaker photo
    Manoj Tripathi
    VP, Global Information & Product Security, Pindrop

    Manoj Tripathi is a seasoned CISO and has decades of experience in security, technology and leadership, across SaaS, Products and Consulting companies. Manoj is passionate about security and technology topics and has presented on security program management strategy and secure development topics at various security conferences. He holds the C...

  • speaker photo
    Carlos Krystof
    CISSP, Sr. Sales Engineer, Cylance

    Carlos has over 15 years of experience in IT security, with extensive knowledge in network, server, and endpoint security. He advises clients on malware prevention, endpoint visibility, host and network intrusion prevention, vulnerability and configuration management, firewalls\perimeter protection, and SIEM. He is an authority on Cylance, a ...

  • speaker photo
    Andy Bennett
    Director, Center of Excellence in Digital Forensics

    Andy is a native Texan with nearly 20 years of experience in IT, DF, and Cyber Security Issues. He is passionate about security works every day as the Director of the Center of Excellence in Digital Forensics to share that passion with others.

  • speaker photo
    Colleen Riccinto
    Partner, Cyber Talent Search

    Don’t think of Colleen Riccinto as one of “those recruiters.” She shoots from the hip, speaks from the heart, and brings 15 years of experience in sales, security training, and leadership to her role. Colleen is the founder of Cyber Talent Search in Ann Arbor, Michigan.

  • speaker photo
    Daniel Shoemaker
    Professor and Director, Graduate Program, University of Detroit Mercy

    Daniel P. Shoemaker, PhD, is a Full Professor and Director of the Graduate Program in Cybersecurity at the University of Detroit Mercy, where he has worked for over 35 years. He has retired from his administrative position as Department Chair, PI for the NSA Center and Subject Matter Expert for DHS and NIST. He is enjoying more time with his ...

  • speaker photo
    Clark R. Crain
    GRC Consultant, Comp-West, LLC

    I have been a CISSP for more that 19 years, CISM for more that 14, and a CRISC for more that 7. I have worked as a compliance consultant for PCI, HIPAA-HITECH, NERC, NRC and others.

  • speaker photo
    Jen Fox
    Treasurer, Motor City ISSA Chapter

    Jen Fox is an active member of the Michigan Information Security community and is an ISSA Motor City chapter board member. Her 20+ years of experience in IT and Information Security span the insurance, utility, finance, manufacturing and IT sectors. Her speaking engagements include GrrCON, Security BSides Detroit and CircleCityCon.

  • speaker photo
    Alex Kayayian
    Internal Audit, Risk & Compliance

    Alex has professional experience in conducting SSAE-16 audits, attestations, PCI audits, HIPAA audits, policy and procedure writing, IT controls frameworks such as: ISO 27001, SANS critical controls, gap analysis testing, and general controls testing. A combination of academia, private and public sector experience has provided him with unders...

  • speaker photo
    Michael A. Stone
    ATAG-Installations, DMVA Deputy Director, Commander 46th Military Police Command, Michigan Army National Guard and DMVA

    Major General Michael A. Stone is the Commander, 46th Military Police Command, Michigan Army National Guard. In this capacity he provides leadership, mission command and strategic priorities in order to ensure effective and efficient accomplishment of the Command’s missions. General Stone is also an Assistant Adjutant General and responsibl...

  • speaker photo
    Brian Gawne
    Director, Cyber Security & Compliance, People Driven Technology
  • speaker photo
    Shad Gunderson
    System Engineer, Centrify

    Shad Gunderson has been working with identity management since 2001. In addition to working as a practitioner and consultant in the field, he has worked at CA and Hewlett Packard Enterprise Security Services. Shad joined Centrify three years ago as the System Engineer for the Midwest region.

  • speaker photo
    JP Blaho
    Market Insights Leader, Arbor Networks

    John Paul (JP) Blaho currently leads the Market Insights group for Arbor Networks, and is a seasoned Product and Solutions professional with more than 15 years in the product and services marketing ares in IT. With eight years focused specifically on network security solutions, JP has developed a focus on understanding the buyer journey for E...

  • speaker photo
    Patrick Corbett
    Assistant U.S. Attorney, U.S. Attorney's Office, Eastern District of Michigan

    A 1987 graduate of Notre Dame Law School, Corbett commenced employment as a lawyer working as a law clerk for U.S. District Court Judge Horace Gilmore. From 1989-1999, he prosecuted a variety of federal crimes for the U.S. Attorney’s Office in Detroit. Recruited by former Michigan Attorney General Jennifer Granholm, Corbett then served for 2 ...

  • speaker photo
    Christopher Mandelaris
    CISO, Elevations Credit Union

    Chris Mandelaris is the Chief Information Security Officer of Elevations Credit Union. He has over 16 combined years’ experience in IT and Information Security. He received his Bachelor of Science from Central Michigan University and Master’s Degree Information Technology - Walsh College of Business Chris has earned CCISO, CISM, CISA, CRISC, ...

  • speaker photo
    Mark Rasch
    Security Evangelist, Verizon

    Mark Rasch is a Security Evangelist for Verizon Enterprise Solutions (VES) where he helps develop strategy and messaging for the Information Security team.

    Rasch’s career spans more than 25 years of corporate and government cybersecurity, computer privacy, regulatory compliance, computer forensics and incident response. He is trained a...

  • speaker photo
    Robert Leale II
    Founder & President, CanBusHack
  • speaker photo
    Dr. Faith Heikkila
    Information Security Governance Specialist, Perrigo Company plc

    Faith Heikkila, Ph.D., CISM, FIP, CIPM, CIPP-US is an Information Security Architect - Governance at Perrigo Company plc. Dr. Heikkila has prior CISO practitioner experience in overall information security governance, compliance, vendor management, protection of personal and financial information, along with GDPR expertise in a global pharmac...

  • speaker photo
    David Derigiotis
    Corporate Vice President, Burns & Wilcox

    Corporate Vice President with the largest independent wholesale insurance broker in the country, Burns & Wilcox. David has participated in cyber roundtable discussions with the US Treasury Department in Washington D.C. and has appeared on Fox Business and CNBC. Publications featuring David include Detroit Crain’s and The Wall Street Journal.<...

  • speaker photo
    Jeremy Linden
    Director, Product Management, Qadium
  • speaker photo
    Jeff Lauer
    Vice President of Americas Business Development, Venafi

    A recognized speaker, authority and thought leader in security authentication and encryption field. As a key executive in successful, high-technology start-ups including Venafi, Jeff Lauer also brings over 28 years of experience in information technology and security. Mr. Lauer’s recent speaking engagements have included Secure World, CIO ...

  • speaker photo
    Dawn-Marie Hutchinson
    CISO, Pharmaceuticals and R&D, GSK (GlaxoSmithKline)

    Dawn-Marie Hutchinson brings more than 15 years of enterprise information technology experience to her role as CISO of GSK. She is an innovative business partner with extensive experience serving on Enterprise Risk Management teams. Hutchinson is an expert in providing data privacy and security solutions to manage information risk, improve IT...

  • speaker photo
    Jon Clay
    Director, Global Threat Communications, Trend Micro

    Jon Clay has worked in the cybersecurity space for over 21 years. He is responsible for managing marketing messages and external publication of all the threat research and intelligence within Trend Micro as well as different core technologies. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses o...

  • speaker photo
    Melissa Markey
    Attorney, Hall, Render, Killian, Heath & Lyman

    Melissa Markey is a shareholder with Hall, Render, Killian, Heath & Lyman, and is licensed in Michigan, Utah, Colorado and Texas. Melissa's practice focuses on technology and life sciences, especially cybersecurity, data privacy, and legal issues at the developing edges of technology. Ms. Markey is a paramedic, and a nationally recognized au...

  • speaker photo
    Zee Abdelnabi
    Advisory Manager / Security Researcher, Deloitte

    Zee is a security researcher and a manager experienced in managing large, complex global teams that focus on: advanced penetration testing, connected car security, SIEM, vulnerability management, threat modeling, and mobile security. Zee is an active security community member.

  • speaker photo
    Steven F. Fox
    Deputy CISO, State of Washington

    Steven F. Fox provides security guidance to ensure risk-informed compliance with federal standards and requirements as a Deputy CISO for the State of Washington. He brings a cross-disciplinary, international perspective to the practice of information security, combining his experience as a security consultant, an IT Audit leader, and a system...

  • speaker photo
    Christine Wheaton
    CISO, Meritor

    Christy Wheaton currently serves as the Sr. Director & CISO for Meritor, overseeing the enterprise cybersecurity and GRC programs, globally. Wheaton previously served as global identity and access management lead for GE Capital, overseeing global IAM programs. Her role expanded to also oversee the information security intelligence program, in...

  • speaker photo
    Charles Parker II
    Cybersecurity Lab Engineer, Thomas Edison State University

    Charles Parker, II has been in the computer science/InfoSec industry for over a decade in working with medical, sales, labor, OEM and Tier 1 manufacturers, and other industries. Presently, he is a Cybersecurity Lab Engineer at a Tier 1 manufacturer and professor. To further the knowledge base for others in various roles in other industries, h...

  • speaker photo
    Kathy Ossian
    Founder & CEO, Ossian Law P.C.

    Kathy Ossian is Founder and CEO of Ossian Law, P.C., a firm focused exclusively on Information Technology Law. Kathy has practiced for 35 years; over 22 in Information Technology law. She is a frequent author and speaker on timely IT law topics and the Managing Editor of “Social Media and the Law” published by PLI. Kathy is also an Adjunct Fa...

  • speaker photo
    Barbara L. Ciaramitaro
    Chair, Undergraduate Information Technology, Capella University

    Dr. Barbara L. Ciaramitaro is the Chair of the Undergraduate Information Technology program at Capella University. She has taught graduate and undergraduate courses on a variety of topics including cybersecurity, emerging technology, complex systems dynamics, software engineering and project management. Dr. Ciaramitaro is a frequent speaker a...

  • speaker photo
    Pedro Serrano, Moderator
    Sr. Security Architect, CDW

    Pedro Serrano has over 35 years of experience managing and installing technical controls in networks around the world, 20 of those in military systems. Previously Pedro was a former CISO, Network Security for an integrated healthcare system as well as Security Architect for major Oil and Gas Exploration company, today he is CDW’s Senior Secur...

  • speaker photo
    Amna Siddiqui
    Director, Security Management, Financial Investment Management Company

    Amna Siddiqui is Director, Security Management, with a broad-based technology background and current experience in Cybersecurity and Technology Risk Management in the financial sector. She is knowledgeable in industry and regulatory frameworks and holds multiple certifications with most recent related to AWS.

  • speaker photo
    Darren Windham
    Digital Forensics Investigator , Verizon RISK Team

    Darren is a Senior Investigative Response Consultant for the Verizon RISK Team. In this capacity, Darren responds to an array of cybersecurity incidents, performs forensic examinations, and assists organizations in implementing IR policies and procedures.

  • speaker photo
    Dr. Bryan S. Cline
    VP Standards & Analytics, HITRUST

    As the VP of Standards and Analytics at HITRUST, Dr. Bryan S. Cline provides thought leadership for the continuing development of the HITRUST CSF and related methodologies—healthcare’s de facto information protection standard and basis for NIST Cybersecurity Framework implementation in the industry—and the ‘Father’ of (ISC)2’s HCISPP credenti...

  • speaker photo
    Atheana Fulgencio
    OpenDNS/Cisco
  • speaker photo
    Chuck Easttom
    Computer Scientist, Northcentral University

    Dr. Easttom is the author of 26 computer science books and over 40 research papers, as well as an inventor with 14 patents. He is a frequent speaker at computer science and security conferences, and is a Distinguished Speaker of the ACM (Association of Computing Machinery). He holds a Doctor of Science in cyber security and three masters deg...

  • speaker photo
    Michael R. Smith
    Sr. Information Systems Auditor, Parkland Health & Hospital System

    Michael R. Smith, MBA, CISSP, CFE, CISA, CIA, PMP, ITIL, is a Healthcare Information Technology Professional with over thirty years of IT experience. Michael is a Sr. I.S. Auditor at Parkland in Dallas, Texas, specializing in performing information security assessments and audits focused around IT governance and regulatory compliance.

    ...

  • speaker photo
    John B. Sapp Jr.
    VP, Information Security & CISO, Texas Mutual Insurance Company

    John is widely recognized by industry peers and leaders as a visionary and strategic information security professional who is focused on innovative implementations of InfoSec and IT Risk implementations He is a frequent speaker at some of the largest technology and healthcare industry events.

  • speaker photo
    Kathryn Sherman
    Special Agent, Federal Bureau of Investigation
  • speaker photo
    John Pirc
    Director - Security Solutions, Forsythe Technology

    John’s current role is that of Director- Security Solutions for the West area at Forsythe Technology. John brings over 19 years outstanding security industry accomplishments and credibility. John was most recently the Co-Founder and CSO of Bricata, LLC and prior to that was the CTO at NSS Labs. Previously, John had responsibility for all Sec...

  • speaker photo
    Kyle Wilhoit
    Director of Threat Research, Unit 42 Threat Intelligence, Palo Alto Networks

    Kyle Wilhoit is an internationally recognized security researcher and threat research leader with more than a decade of experience helping research teams deliver original and organized threat intelligence and research. In his current role as Director, Threat Research on Palo Alto Networks Unit 42, Kyle is responsible for leading teams of worl...

  • speaker photo
    Jing Nghik
    Systems Engineer, Radware

    Jing is a systems engineer at Radware, a leader in application delivery and security solutions that assures the availability, performance, and resilience of business-critical applications for over 10,000 enterprises and carriers worldwide. Jing is a seasoned security professional with over a decade of networking/security experience covering a...

  • speaker photo
    Shawn E. Tuma
    Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small...

  • speaker photo
    George Finney
    Chief Security Officer, Southern Methodist University

    George Finney is a Chief Information Security Officer that believes that people are the key to solving our cybersecurity challenges. He is the CEO and founder of Well Aware Security and the CSO for Southern Methodist University In Dallas, Texas. George has worked in Cybersecurity for nearly 20 years and has helped startups, global telecommuni...

  • speaker photo
    Robert Scott
    Managing Partner, Scott & Scott, LLP

    Robert represents mid-market and large enterprise companies in software license transactions and disputes with major software publishers such as Adobe, IBM, Microsoft, Oracle and SAP. He has defended over 250 software audit matters initiated by software piracy trade groups such as the BSA and SIIA. He is counsel to some of the world’s large...

  • speaker photo
    Jamey Cummings
    Senior Client Partner, Korn Ferry

    Jamey Cummings co-leads Korn Ferry’s Global Cybersecurity Practice, where he advises organizations on the recruitment, assessment, development, and retention of security & risk management leaders. Prior to his career in executive search, he was a consultant with The Boston Consulting Group and served as a US Navy SEAL officer.

  • speaker photo
    Alex Kreilein
    CTO, SecureSet
  • speaker photo
    Chen Heffer
    Chief Security Officer, Douglas County Colorado
  • speaker photo
    Shay Zandani
    CEO and Founder, Cytegic
  • speaker photo
    Mike Kachline
    Director of Operations, Peaksware

    With over fifteen years across large to small companies, Mike has written and maintained software using multiple languages. In addition to software development, Mike has managed both IT and customer service groups, as well as holding a key role in bringing multiple Point-of-Sale platforms to PA-DSS compliance.

  • speaker photo
    Jerry Skurla
    VP Marketing, Advanced Threat, Arbor Networks
  • speaker photo
    Trevor Hawthorn
    CTO, Wombat Security Technologies

    Trevor joined the Wombat team in October 2015 with the acquisition of ThreatSim , where he was co-founder and CTO. Trevor has a technical and hands-on background, with over eighteen years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the F...

  • speaker photo
    Julie Chickillo
    Director of Information Security and Compliance, IQNavigator

    Julie is an information security professional with over 15 years of experience in Information Security Governance, Risk and Compliance, IT Audit and Legal. Julie is currently responsible for developing and executing on the IQN information security strategy and compliance assurance program. IQNavigator is the leading independent technology pro...

  • speaker photo
    Manjula Udeshi
    Director, ISACA Board

    Manjula is a seasoned professional with more than 15 years of experience in Governance, Risk and compliance, information technology auditing and business administration. As Director within the Office of CISO at Optiv, she is responsible for designing, building, and executing a robust and business aligned security governance, risk, compliance ...

  • speaker photo
    Jessica Raymond
    IT Security Manager, Department of Information Technology, Weld County

    Jessica Raymond is the IT Security Manager for Weld County Government where she had the opportunity to build the security program from the ground up over the last 5 years. She is responsible for information security in a 360 degree fashion including designing, implementing, and maintaining security infrastructure, compliance and audits, gove...

  • speaker photo
    Greg Sternberg
    Security Architect, Sungard Availability Services

    Greg Sternberg is a Security Architect at Sungard Availability Services, CISO for ISSA, Denver and Affiliate Faculty at Regis University. He works at incorporating security into the SDLC and securing architectures. He has published and blogged on security and architecture topics and presented at SecureWorld, RMISC, ISC(2) and the Open Group S...

  • speaker photo
    Florence Levy
    Senior Vice President, Cyber / E&O Practice

    Florence focuses on creating cyber and E&O risk management programs for companies in a wide array of industries. She works with clients to understand their business goals, then assesses and develops programs or alternative risk transfer solutions that match their risk management objectives. Her expertise lies in identifying exposures, program...

  • speaker photo
    Erica Davis
    SVP, Head of Specialty Products E&O, Zurich

    Erica Davis is Senior Vice President of Specialty Errors & Omissions at Zurich. She has national oversight of the Professional Liability, Security & Privacy and Employed Lawyers lines of business with a specialization and industry thought leadership position in network security and privacy risk transfer solutions.

  • speaker photo
    David Tonini
    Computer Hacking and Intellectual Property (CHIP) Coordinator, and Assistant United States Attorney, U.s. Attorney’s Office, District of Colorado
  • speaker photo
    Judy Smith
    Chief of Special Prosecutions Section and Assistant US Attorney, United States Attorney’s Office, District of Colorado
  • speaker photo
    Susan Bond
    Consultant, Advisory Services, Ernst & Young

    As a technical project leader for over 20 years, Susan Bond has delivered solutions across several industries including Energy, Technology, Logistics Real Estate, and Higher Education. Susan was the Technical Lead for the implementation of network, cybersecurity, visualization, SCADA, and analytics infrastructure during construction and trans...

  • speaker photo
    Kelly Fuller
    Founder & CEO, Cybersecurity Risk Management Consulting

    Fuller has broad-based experience as an information security and technology risk management executive, IT audit practice director, and management consultant spanning a variety of industries ranging from banking and insurance to healthcare, energy, and government. Her extensive work in technology risk management, regulatory compliance, IT gove...

  • speaker photo
    Gina Osmond
    Product Marketing, Venafi
  • speaker photo
    Daniel M. Likarish
    Director CIAS, Regis University

    Daniel M Likarish is professor Regis University CC&IS and Director of the CIAS. His research interests are in personalized experiential learning. He supports Colorado Cyber Patriot and Cyber Girls. Dan is the academic advocate for ISSA and ISACA. He is on the CISE Board and regional coordinator for the RMCCDC.

  • speaker photo
    David Monahan
    Research Director, Security and Risk Management

    David has over 20 years of IT security experience and has organized and managed both physical and information security programs, including SOC’s and NOC’s for organizations ranging from Fortune 100 companies and local government to small public and private companies. He has diverse Audit, Compliance, Risk and Privacy experience.

  • speaker photo
    Rhett Saunders
    Director of Cybersecurity & Compliance, Focus on the Family

    Before coming to Focus on the Family, Rhett served the Federal Reserve, and while there, led regular Enterprise Risk Management discussions between the Federal Reserve and U.S. Treasury with a focus on cybersecurity. He is a former NSA cryptoanalyst and a U.S. Army veteran, having served multiple joint intelligence communities, both foreign a...

  • speaker photo
    Tom Bienkowski
    Director, Product Marketing, Arbor Networks

    Tom has been in the network and security field for over 20 yrs. During this time he worked for large enterprises as a Network Engineer and for multiple network management and security vendors where he has had roles in Sales Engineering /Management, Technical Field Marketing and Product Management. Currently at Arbor Networks he’s a Director o...

  • speaker photo
    Dan Lohrmann
    CSO, Security Mentor; Former CISO, State of Michigan

    Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker, and author. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington D.C. to Moscow. During his distinguished career, Dan has served global organizations in the public and p...

  • speaker photo
    David J. Harrier
    Sr. Manager, Enterprise Holdings Inc.

    David has been a cybersecurity leader for 12+ years at various global Fortune 100 companies with responsibilities ranging from strategic and tactical planning, architecture, engineering, operational support, process improvements, automation to consulting. He enjoys decomposing complex problems into implementable and sustainable solutions.

  • speaker photo
    Arabella Hallawell
    Sr. Director, Product Marketing, Arbor Networks

    Arabella is responsible for the go-to-market positioning and activation of the company’s Advanced Threat solutions at Arbor. Previously she was VP of Corporate Strategy where she led strategic planning and corporate development activities.

    Arabella has over 20 years of experience in IT security and strategy. Prior to joining Arbor, Ara...

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventat...

  • speaker photo
    Bob Brown
    CISO, Busey Bank

    Bob presents to executive clients on their security posture and recommended economical approaches for improvement. He consults on all organizational aspects of information security: project initiations, security assessments, vendor reviews, contract negotiations, audit and regulatory engagements. +15 years of experience in the Information Sys...

  • speaker photo
    Paul Kurtz
    CEO & Co-Founder, TruSTAR Technology

    Paul Kurtz is an internationally recognized expert on cybersecurity and the current CEO of TruSTAR Technology. Paul began working cyber security issues on the National Security Council at the White House in the late 1990s. He served in senior positions on the White House's National Security and Homeland Security Councils under Presidents Clin...

  • speaker photo
    Andrew Hrenak
    Detective/Forensic Examiner, Regional Computer Crimes Education and Enforcement Group (RCCEEG)

    The Regional Computer Crime Education and Enforcement Group (RCCEEG) is a non-profit, multi-jurisdictional computer crime task force serving the Eastern District of Missouri. The inception of RCCEEG began in 1999 and was fully implemented as a non-profit organization in January, 2003. It exists to meet the growing demand for forensic and inve...

  • speaker photo
    Bhavesh Chauhan
    Principal Client Partner, Verizon Enterprise Solutions

    Bhavesh Chauhan is a Principal Client Partner - Security Evangelist within Verizon CTO organization. Previously a Principal in Financial Services and lead the Security Engineering and Professional services for the North East Region of Americas, which includes Enterprise, Government Accreditor, Security Principal, Consultant, Engineer and Arch...

  • speaker photo
    David Barton
    CISO, Forcepoint

    David Barton is the Chief Information Security Officer for Forcepoint, responsible for securing the company and sharing key learnings with customers. Barton brings to his role more than 20 years of experience in security leadership across a variety of sectors, including telecommunications, healthcare, software development, finance and governm...

  • speaker photo
    John Newcomer
    SVP, Information Security, CitiBank

    John Newcomer is currently Senior Vice President of Information Security at CitiBank, a top-10 national mortgage lender. He has eight years of experience in the information security field, with 17 years prior in IT.

  • speaker photo
    Dr. Maurice Dawson Jr.
    Director, Center for Cyber Security and Forensics Education and Assistant Professor, Illinois Institute of Technology

    Maurice Dawson is a faculty member in the School of Applied Technology to serve as Director of Illinois Institute of Technology's Center for Cyber Security and Forensics Education, which is accredited by the National Security Agency. Maurice has earned a Doctor of Computer Science from Colorado Technical University in 2009 and a Ph.D. in Cybe...

  • speaker photo
    Vinny Troia
    Security Researcher and Pentester, Author "Hunting Cyber Criminals"

    Founder and Principal Security Consultant of Night Lion Security, Vinny Troia brings 20+ years of IT security and development experience. He is also a featured speaker on ABC, CNBC, and Fox News.

    "One afternoon, I drafted an email to the CEO and CISO of a major airline company. The title read – URGENT – Data breach in your network. Dur...

  • speaker photo
    Peter Roman
    Senior Counsel, Computer Crime & Intellectual Property Section, Criminal Division, U.S. Justice Department

    Peter Roman is a federal cybercrimes prosecutor and a former Oracle DBA and UNIX system administrator. After 14 years working in IT, and following the events of September 11, 2001, Mr. Roman went back to school and became a lawyer so that he could become a prosecutor. Now, he melds his cyber and legal experience working for the Department of ...

  • speaker photo
    Jon Stitzel
    Cybersecurity Risk Management Lead, Ameren

    Jon Stitzel is the Lead Analyst for Cybersecurity Risk Management at Ameren. He is responsible for driving cybersecurity and risk management strategy for business and industrial control system environments, in addition to leading IT and Cybersecurity controls compliance. Jon has over 30 years of experience in the IT industry, including more t...

  • speaker photo
    Brian Allen
    Information Security Manager, Washington University in St. Louis

    Brian Allen started in IT as a unix/security admin in 2000, and has been working in security at Washington University for 13 years. Before WashU, he was a Unix Admin at the University of Maryland for four years and then a Security Administrator at UMSL for two years.

  • speaker photo
    Patrick Crowley
    CTO/Founder Observable Networks & Professor of CSE, Washington University in St. Louis

    Patrick Crowley is founder and CTO of Observable Networks. He is also professor of Computer Science & Engineering at Washington University in St. Louis.

  • speaker photo
    Shawn Bradstreet
    Assistant to the Special Agent in Charge, United States Secret Service, San Francisco Field Office

    Shawn M. Bradstreet is the Assistant to the Special Agent in Charge at the San Francisco Field Office. In this capacity, Mr. Bradstreet is the supervisor of the San Francisco Electronic Crimes Task Force and previously supervised the Bay Area Financial Crimes Task Force. Mr. Bradstreet is a 17-year veteran of the U.S. Secret Service.

    M...

  • speaker photo
    Gary Sockrider
    Principal Security Technologist, NETSCOUT Arbor

    Gary is an industry veteran bringing over 25 years of broad technology experience ranging from network security to routing and switching, data center, mobility and collaboration. His previous roles include security SME, consultancy, customer support, IT and product management. He seeks to understand and convey the constantly evolving threat l...

  • speaker photo
    Roy Katmor
    Co-Founder & CEO, enSilo
  • speaker photo
    Orus Dearman
    Managing Director, Grant Thornton
  • speaker photo
    Raj Patel
    Chief Information Security Officer, City of Palo Alto

    As CISO since early 2012, Raj has established an Information Security Steering Committee comprised of executive management, and developed an information security strategy and roadmap for future activities. In support of the strategy to ensure the confidentiality, integrity and availability of the information systems that support the operation...

  • speaker photo
    Randy Cheek
    VP, DarkTrace

    Randy Cheek has over 10 years experience in the enterprise software industry across a number of roles, both commercial and technical. From startups to Fortune 500 companies, he has led teams responsible for key strategic accounts and has consistently led business growth throughout his career. As one of the first members of Darktrace US, he of...

  • speaker photo
    Santosh Kandala
    Director, Security Monitoring & Analytics, Microsoft

    Santosh Kandala is a passionate security leader with diverse experience in the areas of behavioral analytics, security monitoring, incident response, cloud scale detection, digital forensics, ethical hacking and investigations. When is he is not finding needles in the haystack, you will see him running half marathons in the trails around Puge...

  • speaker photo
    JD Sherry
    Chief Strategy Officer, Remediant

    JD Sherry is a seasoned technology executive and is responsible for providing vision and awareness regarding the latest trends in cybersecurity, risk and compliance. Well-versed in enterprise security and data center architecture, as a former practitioner and CEO, JD has successfully implemented large-scale public, private, and hybrid clouds ...

  • speaker photo
    Craig Spiezle
    Founder & President, AgeLight Advisory & Research Group

    Craig Spiezle is the founder and managing partner of AgeLight Advisory Group, a professional services firm focused on online and digital services. Craig is a recognized authority on trust and the convergence of privacy and security promoting ethical privacy practices, end-to-end security and the importance on moving from a compliance mindset ...

  • speaker photo
    Alex Wood
    CISO, Uplight; Co-Host, Colorado = Security podcast

    Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security...

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided...

  • speaker photo
    Annie Searle
    Associate Teaching Professor, The Information School, University of Washington

    Annie teaches courses on risk management, cybersecurity, and information management at the University of Washington. She is founder and principal of ASA Risk Consultants, a Seattle-based advisory firm. She spent 10 years at Washington Mutual Bank, where for most of those years she chaired the crisis management team.

    Annie is a member o...

  • speaker photo
    Adam Schrock
    Managing Director, Grant Thornton
  • speaker photo
    Joan Ross
    Cybersecurity Technologist, CISO, and Threat Intelligence Professional

    Joan Ross is a respected industry thought leader who develops advanced security strategies, publishes and speaks on implementing threat intelligence. Joan is a former Chief Security Officer for two technology companies, coming up the security ranks as an encryption engineer and cloud security architect. As an early CISSP holder from back in t...

  • speaker photo
    Vanessa Pegueros
    Board Member, Cybersecurity Leader, Angel Investor

    Vanessa is a cybersecurity leader with over 16 years of security experience. She is currently serving on the Board of Carbon Black (CBLK) and BECU. She also is a venture partner with Flying Fish Partners in Seattle. Vanessa formally worked as the CISO at DocuSign and successfully managed through hyper growth and an IPO in 2018. She also was t...

  • speaker photo
    Kevin Murphy
    Business Information Security Officer (BISO), T-Mobile USA

    Kevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT sec...

  • speaker photo
    Ron Winward
    Security Evangelist, North America, Radware

    As a Security Evangelist at Radware, Mr. Winward is responsible for developing, managing, and increasing the company’s security business in North America.
    Ron’s entire career has been deeply rooted in internet and cybersecurity. For over 20 years, Ron has helped design complex solutions for carriers, enterprises, and cybersecurity provi...

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologi...

  • speaker photo
    Kate Wakefield
    Director of Information Security, Landmark Health

    Kate Wakefield has sixteen years of Infosec experience including retail, telecommunication, and over ten years in healthcare. Special interests include Privacy, Risk Assessment,IT audit, and Compliance. She has been using HiTRUST as a compliance framework since 2015. Kate holds CIPT and CISSP certifications and served on the local ISSA Board....

  • speaker photo
    Andrew Baze
    Microsoft, Director of Security Program Management

    Andrew Baze is a principal security analysis program coordinator in Microsoft's Cloud and Enterprise Security group, assessing and improving security capability across Microsoft's online services and infrastructure. He enjoys applying his 15+ years of engineering, risk management and security analysis experience to help organizations better u...

  • speaker photo
    Troy Leach
    Chief Technology Officer, PCI Security Standards Council

    : Troy Leach is the Chief Technology Officer for the PCI Security Standards Council. In his role, Mr. Leach partners with Council representatives, Participating Organizations and industry leaders to develop comprehensive standards and strategies to secure payment card data and the supporting infrastructure. He is a congressional subject matte...

  • speaker photo
    John O'Leary
    President, CISSP, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands o...

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Manager, Cyber and Information Security, Point32Health

    Larry Wilson is an Information Security Manager at Point32Healt in Canton, MA. He was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and ove...

  • speaker photo
    Dr. Larry Ponemon
    Chairman and Founder, Ponemon Institute

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research "think tank" dedicated to advancing privacy and data protection practices. Dr. Ponemon is considered a pioneer in privacy auditing and the Responsible Information Management (RIM) framework.

    Ponemon Institute conducts independent research, educates leade...